From nobody at replay.com Tue Sep 1 00:02:56 1998 From: nobody at replay.com (Anonymous) Date: Tue, 1 Sep 1998 00:02:56 -0700 (PDT) Subject: No Subject Message-ID: <199809010703.JAA12169@replay.com> Is this like flame baiting him? Personally I don't mind the comments :) ----------- We don't take kindly to racial slurs here. You'll probably be receiving hundreds of email bombs over the next few days from angry cypherpunks. You may want to change email accounts.God bless! At 08:19 PM 8/29/98 -0400, RyanFord at aol.com wrote:> hola and good tidings > send some info on spooks please > i will be grateful> From nobody at replay.com Tue Sep 1 00:22:11 1998 From: nobody at replay.com (Anonymous) Date: Tue, 1 Sep 1998 00:22:11 -0700 (PDT) Subject: Is Hate Code Speech? YES Message-ID: <199809010722.JAA14753@replay.com> First off if she didn't like the code she could have quit. Laws that say a company has to change their internal practices to make the workers happy are idiotic. I can't sue because the men's bathroom looks like crap and the wemans has a couch in it! If the program code was meant for distribution it might be a little different but still you have the choice not to get that code. The same as reading this message a few lines in you could delete it! You chose to read this far. The code is internal only and thus should require an internal policy, not an outside law enforcement agency. As far as speach: If it wasn't a form of speech she would have not gotten offended. She was offended by the language in the source code and thus the speech. get a job somewhere you feel comfortable, don't get a job and force them to change things around you ---"Albert P. Franco, II" wrote: > > >From: mcw at atreus.ncs.ncsc.mil > >Subject: Is Hate Code Speech? > > > > > >I acknowledge that you're welcome to use whatever variable names you > >want in code you write in private. BUt if you want to sell that code, it > >should be held to a standard of professionalism. > > > > I think it is interesting that people are speaking of the program as > something published for public consumption. Source code for commercial > products rarely goes public and compilers do a rather nice job of obscuring > human language variable names. Thus if there is any message or coherent > agenda in the source code it is highly unlikely that it will be detectable > in the executable, which is in fact the product delivered to the public. > > Since the source code can only be read by insiders/employees then this does > tend to make it rather obvious that a form of speech was intended. I won't > rehash the fact that non-relevant, human-language-significant variable > names (as opposed to x, y, i, & j) are generally unacceptable programming > practice. I would make two points; that in todays programming world source > code is protected by copyright law as are other forms of expression legally > considered speech and source code is intended to document the process and > as such communicate ideas--in a broad sense this is a decent description of > speech, a written mode of communicating ideas. > > If someone finds offensive (hate) material in an obscured text (encrypted) > intended for limited distribution, does the encryption make it less > hateful? does the encryption make it any less a form of speech? does the > fact that distribution is limited (assumming the "target" is in the > distribution class) make it any less offensive? Is a crime less illegal if > it is hidden? (Be careful, on this one...) > > I think that offensive, probably hateful, speech was intended. So the next > step (or for others, a previous step) is to decide whether there are legal > grounds for action. There are several laws which do, in fact, make these > activities illegal. Most people in the US today agree that overt racism is > wrong. Additionally, most "Americans" agree with laws that make it illegal > to use/perform "hateful" speech. > > These are very dangerous laws since they try to tread a very thin line > between the freedom of thoughts (and to some degree, actions) and injury to > others. When I first settled down to live in Spain and began to pay real > attention to the local political scene I was astonished to find people > defending the "right" of the radicals to throw stones and metal objects at > those persons expressing ideas contrary to theirs (pro-peace, > anti-terrorism demonstrations, 1995-6). Fortunately, we hear less and less > of this non-sense that physical harm to another is a valid form of personal > expression or speech. But the base problem lingers, where do we draw the > line of expression of ideas and intent to do harm. It has long been held > that shouting "fire" in a crowded building is not a protected form of > speech. Nor is libel (forgetting for now the problems of defining or > proving it). And where do we draw the line (or does it even matter?) > between public and private? And where do expression and action get > separated? Thinking about doing something, or telling some one about those > thoughts are not generally the same as actually doing it. But where does > thought become expression become action? > > This case doesn't solely revolve around the speech issue...IMO, it also > revolves around the public/private issue, and whether or not the government > can rightfully "enter" a "private" business place to regulate these > matters. Recent history (80 years or so...) shows an increasing tendency > for the government to "protect" workers by regulating the workplace. There > are health & safety regs, minimum wage regs, etc. The "American" populace > has in general supported (and at times demanded) these external limits on > the "private" employer/employee relationship. Legal precedent exists. > > There are two problems here and historically the government has been called > upon to keep a balance between "free speech" and "harmful speech" on the > one hand and "Privacy" and "Protection" on the other hand. The debate now > is with this case which way will (should?) the pendulum swing? More > protection (reduction of privacy), more freedom (or hateful speech)... > > Personally, I hope no one wins this eternal debate 100% since the results > would be disastrous. > > Just some thoughts... > > Albert P. Franco, II > encryption at apf2.com > > == _________________________________________________________ DO YOU YAHOO!? Get your free @yahoo.com address at http://mail.yahoo.com From martin at mpce.mq.edu.au Tue Sep 1 02:05:35 1998 From: martin at mpce.mq.edu.au (Martin ELLISON) Date: Tue, 1 Sep 1998 02:05:35 -0700 (PDT) Subject: Child-Molesting Forger's Chilling Confession!!!1! Message-ID: <199809010904.TAA23375@kryton.mpce.mq.edu.au> A non-text attachment was scrubbed... Name: not available Type: application/x-www-form-urlencoded Size: 34 bytes Desc: not available URL: From apf2 at apf2.com Tue Sep 1 02:08:06 1998 From: apf2 at apf2.com (Albert P. Franco, II) Date: Tue, 1 Sep 1998 02:08:06 -0700 (PDT) Subject: BEWARE of SnakeOil (tm) Message-ID: <3.0.3.32.19980902103231.006af730@apf2.com> >> The subpoena Booher received also ordered him to bring to the courthouse the >> source code for his product, suggesting the government wants to reverse >> engineer it. > The writer of this article shows an astonishing lack of computer knowledge. If they get the source code then there is no need to reverse engineer! Discount anything technical this writer says since he/she is clueless! Give 'em a word processor and they think they're journalists... Albert P. Franco, II From chromedemon at netcologne.de Tue Sep 1 04:06:36 1998 From: chromedemon at netcologne.de (Lars Weitze) Date: Tue, 1 Sep 1998 04:06:36 -0700 (PDT) Subject: Is it true that PGP 5.X is not secure? Message-ID: <001001bdd5a0$b7cef800$7b0000c8@chrome> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 There are still rumors about that... ChromeDemon - -- "One dead is a tragedy, thousand deads are a statistic." Karl Marx e-mail: chromedemon at netcologne.de http://chromedemon.home.pages.de http://www.netcologne.de/~nc-weitzela2 -----BEGIN PGP SIGNATURE----- Version: PGP 5.5.5 iQA/AwUBNevU0XnCsKPabtOfEQILcACfZ097WlD1pyA+2c7qv5RcyuYQJaEAoOmf mvg3B9F9NNv7qrHljjgC1T+B =J/8j -----END PGP SIGNATURE----- From mok-kong.shen at stud.uni-muenchen.de Tue Sep 1 05:45:13 1998 From: mok-kong.shen at stud.uni-muenchen.de (Mok-Kong Shen) Date: Tue, 1 Sep 1998 05:45:13 -0700 (PDT) Subject: Is it true that PGP 5.X is not secure? In-Reply-To: <001001bdd5a0$b7cef800$7b0000c8@chrome> Message-ID: <35EBEC0F.3EE4869E@stud.uni-muenchen.de> Lars Weitze wrote: > > There are still rumors about that... My humble knowledge does not permit my answering your question. However, I suppose your question is problematical. It is difficult to define security, or more precisely a scientifcally rigorous measure of security. I don't think that it is sensible to talk about absolute security without reference to a context (environment). In my view there is no 'perfect' encryption system in the practical world. If by 'not secure' you meant something that malicious persons have secretely manipulated to cause you damage, then I also don't know but I guess that to be highly unlikely, given the good historical record of PGP. M. K. Shen From sbryan at vendorsystems.com Tue Sep 1 07:20:37 1998 From: sbryan at vendorsystems.com (Steve Bryan) Date: Tue, 1 Sep 1998 07:20:37 -0700 (PDT) Subject: Is it true that PGP 5.X is not secure? In-Reply-To: <001001bdd5a0$b7cef800$7b0000c8@chrome> Message-ID: >-----BEGIN PGP SIGNED MESSAGE----- >Hash: SHA1 > >There are still rumors about that... >ChromeDemon >- -- >"One dead is a tragedy, thousand deads are a statistic." > Karl Marx > >e-mail: chromedemon at netcologne.de >http://chromedemon.home.pages.de >http://www.netcologne.de/~nc-weitzela2 >-----BEGIN PGP SIGNATURE----- >Version: PGP 5.5.5 > >iQA/AwUBNevU0XnCsKPabtOfEQILcACfZ097WlD1pyA+2c7qv5RcyuYQJaEAoOmf >mvg3B9F9NNv7qrHljjgC1T+B >=J/8j >-----END PGP SIGNATURE----- Why pay attention to ill-supported rumors? The source code is publicly available at www.pgpi.com. If there is a security issue then it can be critiqued with reference to the places in the source code that are the cause of the problem. If someone has done this, I haven't been paying close enough attention and I apologize for ranting. If not, then I would dismiss such claims as almost certainly baseless. Steve Bryan Vendorsystems International email: sbryan at vendorsystems.com icq: 5263678 pgp fingerprint: D758 183C 8B79 B28E 6D4C 2653 E476 82E6 DA7C 9AC5 From billp at nmol.com Tue Sep 1 08:34:25 1998 From: billp at nmol.com (bill payne) Date: Tue, 1 Sep 1998 08:34:25 -0700 (PDT) Subject: Threaded code's place Message-ID: <35EC12E4.1B6C@nmol.com> Tuesday 9/1/98 9:00 AM Alexander Wolfe I spoke to Richard Hanson yesterday afternoon. He got the e-mail referencing http://www.eet.com/news/98/1024news/java.html I wrote the attached WEED KILLER addition for an SBIR proposal submitted by several profs at Texas A&M and a Sandia physicist. Threaded code can 'save-the-day' on some types of projects but doesn't work very well on others. I wrote in the preface of my 8051 forth book FORTH is applicable to hardware intensive projects implemented by one, two, or three workers. Robots, computer numerical controlled machines, weapons programmers, cryptographic processors, engine controllers, unmanned observatories, computer hardware debuggers, laser printer graphics controllers, video games, work station device drivers, writing BASICs are all candidates for FORTH software technology. FORTH is a one of the top choices for embedded controller applications. AFTER publication of my SANDIA-APPROVED BOOK, I learned FROM NSA 1 the former ussr uses Forth to fuze it weapons systems 2 builds a military version of the 8051. Oh dear. /http://www.apcatalog.com/cgi-bin/AP?ISBN=0125475705&LOCATION=US&FORM=FORM2 http://www.oreilly.com/catalog/javavm/ gives the definition of the Java verbs. Charles Moore, Forth's inventor, is writing the ShBoom Java compiler http://www.ptsc.com/ The green machine at http://www.metriguard.com/HCLT.HTM runs using the Forth from my book. Since I was fired I have been doing mostly MASM and Visual Basic programming. This is good for me since I gives me a different perspective from standalone Forth and Forth assembler which I did at Sandia. Visual Basic is more like Fortran than traditional basics. Implementing Basics : How Basics Work William H. and Patricia Payne / Published 1982 http://www.amazon.com Your article on Java and its future was VERY INFORMATIVE. I SPECULATE that Java will see about the same success as Forth. I am working on completion of the digital FX Model 2600FX Ultrasonic Veneer Tester http://www.metriguard.com/METPROD.HTM which uses a 80C32 micrcontroller interfacing to a Windows PC though an ieee 1284 ecp port. The 80C32 software is written in Forth and Forth assembler. The Windows since is written in Visual Basic and MASM Windows dlls. Forth on the 80C32 is a NATURAL. One the PC side Forth is not suitable - except for interactive exploring super i/o chips. http://www.smsc.com/main/datasheet.html Loring Wirbel WROTE SCATHING articles about NSA when Girish Mahtre was editor of EET. But since CMP took over, Loring's articles have been more subdued. This is the reason I sent Wirbel a copy of my offending tech report. http://jya.com/da/whpda.htm Loring has been superhelpful to see that I am not buried in the Great Satan's invisible cemetery. And in one article wrote the paragraph Next in my in-basket was a set of reprints from the Baltimore Sun from the paper's NSA series, which ran in early December. The series reveals the setup by the NSA and CIA of a new covert collection agency, the Special Collection Service, and details the case of Hans Buehler, an employee of Crypto A.G. who was thrown into an Iranian prison after getting snared in a Crypto/NSA sting against that country. http://www.jya.com/whp1.htm which was read by Iranian engineers. A week ago I mailed a copy of the Swiss Radio International tape to http://www.qainfo.se/~lb/crypto_ag.htm Lazlo Baranyi plans to post the audio plus translations of the German at his web site, Baranyi wrote me. I want settlement, my money and out of this crypto mess. Loring Wirbel and EET has been a GREAT HELP. Along with other journalists, including Pulitzer Prize-winner Tamar Stieber, too. bill payne WEED KILLER computer interface proposal section 7/27/98 10:11 AM Solution to controlling and collecting data from the WEED KILLER involves interfacing a personal computer running a version of the Windows operating system to the WEED KILLER analog/digital hardware. Windows is not a real-time operating system, therefore microcontroller controller/collector hardware interface must be installed between a Wintel PC and the WEED KILLER hardware. Essence of the Wintel data collector problem is that Windows 3.x or 9x responds to a hardware interrupt usually between 70 to 150 microseconds. In rare occasions the interrupt latency may extend to 1.5 milliseconds or even longer. A microcontroller responds to an interrupt in several microseconds. Wintel hardware controller interface is even more difficult than collection for the reason that the Windows operating system only gives control to an application when Windows decides. In the collection, mode at least a hardware interrupt signals Windows that the application wants control. However, the microcontroller can send the Wintel an interrupt asking the applications code whether there is any message it needs to send the microcontroller. Microcontrollers have specialized timers, serial expansion ports and are, therefore, designed to be interfaced to analog and digital hardware. An 80C32 family microcontroller is proposed for the WEED KILLER application for reasons. 1 The 80C32 will do the job. 2 Multiple vendors of 80C32 guarantee future supply at a competitive price. Current suppliers include Intel, AMD, Winbond, Dallas, Philips, Siemens, OKI, ATMEL, ... 3 High-speed parallel port bi-directional IEEE 1284 enhanced capability port 9 (ecp) communications hardware between an 80C32 and PC is in the final stage of development. 4 IEEE 1284 hardware drivers are supplied with Windows NT. Custom assembler dll drivers are available for 9x and 3.x. 5 A public-domain Forth 8051 operating system hosting a high-level language and interactive assembler with complete source code documentation is available on Internet. http://jya.com/f86/whpf86.htm Hardcover book further documenting 5 is available from Academic Press. http://www.apcatalog.com/cgi-bin/AP?ISBN=0125475705&LOCATION=US&FORM=FORM2 Only a Wintel machine is required for both hardware and software for the WEED KILLER project. Usually a Forth hardware/software development probject on requres a voltmeter, logic probe, and, infrequently, an oscilloscope. Reason is the INTERACTIVE control of the hardware and software from a PC keyboard and diagnostic information easily printed to a PC monitor. Justification for assertion made in the above paragraph comes from Internet. NASA uses Forth extensively for its space programs. http://groucho.gsfc.nasa.gov/forth/ Ballard used polyForth http://av.yahoo.com/bin/query?p=polyforth&z=2&hc=0&hs=0 to locate wrecks of the Titanic, Bismarck, and Yorktown. http://www.nationalgeographic.com/features/98/midway Sun Microsystems workstation boot into Forth then invokes Solaris. http://playground.sun.com/pub/1275/ Adobe Postscript is a version of Forth. http://www.mactech.com/articles/mactech/language/forth-postscript.html Video game software are written mostly in Forth. The Wintel side of the WEED KILLER project will be most-likely written in a small amount of assembler interface code and Visual Basic. While Forth threaded code software technology is extremely valuable in some settings, it is not in others. Java is a variation of Forth. http://www.mrl.nyu.edu/meyer/jvmref/ Future of Java on Wintel machines is unclear at this time. For example, The hottest items among techies is a browser called Opera. This is a $40 shareware program that in speed and compact size buts both IE and Communicator to shame. It has a slightly different interface from either of the majors - an interface some find refreshing while other find less than useful. As it's shareware, you can try and then buy if you like it. One reason for its speed is that it ignores Java - the Internet's Bandwidth Pig (IBP). The Rumor Mill by Paul Cassel ComputerScene Magazine July 1998 Forth executes code High-level at about 10% the speed of a compiled high-level language. Speed of execution of small applications is not effected by Forth�s slow execution. Reason is that initial code is written in high-level Forth. Inner loops are then translated into Forth assembler. Speed is maintained with the advantage that data structures are created an maintained in high-level language while the interactive operating system is retained for trouble shooting both hardware and software problem. Hardware cost of building the 80C32 the WEED KILLER boards is estimated at $10k. Hardware design is estimated at 1 month labor at $50/hr for a total of $8k. Software development on the 80C32 side in Forth and Forth assembler, software on the Wintel side in Visual Basic and assembler, documentation, and training is estimated to be 4 months for a total of $32k /\/\/\ end From nobody at replay.com Tue Sep 1 08:54:13 1998 From: nobody at replay.com (Anonymous) Date: Tue, 1 Sep 1998 08:54:13 -0700 (PDT) Subject: No Subject Message-ID: <199809011554.RAA09212@replay.com> I believe by spooks he meant that you should go jump off a building before you further insult the intelligence of the rest of the known universe. Lord knows you've already insulted mine enough that I'd be willing to come up there with you and do the pushing. Fucking dolt. At 04:16 PM 8/31/98 -0400, ILovToHack at aol.com wrote: >Ibelive by spooks he ment goverment agents not a racial slur so lay off. > From ptrei at securitydynamics.com Tue Sep 1 10:06:57 1998 From: ptrei at securitydynamics.com (Trei, Peter) Date: Tue, 1 Sep 1998 10:06:57 -0700 (PDT) Subject: Meganet redux... Message-ID: Anyone want to educate these people as to the general consensus on VME? Peter ------------------------------------- http://www.infoseek.com/Content?arn=BW0169-19980901&qt=RSA,+SDTI,+%22Securit y+Dynamics%22,+Informix,+Xerox,+Tandem,+Encryption,+Cryptography,+Authentica tion,+Certification,+%22University+of+Colorado%22&sv=IS&lk=&col=NX&kt=A&ak=n ews1486 Multibillion-Dollar International Corporation Purchases the 1-Million-Bit, Unbreakable Virtual Matrix Encryption to Protect Its Computers 10:01 a.m. Sep 01, 1998 Eastern TARZANA, Calif.--(BUSINESS WIRE)--Sept. 1, 1998-- The $1.2 Million Challenge is Still Uncompromised After Five Months Meganet Corp., which challenged Microsoft (Nasdaq:MSFT), Intel (Nasdaq:INTC), Dell (Nasdaq:DELL), AT&T (NYSE:ATT), NCR (NYSE:NCR) and many other high-tech companies with its unbreakable 1-million-bit Virtual Matrix Encryption (VME), has sold and installed Virtual Matrix Encryption at the headquarters of La-Curacao, a multibillion-dollar international corporation. [...] From FREE82698 at yahoo.com Tue Sep 1 10:07:26 1998 From: FREE82698 at yahoo.com (CF ASSOCIATES) Date: Tue, 1 Sep 1998 10:07:26 -0700 (PDT) Subject: ...Are You In Need Of A Lifestyle Change...? Message-ID: <419.436039.54271910FREE82698@yahoo.com> Now for the first time ever you have the opportunity to join the most extraordinary and most powerful wealth building program in the world! Because of your desire to succeed, you have been given the opportunity to take a close look at this program. If you're skeptical, that's okay. Just make the call and see for yourself. My job is to inform you, your job is to make your own decision. If You Didn't Make $200,000.00 Last Year... You Owe It To Yourself And Your Family To Give Our Program Serious Consideration! Also, when you start making this kind of money within weeks, after joining our team, you will actually learn how you can preserve it and how to strategically invest it! I invite you to call me for more details at 1-800-781-7046 Ext 1137. This is a free 2 minute recording, so call right now! Prosperous regards, Steve Hollander This Is Not Multi Level Marketing/Serious Inquiries Only This is a one-time mailing. When you visited one of our webpages you indicated that you would be interested in this information, if not please excuse the intrusion and simply delete this message. Thank you From mmotyka at lsil.com Tue Sep 1 10:08:04 1998 From: mmotyka at lsil.com (Michael Motyka) Date: Tue, 1 Sep 1998 10:08:04 -0700 (PDT) Subject: BEWARE of SnakeOil (tm) In-Reply-To: <199809010246.WAA26608@cti06.citenet.net> Message-ID: <35EC2A76.2B83@lsil.com> Jean-Francois Avon wrote: > > SNAKEOIL ALERT: > Cc: Cypherpunks at toad.com > > - beware of any product that has not been *extensively* peer-reviewed, with *all* the > source code made public. Security breaches are *very* easy to overlook and no software > should *ever* be used unless it was peer-reviewed. > I'm a bit surprised that I don't see quite as much concern expressed about hardware. If security is the goal isn't HW part of the chain? Yeah, yeah, I know, there was a blip a while ago about Intel chips, Microsoft kernels and keyboard snooping but it had a depressingly short half-life. Seems to me it would be pretty easy to create rfi on a chip and get products through FCC approval with NSA blessing. Hell, you could probably put a good amount of FLASH on a chip and give the OS a nice safe place to store snooped stuff. The security gaps that could be created in an operating system are as numerous as scoundrels in Parliament. > They try pursue anybody who violates ITAR in a public way. If I were to walk with a > PGP diskette across the border outside Cana-USA, I would be liable under ITAR even if I > never wrote a line of software in my life. > Literally true but we all know the analogy of borders and speedbumps... > All the govts have vested interest in disseminating pseudo-strong cryptography. This > statement is not paranoia, it is recent and regularly recurring history. > Doesn't this seem to point to the need for products with a CP seal of approval? HW/SW/Tools? Mike I think that in the secure communications world I would rather be a wolf amongst sheep in wolfskins than a wolf in sheep's clothing. It would reduce the chances of my hide being nailed to the barn door. What I'm trying to say in a less than literate way is that the issue will only be closed when there are $99 consumer products that implement secure systems. From audiophile66 at yahoo.com Tue Sep 1 12:03:17 1998 From: audiophile66 at yahoo.com (Barry M) Date: Tue, 1 Sep 1998 12:03:17 -0700 (PDT) Subject: No Subject Message-ID: <19980901190338.28710.rocketmail@send104.yahoomail.com> _________________________________________________________ DO YOU YAHOO!? Get your free @yahoo.com address at http://mail.yahoo.com From abcmgroup at bc.sympatico.ca Tue Sep 1 13:25:07 1998 From: abcmgroup at bc.sympatico.ca (pagewstuff) Date: Tue, 1 Sep 1998 13:25:07 -0700 (PDT) Subject: Child-Molesting Forger's Chilling Confession!!!1! Message-ID: <199809012024.NAA18437@mail1.bctel.ca> Encrypted_Message=On 4 May 1998 02:57:07 GMT, in article <6ijaq3$bb1 at news1.panix.com>, Information Security (= Guy Polis ) wrote: # Guy Polis (guy at panix.com, eviljay at bway.net) is a pedophile child # molester who was fired from his consulting position at Salomon Brothers # after he was caught masturbating in his cubicle at the child pornography # JPEGs that he downloaded from the Internet. The poster's been awful quiet lately - did the feds arrest him? Browser=Netscape:Mozilla/3.01C-SYMPA (Win16; I) Remedy=Tell the world From abcmgroup at bc.sympatico.ca Tue Sep 1 13:25:39 1998 From: abcmgroup at bc.sympatico.ca (pagewstuff) Date: Tue, 1 Sep 1998 13:25:39 -0700 (PDT) Subject: Child-Molesting Forger's Chilling Confession!!!1! Message-ID: <199809012025.NAA19524@mail1.bctel.ca> A non-text attachment was scrubbed... Name: not available Type: application/x-www-form-urlencoded Size: 34 bytes Desc: not available URL: From abcmgroup at bc.sympatico.ca Tue Sep 1 13:25:47 1998 From: abcmgroup at bc.sympatico.ca (pagewstuff) Date: Tue, 1 Sep 1998 13:25:47 -0700 (PDT) Subject: Child-Molesting Forger's Chilling Confession!!!1! Message-ID: <199809012025.NAA19697@mail1.bctel.ca> A non-text attachment was scrubbed... Name: not available Type: application/x-www-form-urlencoded Size: 34 bytes Desc: not available URL: From CTIA_Daily_News at um2.unitymail.com Tue Sep 1 13:43:19 1998 From: CTIA_Daily_News at um2.unitymail.com (CTIA Daily News) Date: Tue, 1 Sep 1998 13:43:19 -0700 (PDT) Subject: CTIA Daily News from WOW-COM - September 1, 1998 Message-ID: <199809012041.PAA10746@revnet3.revnet.com> ========================================== Welcome to today's edition of the CTIA Daily News from WOW-COM.� Please click on the icon / attachment for the most important news in wireless communications today. A new multi-billion dollar industry is here! Be at CTIA's WIRELESS I.T. '98 where personal computing and communications converge! Don't Miss Your Chance -- October 12-14, 1998 Bally's Las Vegas, Las Vegas, NV For more information, visit http://www.wirelessit.com� =========================================== -------------- next part -------------- A non-text attachment was scrubbed... Name: bin00010.bin Type: application/octet-stream Size: 12476 bytes Desc: "_CTIA_Daily_News_19980901a.htm" URL: From stuffed at stuffed.net Tue Sep 1 14:39:44 1998 From: stuffed at stuffed.net (STUFFED NEWS DAILY) Date: Tue, 1 Sep 1998 14:39:44 -0700 (PDT) Subject: FONDLE ME BILL: HILARIOUS NEW DOLL/OVER TWO DOZEN FREE JPEGS Message-ID: <19980901194916.18753.qmail@eureka.abc-web.com> The pics just keep on coming. And so do the amazin but true news stories, as well as all the other goodies... + 28+ FREE HI-RES JPEGS + PAGE 2 �SPREAD� - YOU'LL LOVE THIS ONE + BEDDER SEX: WORKERS SPRING TO ACTION + HEAVEN'S GATE ANALYZED BY DR. SUSAN BLOCK PHD + MILE HIGH STUCK: PALAVER ON A PLANE + TOP 10 MALE & FEMALE FANTASIES: THIS IS HOT! + PANTY SPICE: WE SNIFF OUT A GREAT STORY + THUMBNAIL HEAVEN: MORE STUPENDOUS FREE JPEGS + TODAY'S SEXY STORY: �THE SWITCH� + YOUR TRUE SEX SECRETS: TODAY A SELECTION OF YOUR LETTERS + MORE OF THE BEST WEB SITES EVER REVIEWED IN EUREKA! + SEXY SURPRISE THUMBS: A SURPRISE WITH EACH CLICK + SUPER HI-RES POSTER PIC: SAVE OR PRINT IT! ----> http://stuffed.net/98/9/1/ <---- Welcome to today's issue of Stuffed. To read it you should click on the URL above. If it is not made clickable by your email program you will need to use your mouse to highlight the URL, copy it and then paste it into your browser (then press Return). This email is never sent unsolicited. Stuffed is the supplement for the Eureka newsletter you subscribed to. Full instructions on unsubscribing are in every issue of Eureka! ----> http://stuffed.net/98/9/1/ <---- From lodi at well.com Tue Sep 1 19:15:33 1998 From: lodi at well.com (Alia Johnson) Date: Tue, 1 Sep 1998 19:15:33 -0700 (PDT) Subject: toto Message-ID: My brother, Carl E. Johnson aka C.J.Parker aka toto has asked me to let you know that he is in prison in Florence, Arizona near Tucson under federal charges of threatening the life of a federal officer. He was being followed in connection with the Jim Bell case. He is in medical lockup and isolation, without the meds he needs for his condition of Tourettes' syndrome. He is suffering but not incoherent. He asked me to mention Cafe Gulag and John Young, but had to speak very briefly so I do not know exactly what is happening. He is scheduled for a hearing in federal court in Tucson on September 4, this Friday. I may be there. Alia Johnson From billp at nmol.com Tue Sep 1 19:25:38 1998 From: billp at nmol.com (bill payne) Date: Tue, 1 Sep 1998 19:25:38 -0700 (PDT) Subject: Rumsfeld Commission report & conclusions Message-ID: <35ECAB77.299D@nmol.com> Tuesday 9/1/98 7:54 PM John Young Nice to talk to you TWICE tonight. I did not realize the importance of the documents I was given until I read them. >From page 3 The Rumsfeld Commission - the commission to Assess the Ballistic Missile Threat to the United Sates . Donald Rumsfeld . Larry Welch . Bill Schneider . Bill Graham . Bary Bleckman . Richard Garwin . Lee Butler Page 14 reads A quick walk around the globe: Iran . Placing exgraordinary interest in its WMD and ballistic missile programs . Program benefite from a broad, long-time assistance from Russia. . Development program have taken on a new phase - getting Russia's most modern equipement. . Getting assistance from China, North Korea, Pakistan as well. . Able to pay well for military technology - in $. ... and ALL OF THIS IS AUTHORED BY Sandia President C Paul Robinson! Who I saw on CBS TV tonight! Durham H. B. Durham who served as project leader; http://jya.com/da/whpda.htm served as Robinson's technical advisor in Geneva. Hope jya.com readers enjoy. I will put the document in an express mailer to you. Let�s all hope for settlement before this matter gets worse. bill From charlsye at worldnet.att.net Tue Sep 1 20:32:59 1998 From: charlsye at worldnet.att.net (MD Dodson) Date: Tue, 1 Sep 1998 20:32:59 -0700 (PDT) Subject: mailing list Message-ID: <19980902033224.JLEB28209@default> how do I join? -----BEGIN PGP SIGNATURE----- Version: PGP for Personal Privacy 5.0 Charset: noconv iQA/AwUBNca0hLNh2iowZ/KwEQKxxQCgzKYsHhEE71BD9cAV/ODXu9fSqs0Anipr uLAbQMdQzZIMP0qZcp5nDwnD =GVxP -----END PGP SIGNATURE----- From marcmf at 2xtreme.net Tue Sep 1 21:00:33 1998 From: marcmf at 2xtreme.net (Marc Maffei) Date: Tue, 1 Sep 1998 21:00:33 -0700 (PDT) Subject: Message-ID: <02cf01bdd623$7fbaf440$532c15d1@marcmaff> hurray and I am also sorry to give this thread a longer lease in life but hip hip hurray for the suggestion -----Original Message----- From: jkthomson To: ILovToHack at aol.com ; cypherpunks at toad.com Date: Monday, August 31, 1998 4:13 PM Subject: Re: >At 04:16 PM 8/31/98 EDT, ILovToHack at aol.com wrote: >>Ibelive by spooks he ment goverment agents not a racial slur so lay off. > >trust me, it's ok, he was using '32-bit AOL' to post his message, so >EVERYONE but you realized that he was talking about garbage anyway. maybe >AOL64 will have a clue(tm) built in. > > >an appeal to listmembers: > >listmembers, can't we make this list 'request for access'? iLoV2HaCk and >his AOL ilk are getting a little too 'elite' and 'k-rad' for me. pipebombs, >posters, spooks, music, what the hell is happening to this list? I know >that I mainly lurk, but don't you think that having to request to join this >list may filter out the worst of the AOL (et al) newbies? they obviously >cannot get a clue(tm) and continue to cause a landslide of off-topic >(albeit funny) posts that ridicule them, and keep this list awash in >non-cypherpunkish dialogue. > >oh, and I am also sorry for perpetuating this thread. > > > > >----------------------------------------------------------------------- > james 'keith' thomson www.bigfoot.com/~ceildh > jkthomson:C181 991A 405C EAFB 2C46 79B5 B1DC DB78 8196 122D [06.07.98] > ceildh :1D79 59AF ED75 5945 6003 8240 DA34 ACCA 9DE4 6BC9 [05.14.98] > ICQ:746241 at pgp.mit.edu ...and former sysop of tnbnog BBS >----------------------------------------------------------------------- >The people to worry about are not those who openly disagree with you, >but those who disagree with you who are too cowardly to let you know. >======================================================================= > > From marcmf at 2xtreme.net Tue Sep 1 21:03:04 1998 From: marcmf at 2xtreme.net (Marc Maffei) Date: Tue, 1 Sep 1998 21:03:04 -0700 (PDT) Subject: DES Ecryption Message-ID: <02de01bdd623$dbe29160$532c15d1@marcmaff> The exception that proves the rule -----Original Message----- From: FTPPork at aol.com To: cypherpunks at toad.com Date: Monday, August 31, 1998 5:08 PM Subject: DES Ecryption >Hey, could anyone tell me what process DES Encryption goes through, or point >me to a site with the information? > >Thanx >-Buzz- >P.S. Please no flames because I am on AOL... > > From rah at shipwright.com Tue Sep 1 21:22:22 1998 From: rah at shipwright.com (Robert Hettinga) Date: Tue, 1 Sep 1998 21:22:22 -0700 (PDT) Subject: toto In-Reply-To: Message-ID: At 10:15 PM -0400 on 9/1/98, Alia Johnson wrote: > My brother, Carl E. Johnson aka C.J.Parker aka toto has asked me to let > you know that he is in prison in Florence, Arizona near Tucson under > federal charges of threatening the life of a federal officer. Oh, boy... Here we go again. Cheers, Bob Hettinga ----------------- Robert A. Hettinga Philodox Financial Technology Evangelism 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From ckzbyfaxzzz at sprintmail.com Tue Sep 1 22:37:51 1998 From: ckzbyfaxzzz at sprintmail.com (ckzbyfaxzzz at sprintmail.com) Date: Tue, 1 Sep 1998 22:37:51 -0700 (PDT) Subject: $39-700 Engines Message-ID: <199809020404.VAA02153@littonlcs.com> ___________________________________________________________ ***EXTENDED FOR ONE MORE WEEK**** !!! 700 SEARCH ENGINES MI5 HOME PAGE OR BUSINESS SITE!!!!!!!!************* HURRY...THIS SPECIAL PRICE WON'T LAST LONG!!!!! ONLY $39 (WE HAVE TAKEN THE WORRY OUT OF INTERNET TRANSACTIONS ---SEE BELOW) Thats right, this is not a mistake, we will submit your Website to 700 search engines and directories for $39. !!!!!PLUS WE WILL PROVIDE YOU WITH A REPORT SHOWING ALL SUCCESFULL SUBMISSIONS!!!! Just print out the form below and fax it us us for immediate processing. (Do not reply via e-mail) Name: Name of Company: Address: Site URL: http:// E-mail Address: Title of site: (25 words or less) Description of site: (50 words or less) Keywords: (6 total, most important first) Phone Number: Payment can be made by faxing a copy of your check to 714 768-3650 payable to: K.L.E.N.T. (we will import the information from your check into our check processing software for deposit into our bank, no need to mail check). Or, you can pay by credit card, just fill out information and fax your info to us and we will contact you and give you our secure URL for credit card transactions...DO NOT INCLUDE CREDIT CARD INFO ON THIS FORM!! If you wish information, please fax this form with your phone number that you can be reached and one of our agents will contact you.. Worry free transaction---upon receipt of your faxed check (make out to K.L.E.N.T. ) we will submit your site within 48 hours...it takes anywhere from 5-10 days for your faxed check to clear your bank. If we do not do as we say, you would have plenty of time to stop payment on your check. Now, we are in the position of trusting you, as we have already done the work and your check has not even been paid...sorry to say that we do on occasion get a NSF check, however there are many more people that are honorable and do not stick us with a NSF check after we have done the work. Credit card holders are always protected against non-delivery of product or service through the credit card companys, now we protect our customers that pay by check as well...I don�t think you will find many companys that will do what we are doing in order to protect the consumer.. We have been in business for about 3years dealing on the internet and know how frustrating it can be dealing with someone you don�t even know. I hope that our offer creates the validity needed in order to provide you with the service that we provide our customers. Ken MI5 K.L.E.N.T. P.S. Reservations will only be accepted with paid orders......Thank You! Please fax a copy of your check along with the above form.... From s9812127 at postino.up.ac.za Wed Sep 2 01:49:47 1998 From: s9812127 at postino.up.ac.za (s9812127 at postino.up.ac.za) Date: Wed, 2 Sep 1998 01:49:47 -0700 (PDT) Subject: STRESS relief Message-ID: > > This is guaranteed to alleviate pressure in the > > boomboom area of your head, > > > > HOLD THE DOWN ARROW AND KEEP GOING > > > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi peopl e > > * hi peopl e > > * hi peopl e > > * hi peop l e > > * hi peop l e > > * hi peop l e > > * hi peop l e > > * hi peo p l e > > * hi peo p l e > > * hi peo p l e > > * hi peo p l e > > * hi pe o p l e > > * hi pe o p l e > > * hi pe o p l e > > * hi pe o p l e > > * hi p e o p l e > > * hi p e o p l e > > * hi p e o p l e > > * hi p e o p l e > > * hi p e o p l e > > * hi p e o p l e > > * hi p e o p l e > > * h i p e o p l e > > * h i p e o p l e > > * h i p e o p l e > > * h i p e o p l e > > * h i p e o p l e > > * h i p e o p l e > > * h i p e o p l e > > * h i p e o p l e > > * h i p e o p l e > > * h i p e o p l e > > * h i p e o p l e > > * h i p e o p le > > * h i p e o p le > > * h i p e o p le > > * h i p e o p le > > * h i p e o ple > > * h i p e o ple > > * h i p e o ple > > * h i p e o ple > > * h i p e ople > > * h i p e ople > > * h i p e ople > > * h i p e ople > > * h i p eople > > * h i p eople > > * h i p eople > > * h i p eople > > * h i people > > * h i people > > * h i people > > * h i people > > * h i people > > * h i people > > * h i people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi p e ople > > * hi p e ople > > * hi p e ople > > * hi p e ople > > * hi p e ople > > * hi p e ople > > * hi p e ople > > * hi p e ople > > * hi p e ople > > * hi p e ople > > * hi p e ople > > * hi p e ople > > * hi p e ople > > * hi p e ople > > * hi p e ople > > * hi p e ople > > * hi p e ople > > * hi p e ople > > * hi p e ople > > * hi p e ople > > * hi p e ople > > * hi p e ople > > * hi p e ople > > * hi p e ople > > * hi p e ople > > * hi p e ople > > * hi p e ople > > * hi p e ople > > * hi p e ople > > * hi p e ople > > * hi p e ople > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi peopl e > > * hi peopl e > > * hi peopl e > > * hi peopl e > > * hi peop l e > > * hi peop l e > > * hi peop l e > > * hi peop l e > > * hi peo p l e > > * hi peo p l e > > * hi peo p l e > > * hi peo p l e > > * hi pe o p l e > > * hi pe o p l e > > * hi pe o p l e > > * hi pe o p l e > > * hi p e o p l e > > * hi p e o p l e > > * hi p e o p l e > > * hi p e o p l e > > * hi p e o p l e > > * hi p e o p l e > > * hi p e o p l e > > * h i p e o p l e > > * h i p e o p l e > > * h i p e o p l e > > * h i p e o p l e > > * h i p e o p l e > > * h i p e o p l e > > * h i p e o p l e > > * h i p e o p l e > > * h i p e o p l e > > * h i p e o p l e > > * h i p e o p l e > > * h i p e o p le > > * h i p e o p le > > * h i p e o p le > > * h i p e o p le > > * h i p e o ple > > * h i p e o ple > > * h i p e o ple > > * h i p e o ple > > * h i p e ople > > * h i p e ople > > * h i p e ople > > * h i p e ople > > * h i p eople > > * h i p eople > > * h i p eople > > * h i p eople > > * h i people > > * h i people > > * h i people > > * h i people > > * h i people > > * h i people > > * h i people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi p e ople > > * hi p e ople > > * hi p e ople > > * hi p e ople > > * hi p e ople > > * hi p e ople > > * hi p e ople > > * hi p e ople > > * hi p e ople > > * hi p e ople > > * hi p e ople > > * hi p e ople > > * hi p e ople > > * hi p e ople > > * hi p e ople > > * hi p e ople > > * hi p e ople > > * hi p e ople > > * hi p e ople > > * hi p e ople > > * hi p e ople > > * hi p e ople > > * hi p e ople > > * hi p e ople > > * hi p e ople > > * hi p e ople > > * hi p e ople > > * hi p e ople > > * hi p e ople > > * hi p e ople > > * hi p e ople > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * hi people > > * aint this cool > > * aint this cool > > * aint this cool > > * aint this cool > > * aint this cool > > * aint this cool > > * aint this cool > > * aint this cool > > * aint this cool > > * a int this cool > > * a int this cool > > * a int this cool > > * a int this cool > > * a i nt this cool > > * a i nt this cool > > * a i nt this cool > > * ai nt this cool > > * ai n t this cool > > * ai n t this cool > > * ai n t this cool > > * ain t this cool > > * ain t this cool > > * ain t this cool > > * aint this cool > > * aint t his cool > > * aint t his cool > > * aint t his cool > > * aint t h is cool > > * aint t h is cool > > * aint t h is cool > > * aint th i s cool > > * aint th i s cool > > * aint th i s cool > > * aint thi s cool > > * aint thi s cool > > * aint thi s cool > > * aint this c ool > > * aint this c ool > > * aint this c ool > > * aint this c o ol > > * aint this c o ol > > * aint this c o ol > > * aint this co o l > > * aint this co o l > > * aint this co o l > > * aint this coo l > > * aint this coo l > > * aint this coo l > > * aint this cool > > * aint this cool > > * aint this cool > > * aint this cool > > * aint this cool > > * aint this cool > > * aint this cool > > * aint this cool > > * aint this cool > > * aint this cool > > * aint this cool > > * aint this cool > > * aint this cool > > * aint this cool > > * aint this cool > > * aint this cool > > * aint this cool > > * aint this cool > > * aint this cool > > * aint this cool > > * aint this cool > > * aint this cool > > * aint this cool > > * aint this cool > > * aint this cool > > * aint this cool > > * aint this cool > > * aint this cool > > * aint this cool > > * aint this cool > > * aint this cool > > * aint this cool > > * aint this cool > > * aint this cool > > * aint this cool > > * STOP SCROLLING > > * STOP SCROLLING > > * STOP SCROLLING > > * STOP SCROLLING > > * STOP SCROLLING > > * STOP SCROLLING > > * STOP SCROLLING > > * STOP SCROLLING > > * STOP SCROLLING > > * STOP SCROLLING > > * STOP SCROLLING > > * STOP SCROLLING > > * STOP SCROLLING > > * STOP SCROLLING > > * STOP SCROLLING > > * STOP SCROLLING > > * STOP SCROLLING > > * STOP SCROLLING > > * STOP SCROLLING > > * STOP SCROLLING > > > > If you liked this, then send it on to 10 other > > people in the next 30 > > minutes and help relieve global stress! > > > > From stuffed at stuffed.net Wed Sep 2 02:34:02 1998 From: stuffed at stuffed.net (STUFFED NEWS DAILY) Date: Wed, 2 Sep 1998 02:34:02 -0700 (PDT) Subject: THE HAZARDS OF EXOTIC DANCING/OVER TWO DOZEN FREE JPEGS Message-ID: <19980902071000.18801.qmail@eureka.abc-web.com> Great reading, super pictures... You get it all! + 21+ FREE HI-RES JPEGS + PAGE 2 �SPREAD� - 'B_E_E_F_Y' + THE 10 COMMANDMENTS OF PLEASURE BY DR. SUSAN BLOCK PHD + EXCLUSIVE: WEB MISTRESS SITE REVIEWS + PEANUT BUTTER PECKER + 18 FOOT PLONKER POOL MISHAP + THUMBNAIL HEAVEN: MORE STUPENDOUS FREE JPEGS + TODAY'S SEXY STORY: �RESTROOM ANTIC� + YOUR TRUE SEX SECRETS: MARINE'S MILE HIGH ADVENTURE + MORE OF THE BEST WEB SITES EVER REVIEWED IN EUREKA! + SEXY SURPRISE THUMBS: A SURPRISE WITH EACH CLICK + SUPER HI-RES POSTER PIC: SAVE OR PRINT IT! ----> http://stuffed.net/98/9/2/ <---- Welcome to today's issue of Stuffed. To read it you should click on the URL above. If it is not made clickable by your email program you will need to use your mouse to highlight the URL, copy it and then paste it into your browser (then press Return). This email is never sent unsolicited. Stuffed is the supplement for the Eureka newsletter you subscribed to. Full instructions on unsubscribing are in every issue of Eureka! ----> http://stuffed.net/98/9/2/ <---- From bbt at mudspring.uplb.edu.ph Wed Sep 2 03:58:35 1998 From: bbt at mudspring.uplb.edu.ph (Bernardo B. Terrado) Date: Wed, 2 Sep 1998 03:58:35 -0700 (PDT) Subject: toto In-Reply-To: Message-ID: After all the warnings! thay still do it. Anyway that's life. @@@@@@@@@@@@@ *************** ** @ @ ** ** ^ ** ** U ** *************** *********** To do the right thing(s) for the wrong reason(s) is human, To do the right thing(s) for the right reason(s) is divine. metaphone at altavista.net On Wed, 2 Sep 1998, Robert Hettinga wrote: > At 10:15 PM -0400 on 9/1/98, Alia Johnson wrote: > > > > My brother, Carl E. Johnson aka C.J.Parker aka toto has asked me to let > > you know that he is in prison in Florence, Arizona near Tucson under > > federal charges of threatening the life of a federal officer. > > Oh, boy... Here we go again. > > Cheers, > Bob Hettinga > ----------------- > Robert A. Hettinga > Philodox Financial Technology Evangelism > 44 Farquhar Street, Boston, MA 02131 USA > "... however it may deserve respect for its usefulness and antiquity, > [predicting the end of the world] has not been found agreeable to > experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' > From billp at nmol.com Wed Sep 2 06:12:11 1998 From: billp at nmol.com (bill payne) Date: Wed, 2 Sep 1998 06:12:11 -0700 (PDT) Subject: AES and The Game Message-ID: <35ED42EF.7D85@nmol.com> Wednesday 9/2/98 6:26 AM J Orlin Grabbe http://www.aci.net/kalliste/ I'm going to write an article for The Laissez Faire City Times http://zolatimes.com/ Black and White Test of Cryptographic Algorithms I have what I want to write CLEARLY in mind. THINKING before DOING works better than the CONVERSE. But this takes time, of course. How much $s would such an article be worth? We have to keep in mind WHY we are doing all of this. Like what Baranyi is doing at http://www.qainfo.se/~lb/crypto_ag.htm I will write when I take breaks from debugging and documenting digital FX hardware. $s, again. The digital FX was HOPEFULLY very well thought-out and will work reliably in the field. Here are SOME of my references. --- *AES* http://www.aci.net/kalliste/cryptnum.htm http://csrc.nist.gov/encryption/aes/aes_home.htm http://www.ii.uib.no/~larsr/bc.html http://www.jya.com/frog-hack.htm http://csrc.nist.gov/encryption/aes/round1/docs.htm http://www.jya.com/aes-mail.htm http://www.softwar.net/hist.html http://www.aci.net/kalliste/speccoll.htm http://caq.com/cryptogate http://jya.com/whpfiles.htm http://www.qainfo.se/~lb/crypto_ag.htm HOLLYWOOD (October, 1997) -- London Records is pleased to announce the release of Howard Shore's original motion picture score to The Game, starring Michael Douglas and Sean Penn. The film is a thriller directed by David Fincher (Se7en). "The Game" is what begins when a high-powered businessman named Nicholas Van Orton (Douglas) receives the birthday gift of a lifetime from his brother he alienated years ago (Penn). What Nicholas gets is entry into a mysterious new form of entertainment provided by C.R.S. (Consumer Recreational Services) simply called "The Game." It proves to be an all-consuming contest with only one rule: there are no rules. By the time Van Orton realizes he is in, it is too late to get out. Laced with intrigue, action and danger beyond belief, The Game ultimately draws to a cataclysmic close, every step bringing Van Orton nearer to an explosive confrontation with what threatens him most. Howard Shore has written a tense and gripping score. The soundtrack features "White Rabbit" performed by the legendary Jefferson Airplane. http://www.movietunes.com/soundtracks/1997/game/ The contemplation of things as they are, without error or confusion, without substitution or imposture, is in itself a nobler thing than a whole harvest of invention. Francis Bacon Stupidity is difficult to underestimate Professor Robert Franklin Wallace - economics Don't search for deeper explanations when stupidity will suffice Professor Melvin Gordon Davidson - physics From billp at nmol.com Wed Sep 2 08:38:29 1998 From: billp at nmol.com (bill payne) Date: Wed, 2 Sep 1998 08:38:29 -0700 (PDT) Subject: Sandia president C Paul Robinson’s August 19, 1998 view graphs Message-ID: <35ED654B.189@nmol.com> Wednesday 9/2/98 8:34 AM John Young I mailed you 20 pages of view graphs for Sandia president C Paul Robinson�s August 19, 1998 speech �Looking to the future: A more dangerous world is appearing.� Your readers will likely value the opportunity to ATTEMPT to find out is what on Robinson�s and the US government�s mind. Money is at the heart of motivation, of course. If the US is NOT firing tomahawk missiles SOMEWHERE, then this is BAD for BUSINESS. No PR s being written for replacements. The Tomahawk cruise missile, acquired when Raytheon bought Hughes Aircraft from General Motors Corp. in December for $9.5 billion. Nearly 300 were fired in the Gulf War at Iraqi missile sites, command centers, weapons caches, and other targets. A new version is guided by global positioning satellites, a network of 24 satellites fixed high above the earth and used for navigation. In addition, a General Accounting Office report released last year said that manufacturers' claims for the Tomahawk, Paveway, and other weapons were overstated. Boston Globe, Feb. 18, 1998 Bill Clinton's $100 Million Crusade Against Ken Starr by Charles R. Smith August was an expensive month for the U.S. taxpayer. For example, Bill Clinton shot $100 million on August 20, 1998 at "terrorist" sites in Sudan and Afghanistan. The 79 Tomahawk cruise missiles signaled a new "war" that Bill Clinton decided to declare on terrorism and not to be confused with the $100 million White House "war" on Ken Starr. The cost? Tomahawks cost about $1.4 to $2.1 million each, depending on the model. Moreover, the Tomahawk price tag does not reflect the price of conducting the strike such as logistics, planning, communications, ship, fuel, and sailor time. If one were to add in these figures - the actual strike cost about $1 billion. ... The Tomahawk strike also shows the Clinton administration is as number minded in its war as the Johnson administration was in Vietnam. Million dollar missiles on remote Afghan camps are likely to be no more successful than B-52s against the Ho Chi Minh trail. There is an over-emphasis of "damage assessment" with no regard to whether the bodies were enemy soldiers or innocent bystanders. There is no clear objective and no clear plan for victory. Lesson one learns at Sandia when one GETS THE RIGHT CLEARANCES is that US government creates its own business opportunities. Embassy Bombings Pakistan Gears to Midwife "Get Osama" Operation Will the U.S. Bomb Afghanistan? KARACHI: The arrest and the subsequent statement and evidence provided by a Palestinian arrested in Karachi, soon after his arrival from Nairobi, has pushed US investigators close to declare the Afghanistan-based Saudi millionaire Osama Bin Laden as the man behind the devastating bombings that killed more than 250 people in and around US embassies in Kenya and Tanzania on August 7, officials disclosed here and in interviews from Islamabad. ... The News International Pakistan, August 17, 1998 was SIMPLY GREAT for Sandia Labs business interests as evidenced by Robinson�s August 19th view graphs. Osama Calls on Ummah to Continue Jehad Denies Involvement in Embassy Bombings PESHAWAR: Saudi dissident Osama Bin Laden for the first time on Thursday denied his involvement in the August 7 bombings at the US embassies in Kenya and Tanzania. The 42-year-old Bin Laden contacted this correspondent on satellite phone at 9:00 pm on Thursday to convey his statement through another Islamic leader Dr Ayman Al-Zawahiri, head of Egyptian Islamic Jehad organisation which was held responsible for the murder of Egypt's president Anwar Sadaat. ... The News International Pakistan, August 21, 1998 Sandia supervisor James Gosler When Payne balked, his supervisor said Payne "did not choose his jobs. Rather, Sandia assigns duties to" him. http://www.jya.com/whp1.htm told us, �There are some things the US government does that are SO SECRET they can�t be CLASSIFIED.� Post away ... and let�s continue to hope for settlement of this unfortunate matter. http://www.aci.net/kalliste/speccoll.htm http://caq.com/cryptogate http://jya.com/whpfiles.htm http://www.qainfo.se/~lb/crypto_ag.htm bill From Andrew.Loewenstern at wdr.com Wed Sep 2 09:24:52 1998 From: Andrew.Loewenstern at wdr.com (Andrew Loewenstern) Date: Wed, 2 Sep 1998 09:24:52 -0700 (PDT) Subject: e-mail security at the Onion Message-ID: <9809021625.AA01873@ch1d524iwk> "What are people doing to proctect their messages from prying eyes?" Find Out! http://www.theonion.com/onion3405/infograph_3405.html andrew From jy at jya.com Wed Sep 2 09:59:16 1998 From: jy at jya.com (John Young) Date: Wed, 2 Sep 1998 09:59:16 -0700 (PDT) Subject: toto In-Reply-To: Message-ID: Alia, We've put the court docket on Toto's case at: http://jya.com/cej-bust.htm Also, we've left an inquiry at his attorney's office (who's in LA today) for more information: John G Bogart, Esq 70 W Franklin St Tucson, AZ 85701 (520) 624-8196 Let us know what you learn at the court hearing if you attend and give Toto a hug and kiss (and a handcuff key). Tell him to call me if he can and wants to: (212) 873-8700 John Young ----- To cpunks: I seemed to have misplaced Toto's Cafe Gulag post. I'd appreciate a copy or a pointer. Thanks. From tleininger at moraine.tec.wi.us Wed Sep 2 10:30:55 1998 From: tleininger at moraine.tec.wi.us (tleininger at moraine.tec.wi.us) Date: Wed, 2 Sep 1998 10:30:55 -0700 (PDT) Subject: Cypherpunks HyperArchive Message-ID: <86256673.00601940.00@moraine.tec.wi.us> I would appreciate it if you could help. For some time now I've read the Cypherpunks HyperArchive (http://infinity.nus.sg/cypherpunks/), and now I can't get it. I don't believe it's being blocked on my end - whats up? Thank's for your time. TLL From lodi at well.com Wed Sep 2 11:03:13 1998 From: lodi at well.com (Alia Johnson) Date: Wed, 2 Sep 1998 11:03:13 -0700 (PDT) Subject: toto In-Reply-To: Message-ID: Thank you. CJ's inmate number at CCA is 05 98 7196. The phone there is 520 868 3668. Of course you can't call him, and mail delivered to the prison ten days ago has not reached him.NEW INFO: I JUST CALLED THE ATTORNEY'S OFICE AND HIS SECRETARY INFORMS ME THAT THE HEARING HAS BEEN CANCELLED AND THE JUDGE HAS ORDERED HIM MOVED TO 'AN APPROPRIATE PSYCHIATRIC FACILITY' FOR EVALUATION. THE RUMOR IS THAT THIS IS THE ONE IN SPRINGFIELD, MISSOURI. CJ HAS BEEN INFORMED OF THIS, AND THERE IS ALSO A RUMOR THAT HE IS IN ISOLATION AND NOT ALLOWED TO MAKE PHONE CALLS. I WILL KEEP YOU INFORMED OF FURTHER DEVELOPMENTS. ALIA On Wed, 2 Sep 1998, John Young wrote: > Alia, > > We've put the court docket on Toto's case at: > > http://jya.com/cej-bust.htm > > Also, we've left an inquiry at his attorney's > office (who's in LA today) for more information: > > John G Bogart, Esq > 70 W Franklin St > Tucson, AZ 85701 > (520) 624-8196 > > Let us know what you learn at the court hearing > if you attend and give Toto a hug and kiss (and a > handcuff key). Tell him to call me if he can and wants > to: > > (212) 873-8700 > > John Young > > ----- > > To cpunks: I seemed to have misplaced Toto's Cafe > Gulag post. I'd appreciate a copy or a pointer. Thanks. > > > > > From mmotyka at lsil.com Wed Sep 2 11:54:41 1998 From: mmotyka at lsil.com (Michael Motyka) Date: Wed, 2 Sep 1998 11:54:41 -0700 (PDT) Subject: Cypherpunks HyperArchive In-Reply-To: <86256673.00601940.00@moraine.tec.wi.us> Message-ID: <35ED94D6.7416@lsil.com> tleininger at moraine.tec.wi.us wrote: > > I would appreciate it if you could help. For some time now I've read the > Cypherpunks HyperArchive > (http://infinity.nus.sg/cypherpunks/), and now I can't get it. I don't > believe it's being blocked on my end - whats up? > Thank's for your time. TLL It has been moved. http://www.inet-one.com/cypherpunks/ I still read it because even though I have subscribed to the list I do not get all of the mail that appears in the hyperarchive. The list so far seems to be only about 40 e-mails each day. Lots of it is easily spotted junk mail. Mike From grace at zk3.dec.com Wed Sep 2 13:00:42 1998 From: grace at zk3.dec.com (Dave Grace) Date: Wed, 2 Sep 1998 13:00:42 -0700 (PDT) Subject: Child-Molesting Forger's Chilling Confession!!!1! Message-ID: <9809021950.AA05168@kamlia.zk3.dec.com> Encrypted_Message=On 4 May 1998 02:57:07 GMT, in article <6ijaq3$bb1 at news1.panix.com>, Information Security (= Guy Polis ) wrote: # Guy Polis (guy at panix.com, eviljay at bway.net) is a pedophile child # molester who was fired from his consulting position at Salomon Brothers # after he was caught masturbating in his cubicle at the child pornography # JPEGs that he downloaded from the Internet. The poster's been awful quiet lately - did the feds arrest him? Browser=Netscape:Mozilla/3.0Gold (X11; I; OSF1 V4.0 alpha) Remedy=Tell the world From joeharlin at hotmail.com Wed Sep 2 13:06:48 1998 From: joeharlin at hotmail.com (joe harlin) Date: Wed, 2 Sep 1998 13:06:48 -0700 (PDT) Subject: toto Message-ID: <19980902200614.28540.qmail@hotmail.com> Alia, I am a little confused. What exactly did you brother do and what would you like us to do? All the best. Joe >Date: Wed, 2 Sep 1998 11:01:10 -0700 (PDT) >From: Alia Johnson >To: John Young >cc: cypherpunks at toad.com >Subject: Re: toto > >Thank you. CJ's inmate number at CCA is 05 98 7196. The phone there is 520 >868 3668. Of course you can't call him, and mail delivered to the prison >ten days ago has not reached him.NEW INFO: I JUST CALLED THE ATTORNEY'S >OFICE AND HIS SECRETARY INFORMS ME THAT THE HEARING HAS BEEN CANCELLED AND >THE JUDGE HAS ORDERED HIM MOVED TO 'AN APPROPRIATE PSYCHIATRIC FACILITY' >FOR EVALUATION. THE RUMOR IS THAT THIS IS THE ONE IN SPRINGFIELD, >MISSOURI. CJ HAS BEEN INFORMED OF THIS, AND THERE IS ALSO A RUMOR THAT HE >IS IN ISOLATION AND NOT ALLOWED TO MAKE PHONE CALLS. I WILL KEEP YOU >INFORMED OF FURTHER DEVELOPMENTS. >ALIA > >On Wed, 2 Sep 1998, John Young wrote: > >> Alia, >> >> We've put the court docket on Toto's case at: >> >> http://jya.com/cej-bust.htm >> >> Also, we've left an inquiry at his attorney's >> office (who's in LA today) for more information: >> >> John G Bogart, Esq >> 70 W Franklin St >> Tucson, AZ 85701 >> (520) 624-8196 >> >> Let us know what you learn at the court hearing >> if you attend and give Toto a hug and kiss (and a >> handcuff key). Tell him to call me if he can and wants >> to: >> >> (212) 873-8700 >> >> John Young >> >> ----- >> >> To cpunks: I seemed to have misplaced Toto's Cafe >> Gulag post. I'd appreciate a copy or a pointer. Thanks. >> >> >> >> >> > > ______________________________________________________ Get Your Private, Free Email at http://www.hotmail.com From grace at zk3.dec.com Wed Sep 2 13:07:30 1998 From: grace at zk3.dec.com (Dave Grace) Date: Wed, 2 Sep 1998 13:07:30 -0700 (PDT) Subject: Child-Molesting Forger's Chilling Confession!!!1! Message-ID: <9809021951.AA06892@kamlia.zk3.dec.com> Encrypted_Message=On 4 May 1998 02:57:07 GMT, in article <6ijaq3$bb1 at news1.panix.com>, Information Security (= Guy Polis ) wrote: # Guy Polis (guy at panix.com, eviljay at bway.net) is a pedophile child # molester who was fired from his consulting position at Salomon Brothers # after he was caught masturbating in his cubicle at the child pornography # JPEGs that he downloaded from the Internet. The poster's been awful quiet lately - did the feds arrest him? Browser=Netscape:Mozilla/3.0Gold (X11; I; OSF1 V4.0 alpha) Remedy=Tell the world From CTIA_Daily_News at um2.unitymail.com Wed Sep 2 13:14:42 1998 From: CTIA_Daily_News at um2.unitymail.com (CTIA Daily News) Date: Wed, 2 Sep 1998 13:14:42 -0700 (PDT) Subject: CTIA Daily News from WOW-COM - September 2, 1998 Message-ID: <199809022011.PAA21866@revnet3.revnet.com> ========================================== Welcome to today's edition of the CTIA Daily News from WOW-COM.� Please click on the icon / attachment for the most important news in wireless communications today. One of your customers just made three really long distance calls.....simultaneously. Have you deployed authentication? CTIA's Wireless Security '98 - It's Just Smart Business. Orlando, Florida � November 9 - 11, 1998 http://www.wow-com.com/professional =========================================== -------------- next part -------------- A non-text attachment was scrubbed... Name: bin00012.bin Type: application/octet-stream Size: 10110 bytes Desc: "_CTIA_Daily_News_19980902a.htm" URL: From glk at idt.net Wed Sep 2 15:00:31 1998 From: glk at idt.net (Glenn Kaggen) Date: Wed, 2 Sep 1998 15:00:31 -0700 (PDT) Subject: New York Metro Coverage Message-ID: <35EDBCB9.36D4@idt.net> Good Day Seafood Colleagues I am looking for additonal products to broker to my customer base of 25 years. My contacts include most New York accounts on all levels, as well as good, solid wholesale companies in Boston, Jessup, Washington, and Philadelphia. Please contact me 6 AM to 9 PM, 7 days a week to discuss details Glenn L Kaggen Tel 516-822-0758 Fax 516-822-0186 Travel # 516-967-0186 email glk at idt.net From nobody at sind.hyperreal.art.pl Wed Sep 2 17:22:15 1998 From: nobody at sind.hyperreal.art.pl (HyperReal-Anon) Date: Wed, 2 Sep 1998 17:22:15 -0700 (PDT) Subject: mailing list Message-ID: On Tue, 1 Sep 1998, MD Dodson wrote: > how do I join? Well, first you inform the refueler of your intention and wait for clearance. You'll be cleared for either the left or the right hose. Pull in behind and deploy your refueling probe if your aircraft has one. Ease it into the basket and hold the aircraft steady until refueling is complete. Another option is to go for a swim inside the refueling tank. You'll join your ancestors quickly. From billp at nmol.com Wed Sep 2 17:39:01 1998 From: billp at nmol.com (bill payne) Date: Wed, 2 Sep 1998 17:39:01 -0700 (PDT) Subject: Girolamo Cardano Message-ID: <35EDE402.1A93@nmol.com> Wednesday 9/2/98 6:19 PM J Orlin Grabbe I HOPE to write one of the MOST DEVASTATING, and deserving, ARTICLES ABOUT CRYPTOGRAPHERS EVER WRITTEN. By introducing to the public: MACHINE COMIBINATORICS I stand on the shoulders on several GIANTS. I searched the web for Cardano. http://www.lib.virginia.edu/science/parshall/cardano.html And one SUPERB mathematician Ore, Oystein. Cardano: The Gambling Scholar. Princeton: University Press, 1956. I may need your help with Zola. YOU understand math, Zola MAY not. Best bill --- Wednesday 9/2/98 6:26 AM J Orlin Grabbe http://www.aci.net/kalliste/ I'm going to write an article for The Laissez Faire City Times http://zolatimes.com/ Black and White Test of Cryptographic Algorithms I have what I want to write CLEARLY in mind. THINKING before DOING works better than the CONVERSE. But this takes time, of course. How much $s would such an article be worth? We have to keep in mind WHY we are doing all of this. Like what Baranyi is doing at http://www.qainfo.se/~lb/crypto_ag.htm I will write when I take breaks from debugging and documenting digital FX hardware. $s, again. The digital FX was HOPEFULLY very well thought-out and will work reliably in the field. Here are SOME of my references. --- *AES* http://www.aci.net/kalliste/cryptnum.htm http://csrc.nist.gov/encryption/aes/aes_home.htm http://www.ii.uib.no/~larsr/bc.html http://www.jya.com/frog-hack.htm http://csrc.nist.gov/encryption/aes/round1/docs.htm http://www.jya.com/aes-mail.htm http://www.softwar.net/hist.html http://www.aci.net/kalliste/speccoll.htm http://caq.com/cryptogate http://jya.com/whpfiles.htm http://www.qainfo.se/~lb/crypto_ag.htm HOLLYWOOD (October, 1997) -- London Records is pleased to announce the release of Howard Shore's original motion picture score to The Game, starring Michael Douglas and Sean Penn. The film is a thriller directed by David Fincher (Se7en). "The Game" is what begins when a high-powered businessman named Nicholas Van Orton (Douglas) receives the birthday gift of a lifetime from his brother he alienated years ago (Penn). What Nicholas gets is entry into a mysterious new form of entertainment provided by C.R.S. (Consumer Recreational Services) simply called "The Game." It proves to be an all-consuming contest with only one rule: there are no rules. By the time Van Orton realizes he is in, it is too late to get out. Laced with intrigue, action and danger beyond belief, The Game ultimately draws to a cataclysmic close, every step bringing Van Orton nearer to an explosive confrontation with what threatens him most. Howard Shore has written a tense and gripping score. The soundtrack features "White Rabbit" performed by the legendary Jefferson Airplane. http://www.movietunes.com/soundtracks/1997/game/ The contemplation of things as they are, without error or confusion, without substitution or imposture, is in itself a nobler thing than a whole harvest of invention. Francis Bacon Stupidity is difficult to underestimate Professor Robert Franklin Wallace - economics Don't search for deeper explanations when stupidity will suffice Professor Melvin Gordon Davidson - physics From bbt at mudspring.uplb.edu.ph Wed Sep 2 18:54:23 1998 From: bbt at mudspring.uplb.edu.ph (Bernardo B. Terrado) Date: Wed, 2 Sep 1998 18:54:23 -0700 (PDT) Subject: Cypherpunks HyperArchive In-Reply-To: <86256673.00601940.00@moraine.tec.wi.us> Message-ID: I too cannot open it. It says in my screen FORBIDDEN well my server is not allowed to access that ~/cypherpunks/ that's why I cannot go to it. One question, the site where it is located, is it a university? What school? Thank you. To do the right thing(s) for the wrong reason(s) is human, To do the right thing(s) for the right reason(s) is divine. metaphone at altavista.net On Wed, 2 Sep 1998 tleininger at moraine.tec.wi.us wrote: > I would appreciate it if you could help. For some time now I've read the > Cypherpunks HyperArchive > (http://infinity.nus.sg/cypherpunks/), and now I can't get it. I don't > believe it's being blocked on my end - whats up? > Thank's for your time. TLL > > > From bbt at mudspring.uplb.edu.ph Wed Sep 2 18:55:34 1998 From: bbt at mudspring.uplb.edu.ph (Bernardo B. Terrado) Date: Wed, 2 Sep 1998 18:55:34 -0700 (PDT) Subject: Cypherpunks HyperArchive In-Reply-To: Message-ID: National University of Singapore > I too cannot open it. > It says in my screen > FORBIDDEN > well my server is not allowed to access that ~/cypherpunks/ > that's why I cannot go to it. > > One question, the site where it is located, is it a university? > What school? > > Thank you. > > > > > To do the right thing(s) for the wrong reason(s) is human, > To do the right thing(s) for the right reason(s) is divine. > > > metaphone at altavista.net > > On Wed, 2 Sep 1998 tleininger at moraine.tec.wi.us wrote: > > > I would appreciate it if you could help. For some time now I've read the > > Cypherpunks HyperArchive > > (http://infinity.nus.sg/cypherpunks/), and now I can't get it. I don't > > believe it's being blocked on my end - whats up? > > Thank's for your time. TLL > > > > > > > > > From lodi at well.com Wed Sep 2 18:55:39 1998 From: lodi at well.com (Alia Johnson) Date: Wed, 2 Sep 1998 18:55:39 -0700 (PDT) Subject: toto In-Reply-To: <19980902200614.28540.qmail@hotmail.com> Message-ID: C.J. was arrested for postings he made involving some kind of betting on the death of certain listed IRS agents. There is nothing in particular we are asking you to do; he just asked me to let people know what is happening. Thanks for asking. Alia Johnson On Wed, 2 Sep 1998, joe harlin wrote: > Alia, > > I am a little confused. > > What exactly did you brother do and what would you like us to do? > > All the best. > Joe > > > > >Date: Wed, 2 Sep 1998 11:01:10 -0700 (PDT) > >From: Alia Johnson > >To: John Young > >cc: cypherpunks at toad.com > >Subject: Re: toto > > > >Thank you. CJ's inmate number at CCA is 05 98 7196. The phone there is > 520 > >868 3668. Of course you can't call him, and mail delivered to the > prison > >ten days ago has not reached him.NEW INFO: I JUST CALLED THE ATTORNEY'S > >OFICE AND HIS SECRETARY INFORMS ME THAT THE HEARING HAS BEEN CANCELLED > AND > >THE JUDGE HAS ORDERED HIM MOVED TO 'AN APPROPRIATE PSYCHIATRIC > FACILITY' > >FOR EVALUATION. THE RUMOR IS THAT THIS IS THE ONE IN SPRINGFIELD, > >MISSOURI. CJ HAS BEEN INFORMED OF THIS, AND THERE IS ALSO A RUMOR THAT > HE > >IS IN ISOLATION AND NOT ALLOWED TO MAKE PHONE CALLS. I WILL KEEP YOU > >INFORMED OF FURTHER DEVELOPMENTS. > >ALIA > > > >On Wed, 2 Sep 1998, John Young wrote: > > > >> Alia, > >> > >> We've put the court docket on Toto's case at: > >> > >> http://jya.com/cej-bust.htm > >> > >> Also, we've left an inquiry at his attorney's > >> office (who's in LA today) for more information: > >> > >> John G Bogart, Esq > >> 70 W Franklin St > >> Tucson, AZ 85701 > >> (520) 624-8196 > >> > >> Let us know what you learn at the court hearing > >> if you attend and give Toto a hug and kiss (and a > >> handcuff key). Tell him to call me if he can and wants > >> to: > >> > >> (212) 873-8700 > >> > >> John Young > >> > >> ----- > >> > >> To cpunks: I seemed to have misplaced Toto's Cafe > >> Gulag post. I'd appreciate a copy or a pointer. Thanks. > >> > >> > >> > >> > >> > > > > > > > ______________________________________________________ > Get Your Private, Free Email at http://www.hotmail.com > > From netmedia12 at hotmail.com Wed Sep 2 22:14:29 1998 From: netmedia12 at hotmail.com (Carl) Date: Wed, 2 Sep 1998 22:14:29 -0700 (PDT) Subject: Sex Story Post Message-ID: <419.436041.05420139netmedia12@hotmail.com> Hi, Carl here from An Alien's Guide to Internet Sex You should not be receiving this email unless you are an adult Webmaster and have submitted a link to Alien's. This is my personal mailing list and was not purchased or acquired by any other means. I would like to announce the opening of my newest website, Sex Story Post: http://www.sexstorypost.com/index.html After only 1 week, Sex Story Post is getting over 6,000 Unique visitors a day. This site is run just like the pic post sites but uses stories instead of pictures. Studies have shown that visitors looking for stories are more likely to produce sign- ups. Why? Who the hell knows, maybe it is because they can read well enough to sign up for a credit card. What does this do for you? Aren't we all looking for quality traffic? Also, there are several sponsors out there that will allow you to post their banner to pic post and STORY POST sites as well. So come, add your story and your banner, and get your share of these great revenue producing surfers. You can go straight to the submit page at: http://www.sexstorypost.com/picpost/add,html Thanks, Carl PS. while you are there add your link to the links page. My Newest site: SEX STORY POST http://www.sexstorypost.com/linkadmin.html Also come add your link to my other pages: Tongue Chow. http://www.tongue-chow.com/main.html Wanker Zone http://www.wankerzone.com/ FREE Hardcore Pics and Erotic Stories http://www.fahking.com/ From nobody at replay.com Wed Sep 2 22:26:09 1998 From: nobody at replay.com (Anonymous) Date: Wed, 2 Sep 1998 22:26:09 -0700 (PDT) Subject: Eternity servers, SSL home pages Message-ID: <199809030526.HAA01214@replay.com> I was just browsing replay and I ran into a server on it called an eternity server, That one wont let me use it because of permissions. I was wondering if there was another one around that has been tested recently. Also I was curious as to whether there were any crypto conscous ISP that let you have a page with SSL cheap if it was just an ifo page and not a commercial site. Any help would be Appreciated. == _________________________________________________________ DO YOU YAHOO!? Get your free @yahoo.com address at http://mail.yahoo.com From axel.bodemer at omp.de Wed Sep 2 23:20:36 1998 From: axel.bodemer at omp.de (Axel Bodemer) Date: Wed, 2 Sep 1998 23:20:36 -0700 (PDT) Subject: list Message-ID: <19980903082028.A28784@omp.de> From martin.. at iname.com Thu Sep 3 00:54:14 1998 From: martin.. at iname.com (martin.. at iname.com) Date: Thu, 3 Sep 1998 00:54:14 -0700 (PDT) Subject: setting up a remailer service Message-ID: <199809030754.DAA01354@web05.iname.net> Yoppa! As I am getting a cable modem installed today, I'd like to set up a free remailer service for the internet community. I have a static IP, good disk space and my machine is located in Norway. Ideally I'd like to do something along the lines of anon.penet.fi. Any tips or suggestions are most welcome, but I'm *not* setting up a warez/porn site or anything like that. Regards .martin --------------------------------------------------- Get free personalized email at http://www.iname.com From rsriram at krdl.org.sg Thu Sep 3 02:43:12 1998 From: rsriram at krdl.org.sg (rsriram at krdl.org.sg) Date: Thu, 3 Sep 1998 02:43:12 -0700 (PDT) Subject: setting up a remailer service Message-ID: <19980903174030.B4271@krdl.org.sg> On Thu, Sep 03, 1998 at 03:54:04AM -0400, martin.. at iname.com wrote: | Yoppa! | | As I am getting a cable modem installed today, I'd like to set up a free remailer service for the internet community. I have a static IP, good disk space and my machine is located in Norway. Ideally I'd like to do something along the lines of anon.penet.fi. Any tips or suggestions are most welcome, but I'm *not* setting up a warez/porn site or anything like that. | | Regards | | .martin Check out MixMaster at ftp.replay.com/pub/replay/remailer/mixmaster From joeharlin at hotmail.com Thu Sep 3 06:01:54 1998 From: joeharlin at hotmail.com (joe harlin) Date: Thu, 3 Sep 1998 06:01:54 -0700 (PDT) Subject: toto Message-ID: <19980903130120.9782.qmail@hotmail.com> Alia, What was he charged with? Does he have a criminal record? Where did he make these postings? Do they think he had anything to do with the death of IRS agents. Be well, Joe ______________________________________________________ Get Your Private, Free Email at http://www.hotmail.com From billp at nmol.com Thu Sep 3 06:35:17 1998 From: billp at nmol.com (bill payne) Date: Thu, 3 Sep 1998 06:35:17 -0700 (PDT) Subject: Zurich trip Message-ID: <35EE99DF.6F6F@nmol.com> Thursday 9/3/98 6:10 AM J Orlin Grabbe http://www.aci.net/kalliste/ Patty and I went to Zurich last April. Implementing Basics : How Basics Work William H. and Patricia Payne / Published 1982 http://www.amazon.com I interviewed for a job at IBM Zurich forschungslabortorium. http://www.zurich.ibm.com/ We left from Atlanta. The Swissair 747 was operated jointly by Delta and Swissair. http://www.swissair.com/ From: "Matthias Kaiserswerth" To: billp at nmol.com Message-Id: Date: Thu, 28 Nov 1996 12:54:38 +0200 Subject: Re: Settlement and talk title Bill, I cannot comment on your legal battles - they seem to be quite difficult and require a great deal of courage if waged against a government. I wish you the best of luck - it sounds like a nightmare or as written by Kafka. Anyway, the title for your talk sounds very interesting. Could you also write up an abstract and make it reasonably technical, because this is what people will be interested in. I'm looking forward, once you have your passport, to arrange a date with you to come here for the interview and to meet us. Kind regards Matthias My talk title was Dangers in High Tech Espionage GETTING CAUGHT, of course, is one DANGER in high tech espionage. http://www.aci.net/kalliste/speccoll.htm http://caq.com/cryptogate http://jya.com/whpfiles.htm http://www.qainfo.se/~lb/crypto_ag.htm Let's all hope for settlement of this UNFORTUNATE MATTER before things GET WORSE. Later bill From lodi at well.com Thu Sep 3 09:13:06 1998 From: lodi at well.com (Alia Johnson) Date: Thu, 3 Sep 1998 09:13:06 -0700 (PDT) Subject: toto In-Reply-To: <19980903130120.9782.qmail@hotmail.com> Message-ID: On Thu, 3 Sep 1998, joe harlin wrote: > Alia, > > What was he charged with? > THREATENING THE LIFE OF A FEDERAL AGENT > Does he have a criminal record? > I DON'T KNOW. > Where did he make these postings? > I'M NOT SURE; IN SOMETHING TO DO WITH JIM BELL'S ASSISINATION POOL I THINK. > Do they think he had anything to do with the death of IRS agents. > I DON'T THINK SO. DID ANYBODY DIE? > Be well, > Joe > > > ______________________________________________________ > Get Your Private, Free Email at http://www.hotmail.com > > From stuffed at stuffed.net Thu Sep 3 11:04:31 1998 From: stuffed at stuffed.net (STUFFED NEWS DAILY) Date: Thu, 3 Sep 1998 11:04:31 -0700 (PDT) Subject: 16% of Americans agree with Clinton: "Oral sex not adultery"/30+ FREE PICS EVERY DAY FROM NOW ON! Message-ID: <19980903140353.9972.qmail@eureka.abc-web.com> OK. The new pictures we ordered are now in, so from now onwards we'll be giving you 30 FREE hi-res jpegs (or more) every single day. That means around 11,000 in a year! Where else will you get this much FREE? That's right, so come back every day for more and more, such as the mpeg videos we'll be giving away FREE soon! PLUS: PAGE 2 'SPREAD', THUMBNAIL HEAVEN, OUTRAGEOUS BUT TRUE SEXY NEWS, HOT STORY - "METER'S RUNNIN'", THE BEST OF EUREKA!, READERS' TRUE SEX SECRETS, SUPER SEXY SURPRISE THUMBS, THUMBNAIL ORGY, ULTRA HI-RES POSTER PIC, & MUCH, MUCH MORE! ----> http://stuffed.net/98/9/3/ <---- Welcome to today's issue of Stuffed. To read it you should click on the URL above. If it is not made clickable by your email program you will need to use your mouse to highlight the URL, copy it and then paste it into your browser (then press Return). This email is never sent unsolicited. Stuffed is the supplement for the Eureka newsletter you subscribed to. Full instructions on unsubscribing are in every issue of Eureka! ----> http://stuffed.net/98/9/3/ <---- From CTIA_Daily_News at um2.unitymail.com Thu Sep 3 12:05:34 1998 From: CTIA_Daily_News at um2.unitymail.com (CTIA Daily News) Date: Thu, 3 Sep 1998 12:05:34 -0700 (PDT) Subject: CTIA Daily News from WOW-COM - September 3, 1998 Message-ID: <199809031858.NAA27527@revnet3.revnet.com> ========================================== Welcome to today's edition of the CTIA Daily News from WOW-COM. Please click on the icon / attachment for the most important news in wireless communications today. One of your customers just made three really long distance calls.....simultaneously. Have you deployed authentication? CTIA's Wireless Security '98 - It's Just Smart Business. Orlando, Florida � November 9 - 11, 1998 http://www.wow-com.com/professional =========================================== Title: _CTIA Daily News From WOW-COM_ � � CTIA Daily News from WOW-COM - September 3, 1998 CTIA Adds Internet Y2K Site for Wireless Industry The Cellular Telecommunications Industry Association has added a new section to its web site dealing with the Year 2000 computer problem.� The site is designed to be a resource regarding Y2K and the wireless industry. (WOW-COM) Audiovox FoneFinder Phone Will Track Callers' Locations For 911 Centers Audiovox's new phone to be released in November will assist 911 centers by dispatching the caller's precise latitude and longitude by using global positioning satellite service.� The Audiovox FoneFinder can be used with any wireless service provider without additional fees for calls that use the GPS feature. (SFGATE) Virginia Beach Tower Siting Decision Issued by Federal Appeals Court� United States Fourth Circuit Court issues decision supporting city council in a tower dispute. (PILOT) (EMORY) The Michigan Technology Commission's New Survey Reveals That More Than 50 Percent of 1000 People Surveyed Are Cell Phone Users. According to the survey, the number of cell phone users in Michigan well exceeds the national average of 39 percent.� Participants were selected from within the Detroit City limits and tri-county suburbs. (FREEPRESS) Veridian Acquires Datumtech�s North American Operations Veridian, parent company of Calspan Operations, announced that the company has acquired Datumtech's North American operations.� The acquisition creates one of the leading providers of automatic vehicle location systems and mobile data terminals serving the public safety, commercial and consumer markets. (WOW-COM) Spyglass Develops The "Device Mosaic Web browser" For Portable Devices. The "Device Mosaic Web browser'' is Spyglass's new Web browser for Microsoft's Windows CE operating system devices.� This web browser provides more creativity in development applications. (FOXNEWS) Ongoing Internet Battles Have Made Their Way To Handheld Devices Handheld computers are the latest in the battle for internet browsing despite the slow pace of wireless modems.� Small software companies have begun producing Web access solutions for use in handheld devices. (BOSTON) (FOXNEWS) Telecommunications Merger Between SNET and SBC Communications Southern New England Telecommunications Corporation's merger with SBC Communications Inc. of San Antonio was approved yesterday by the Connecticut Department of Public Utility Control. (BOSTON) Year 2000 Presents Financial Worries for Federal Agencies� Clinton administration officials estimate the Year 2000 computer problems for federal agencies to cost $5.4 billion in repairs.� The Clinton Administration is working with Telecommunications groups to protect companies fearful of sharing data that my later be used against them in liability lawsuits. (WASHPOST) For additional news about the wireless industry - including periodic news updates throughout the day - visit http://www.wow-com.com. CTIA Daily News from WOW-COM is transmitted weekdays, except for holidays.� Visit us on the World Wide Web at http://www.wow-com.com/professional. Please Note: Some of the links in today's news are time sensitive.� Those links may not be available as news changes throughout the day.� Also, some news sources may be subscription-based or require registration. � CTIA Daily News from WOW-COM is transmitted weekdays, except for holidays. Visit us on the World Wide Web at http://www.wow-com.com/professional.�� If you are not interested in receiving the CTIA Daily News from WOW-COM, please send a message to unjoin-CTIA_Daily_News at um2.unitymail.com.�� *** The term "unjoin-CTIA_Daily_News at um2.unitymail.com" must be listed in the TO section of the email. ***� Please Note: Some of the links in today's news are time sensitive.� Those links may not be available as news changes throughout the day.� Also, some news sources may be subscription-based or require registration. � From billp at nmol.com Thu Sep 3 19:38:52 1998 From: billp at nmol.com (bill payne) Date: Thu, 3 Sep 1998 19:38:52 -0700 (PDT) Subject: diplomacy Message-ID: <35EF519A.51D1@nmol.com> Zola http://zolatimes.com/ I faxed the abstract to Grabbe. Young's fax did not answer. There are, I think, some crytpo problems posted at http://www.jya.com/crypto.htm http://www.cl.cam.ac.uk/~fapp2/papers/ec98-erl/ Problems should, of course, be pointed out with diplomacy characterized in http://www.aci.net/kalliste/apocalyp.htm Later bill Black and White Test of Cryptographic Algorithms Abstract Purpose of this article is to explain the underlying principles of cryptography by examples and explain why some criteria should be met by cryptographic algorithms for serious consideration of adoption. revision date time author reason 0 9/3/98 6:49 PM wh payne first draft From billp at nmol.com Thu Sep 3 20:04:49 1998 From: billp at nmol.com (bill payne) Date: Thu, 3 Sep 1998 20:04:49 -0700 (PDT) Subject: The Great Satan Message-ID: <35EF579F.5FFF@nmol.com> Thursday 9/3/98 8:53 PM Greg Broiles gbroiles at netbox.com I read http://www.jya.com/jdb-9ca-gb.htm One has to be careful with the great satan. Perhaps one needs a GOOD lawyer? http://www.mgovg.com/ethics/index.html I lived in the basement appartment of the Luce's home in Walla Walla during my jr/sr at Whitman college 1958/59. Charlie JR was in the 'goo'- rug rat stage when I met him. bill Subject: diplomacy Date: Thu, 03 Sep 1998 20:34:02 -0600 From: bill payne To: eZola at LFCity.com, cypherpunks at toad.com, ukcrypto at maillist.ox.ac.uk, biham at cs.technion.ac.il, even at cs.technion.ac.il, wpi at wpiran.org, abd at CDT.ORG, merata at pearl.sums.ac.ir, lawya at lucs-01.novell.leeds.ac.uk, sjmz at hplb.hpl.hp.com, georgefoot at oxted.demon.co.uk CC: jy at jya.com, john gilmore , j orlin grabbe , Ross.Anderson at cl.cam.ac.uk, Vaclav.Matyas at cl.cam.ac.uk, fapp2 at cl.cam.ac.uk Zola http://zolatimes.com/ I faxed the abstract to Grabbe. Young's fax did not answer. There are, I think, some crytpo problems posted at http://www.jya.com/crypto.htm http://www.cl.cam.ac.uk/~fapp2/papers/ec98-erl/ Problems should, of course, be pointed out with diplomacy characterized in http://www.aci.net/kalliste/apocalyp.htm Later bill Black and White Test of Cryptographic Algorithms Abstract Purpose of this article is to explain the underlying principles of cryptography by examples and explain why some criteria should be met by cryptographic algorithms for serious consideration of adoption. revision date time author reason 0 9/3/98 6:49 PM wh payne first draft From nue84 at mci2000.com Thu Sep 3 23:55:42 1998 From: nue84 at mci2000.com (Goodmail...Inc.) Date: Thu, 3 Sep 1998 23:55:42 -0700 (PDT) Subject: Complete E-mail Business.. Message-ID: <199809033952BAA54769@cash.cedarnet.net> ************************************************ THE MOST INCREDIBLE CD EVER OFFERED FOR SALE TO MAKE UNLIMITED INCOME!!!!!! ************************************************ At a price you won't believe! LOOK! >>60 Million E-Mail Addresses >>PLUS<< >>500 "How To" Reports >>7 Bulk Mail Tools & Programs >>Over 50 Business Help Reports >>300 Money Making Secrets & Sources >>100 FREE Magazines >>Juno - FREE E-Mail >>McAfee - Viruscan >>WinZip 95 and so much more! TAKE A CLOSER LOOK! 1. 60 Million E-Mail Addresses. Virtually everyone on line, including: > AOL > Compuserve > Prodigy > AT&T and more....................................................................... 2. Seven Bulk Mail Tools and Programs, including: > Stealth > Pegasus > Goldrush - The most powerful e-mail program today > Floodgate - The best e-mail address extraction program > WinZip 95 - Open any zip files and manage them > Extract =============================================================== NOT BULK MAILING???? GET RICH ON ALL THE POWERFUL MONEY MAKING INFORMATION INCLUDED IN THIS CD...ANYWAY YOU WANT TO USE IT!!!! =============================================================== 3. 500 "How To" Business Reports. Each sold on the Internet for as much as $100 each. Full resale rights available, make a fortune on this information alone. INFORMATION IS POWER! Some of these reports include: > How to Earn Extra Cash Using Your Computer > How to Improve Your Credit > How to Increase Your Cash Flow > How to Place Your Ads on the Internet > How to Get FREE Advertising > How to Become "Audit Proof" > Plus, Women & Credit =============================================================== NO MATTER WHO YOU ARE OR WHAT YOU'RE DOING NOW, THE INFORMATION IN THE 500 "HOW TO" REPORTS ALONE IS PRICELESS!!! =============================================================== 4. 300 Money Making Secrets. Some include: > Selling products on a floppy disc > Powerful ad layouts > "There's Gold Inside Your PC" > Directory of FREE Business Sources > Making Your Own Products and many, many more profitable reports!!!! 5. How To Get FREE Subscriptions to over 100 magazines. Some include: > Monetary Trends > Money Making Opportunities > Business Education World and many more! 6. WinZip 95 Wizard. Will enable you to unzip and open zip files as well as zip and close. Features include: > Fast access to zip files in your favorite zip files > Auto install of software distribution in zip files > Fast, easy unzipping 7. Juno - FREE E-Mail service information. Juno is an e-mail service that allows you to receive and send e-mail anytime, absoulutely FREE. All sign up information is included. AND MORE!!!! IF YOU CAN'T MAKE MONEY WITH THIS CD, YOU DON'T WANT TO!!!!! ONE INCREDIBLE CD FOR ONE INCREDIBLE LOW PRICE OF ONLY................ $199.00 (+ $3.80 shipping & handling) ORDER NOW, YOU WON'T EVER SEE AN OFFER LIKE THIS AGAIN!!!!!! 1. Phone orders. Call (904) 721-9950, 24 hours per day, seven days per week. 2. Mail your check or money order to: Kellner Enterprises P.O. Box 17834 3650 Southside Blvd. Jacksonville, FL 32245-7834 3. All major credit cards accepted. Please complete the order form below and fax to (904) 721-0431 or mail credit card information to the address listed above. <<<<<<<<<<<<<<>>>>>>>>>>>>>>>>>>> Type of Credit Card:_____________________________________________________ Expiration Date:_________________________________________________________ Name on Credit Card:____________________________________________________ Credit Card Number:_____________________________________________________ Billing Address:__________________________________________________________ City___________________ State:____________________ Zip Code:________ Shipping Address (if different then above):___________________________________ City___________________ State:____________________ Zip Code:________ Phone Number with area code: (____) _______________________________________ E-Mail Address:_________________________________________________________ All orders will be shipped within 24 hours via First Class Mail, or priority overnight (via FedEx) Amount Due: $199.00 Add $3.80 S&H or $15.00 Fed Ex: $______ Total Amount Due: $______ ________________________________________ Signature of Cardholder DON'T WAIT, ORDER TODAY!!!!! THIS IS A ONE TIME OFFER!!!! This message is sent in compliance with the new e-mail bill: Per Section 301. Paragraph (a)(2)(c) of S. 1618; All further e-mail sent to this address will be stopped by simply sending a reply to this address with the word REMOVE, in the message box. All requests are processed immediately. proces From stuffed at stuffed.net Fri Sep 4 01:56:58 1998 From: stuffed at stuffed.net (STUFFED NEWS DAILY) Date: Fri, 4 Sep 1998 01:56:58 -0700 (PDT) Subject: Babes behind bars: Jailbabes looking for men/Over 30 Hi-Res, ultra-hot jpegs - FREE! Message-ID: <19980904071000.23727.qmail@eureka.abc-web.com> We've been beavering away (we wish :) to bring you today's superb issue. It's packed with the best FREE photos, funny (but true) sexy news, and so much more! ALSO IN THIS ISSUE: PAGE 2 'SPREAD'; THUMBNAIL HEAVEN; ALL JAZZ AND NO JIZZ; RUSSIAN FOR LOVE; MORE THUMBS; SEXY STORY "SPECIAL DELIVERY"; THE BEST OF EUREKA!; READERS' TRUE SEX SECRETS; EVEN MORE THUMBS; SEXY SURPRISE THUMBS; TITS, GUNS & CHICKS IN TEL AVIV; HI-RES POSTER PIC; MORE! ----> http://stuffed.net/98/9/4/ <---- Welcome to today's issue of Stuffed. To read it you should click on the URL above. If it is not made clickable by your email program you will need to use your mouse to highlight the URL, copy it and then paste it into your browser (then press Return). This email is never sent unsolicited. Stuffed is the supplement for the Eureka newsletter you subscribed to. Full instructions on unsubscribing are in every issue of Eureka! ----> http://stuffed.net/98/9/4/ <---- From CTIA_Daily_News at um2.unitymail.com Fri Sep 4 12:00:07 1998 From: CTIA_Daily_News at um2.unitymail.com (CTIA Daily News) Date: Fri, 4 Sep 1998 12:00:07 -0700 (PDT) Subject: CTIA Daily News from WOW-COM - September 4, 1998 Message-ID: <199809041848.NAA00707@revnet3.revnet.com> ========================================== Welcome to today's edition of the CTIA Daily News from WOW-COM.� Please click on the icon / attachment for the most important news in wireless communications today. One of your customers just made three really long distance calls.....simultaneously. Have you deployed authentication? CTIA's Wireless Security '98 - It's Just Smart Business. Orlando, Florida � November 9 - 11, 1998 http://www.wow-com.com/professional� =========================================== -------------- next part -------------- A non-text attachment was scrubbed... Name: bin00013.bin Type: application/octet-stream Size: 7924 bytes Desc: "_CTIA_Daily_News_19980904a.htm" URL: From Laurent.Demailly at Sun.COM Fri Sep 4 16:13:01 1998 From: Laurent.Demailly at Sun.COM (Laurent Demailly) Date: Fri, 4 Sep 1998 16:13:01 -0700 (PDT) Subject: setting up a remailer service In-Reply-To: <199809030754.DAA01354@web05.iname.net> Message-ID: <13808.27579.860140.831829@pomerol> martin.. at iname.com writes: > I'd like to set up a free remailer service for the internet community. > I have a static IP, > good disk space *************** > and my machine is located in Norway. [...] Not to be over suspicious but why would you need a lot of disk space for a remailer ? do you plan on logging and recording all the messages ;-) ? -- dl, speaking only for himself From info at digfrontiers.com Fri Sep 4 18:14:33 1998 From: info at digfrontiers.com (Digital Frontiers Info) Date: Fri, 4 Sep 1998 18:14:33 -0700 (PDT) Subject: HVS Product Prices Cut by 30% Message-ID: PRICE CUTS ON HVS PRODUCTS -------------------------- Dear Web Developer/Designer: Thank you for your interest in Digital Frontiers products. If you wish to be removed from our announcement list, please reply to info at digfrontiers.com. Digital Frontiers is pleased to announce great new pricing discounts of more than 30% on our award-winning HVS series of web graphics tools. Starting September 1st, HVS Toolkit Pro 2 can be purchased for only $149. HVS Toolkit Pro 2, for Macintosh and Windows, replaces HVS WebFocus Toolkit, previously priced at $208, and adds HVS Animator Pro, by itself a $79 value. The new HVS Toolkit Pro includes HVS ColorGIF 2, HVS JPEG 2 and HVS Animator Pro, tools which still lead the industry in image quality and compression power. The newcomers to the web graphics market might call themselves the best, but after a test drive we're sure you'll agree that the HVS tools give the most excellent results on images for the Internet. With their new low pricing, HVS products are a superb value for professionals and personal web designers. Pricing for our standalone products, HVS ColorGIF 2 and HVS JPEG 2, has also been reduced, from $99 to $65. HVS Animator Pro is now available only as part of HVS Toolkit Pro 2. Visit our web site at http://www.digfrontiers.com to learn more about these superb web imaging tools. Take a test drive by downloading our free, full-featured, time-limited demos. Also, please visit http://www.gifcruncher.com, a free web-based GIF optimizer that we are hosting with SpinWave Software. GIFCruncher can reduce the size and download times of existing GIFs by up to 90%, and basic single image operations are free. With a paid GIFCruncher Batch membership, you can enter the URL of your home page and watch GIFCruncher reduce your GIFs automatically! Sincerely, Digital Frontiers info at digfrontiers.com 847-328-0880 voice 847-869-2053 fax http://www.digfrontiers.com From mgraffam at mhv.net Fri Sep 4 18:56:23 1998 From: mgraffam at mhv.net (mgraffam at mhv.net) Date: Fri, 4 Sep 1998 18:56:23 -0700 (PDT) Subject: setting up a remailer service In-Reply-To: <13808.27579.860140.831829@pomerol> Message-ID: On Fri, 4 Sep 1998, Laurent Demailly wrote: > martin.. at iname.com writes: > > I'd like to set up a free remailer service for the internet community. > > I have a static IP, > > good disk space > *************** > > and my machine is located in Norway. > [...] > > Not to be over suspicious but why would you need > a lot of disk space for a remailer ? do you plan > on logging and recording all the messages ;-) ? He mentioned in the original message that he wanted to run a service like anon.penet.fi .. penet set up an anonymous box, that is .. you can remail a letter through penet and it would assign a unique anonymous addy for you, and then replies and email to that anonymous addy would get forwarded to you. This would require disk space. Michael J. Graffam (mgraffam at mhv.net) http://www.mhv.net/~mgraffam -- Philosophy, Religion, Computers, Crypto, etc "Enlightenment is man's emergence from his self-incurred immaturity. Immaturity is the inability to use one's own understanding without the guidance of another. . .Sapere aude! Have the courage to use your own understanding!" - Immanuel Kant "What is Enlightenment?" From jkthomson at bigfoot.com Sat Sep 5 01:18:28 1998 From: jkthomson at bigfoot.com (jkthomson) Date: Sat, 5 Sep 1998 01:18:28 -0700 (PDT) Subject: (another) reason we need anon servers. Message-ID: <3.0.3.32.19980905011845.006bb77c@dowco.com> Itex Sues Over Yahoo! Postings Friday, September 4, 1998; 12:13 p.m. EDT PORTLAND, Ore. (AP) -- An investment firm is suing the people who posted online messages on a Yahoo! bulletin board accusing managers of incompetence, even though the firm has no idea whom to sue. Itex Corp. listed 100 ``John Does'' in its lawsuit filed this week in Multnomah County Circuit Court. In May, somebody using the name ``Orangemuscat'' declared on the Yahoo! online message board that Itex's ``current management is blind, stupid and incompetent.'' The lawsuit charges the author of the message with defaming the company and its president, undermining the confidence of Itex's investors, customers and barter exchange members. ``Orangemuscat,'' ``Investor727,'' ``colojopa'' and other names are listed as defendants ``presently unknown to plaintiffs but whose true identities will be included in amendments hereto when those identities are discovered.'' Donovan Snyder, an Itex lawyer, said it was necessary to sue in order to find the authors of the message, but he declined further comment. Itex, a barter exchange brokerage, had engaged in a bitter takeover struggle with a rival brokerage, and has faced questions from critics who challenge the way it values its assets. The company previously has turned to the courts to battle former employees and critics. Yahoo! disclaims all responsibility for the messages that are posted on its message boards. ``We have no way of knowing who some of the people are,'' said John Place, Yahoo's general counsel. Place said Yahoo's policy is to refuse to surrender any user information unless a court orders it to do so. But even under a court order, he said Yahoo! would have a hard time identifying users. The case is one of many that are pushing courts to define privacy rights on the Internet. ``I would not want to limit people's ability to post information online,'' said Lois Rosenbaum, a partner at the Portland law firm of Stoel Rives. ``But I would like to see some accountability for what they posted.'' Rosenbaum represented Beaverton-based Epitope in a 1993 case against a man who posted critical remarks about the company on a public bulletin board on the Prodigy online service. In that case, the comments turned out to be from a stockbroker with an interest in driving down the price of Epitope's shares. ----------------------------------------------------------------------- james 'keith' thomson www.bigfoot.com/~ceildh jkthomson:C181 991A 405C EAFB 2C46 79B5 B1DC DB78 8196 122D [06.07.98] ceildh :1D79 59AF ED75 5945 6003 8240 DA34 ACCA 9DE4 6BC9 [05.14.98] ICQ:746241 at pgp.mit.edu ...and former sysop of tnbnog BBS ----------------------------------------------------------------------- "To assert that the earth revolves around the sun is as erroneous as to claim that Jesus was not born of a virgin." - Cardinal Bellarmine 1615, during the trial of Galileo ======================================================================= From cell at cyber-host.net Sat Sep 5 08:59:33 1998 From: cell at cyber-host.net (cell at cyber-host.net) Date: Sat, 5 Sep 1998 08:59:33 -0700 (PDT) Subject: AD: Cellphone Batteries at Half Price Message-ID: <199809051559.IAA03160@toad.com> This message is sent in compliance with the new e-mail bill: SECTION 301, Paragraph (a)(2)(C) of s. 1618 Sender : Cell Phone Battery Store, P.O.Box 16494, Encino, CA 91416 Phone : 1-818-773-1975 E-mail : cell at cyber-host.net To be removed from our mailing list, simply reply with "REMOVE" in the subject. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ When you need a Battery for your Cellphone - Save Big! - Get it Quick and Easy online at CELLPHONE BATTERY WAREHOUSE -- Top Quality Batteries - Lowest Prices Guaranteed, Giant Selection, Excellent Service. http://www.cellphonebatterystore.com ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ From stuffed at stuffed.net Sat Sep 5 09:51:02 1998 From: stuffed at stuffed.net (STUFFED NEWS DAILY) Date: Sat, 5 Sep 1998 09:51:02 -0700 (PDT) Subject: Man wires his balls to a transformer - holy smoke!/Virgin sex on the web site was 'a scam' Message-ID: <19980905071000.2552.qmail@eureka.abc-web.com> ALSO IN THIS ISSUE: PAGE 2 'SPREAD'; TASTY TORI; ALLIGATOR ANTICS; THUMBNAIL HEAVEN; SEXY STORY: "TEAM PLAYER"; MULTIPLE MARRIAGES; STRAIGHT PRIDE; LAYING CABLE; MORE THUMBS; VAN-GONADS; MEET THE BEAVER; THE BEST OF EUREKA; SEXY SURPRISE THUMBS; LANDING A BATHING BEAUTY; MEGA THUMBNAIL ORGY; ORGASMIC PIC OF THE DAY; AND MUCH, MUCH MORE! ----> http://stuffed.net/98/9/5/ <---- Welcome to today's issue of Stuffed. To read it you should click on the URL above. If it is not made clickable by your email program you will need to use your mouse to highlight the URL, copy it and then paste it into your browser (then press Return). This email is never sent unsolicited. Stuffed is the supplement for the Eureka newsletter you subscribed to. Full instructions on unsubscribing are in every issue of Eureka! ----> http://stuffed.net/98/9/5/ <---- From jkthomson at bigfoot.com Sat Sep 5 16:00:22 1998 From: jkthomson at bigfoot.com (jkthomson) Date: Sat, 5 Sep 1998 16:00:22 -0700 (PDT) Subject: request for [cdn] export laws. Message-ID: <3.0.3.32.19980905160024.0070f7c0@dowco.com> greetings, listmembers. I have been looking for the export restrictions (if any) that regulate canadian encryption products. I have tried searching the net for a little while, and although I have found a few (contradictory) blurbs on it, I have found no 'official' documents or links to them. does this information exist on the web, and if not, who would be the best department to ask so that I get the least red-tape or 'runaround'? ----------------------------------------------------------------------- james 'keith' thomson www.bigfoot.com/~ceildh jkthomson:C181 991A 405C EAFB 2C46 79B5 B1DC DB78 8196 122D [06.07.98] ceildh :1D79 59AF ED75 5945 6003 8240 DA34 ACCA 9DE4 6BC9 [05.14.98] ICQ:746241 at pgp.mit.edu ...and former sysop of tnbnog BBS ----------------------------------------------------------------------- "Microsoft's biggest and most dangerous contribution to the software industry may be the degree to which it has lowered user expectations." - Esther Schlindler, OS/2 Magazine ======================================================================= From die at pig.die.com Sat Sep 5 18:49:05 1998 From: die at pig.die.com (Dave Emery) Date: Sat, 5 Sep 1998 18:49:05 -0700 (PDT) Subject: Zooko on JYA, cpunks, and surveillance (was: Re: Can't tell the kooks without a scorecard? Re: Monkey Wrenching the Echelon Engine) In-Reply-To: <199809042025.WAA19299@xs1.xs4all.nl> Message-ID: <19980905214853.A27226@die.com> On Sat, Sep 05, 1998 at 07:38:09AM -0700, David Honig wrote: > At 10:25 PM 9/4/98 +0200, Zane Lewkowicz wrote: > > >I used to think that the feds would never bother to investigate > >the likes of us, but i've been proven wrong. So now i assume > >that all unencrypted mail is scanned (especially in light of > >ECHELON & UKUSA & such). > > And all encrypted mail is archived. > And that is the rub. The real danger of key escrow type schemes lies in the future decryption under a different political and legal climate of half forgotten traffic going back years and years - stuff fetched from vast secret archives of potentially interesting encrypted messages squirelled away in the off chance that some time in the future "they" will be in possession of the key to some of it and interested in the contents. And until crypto is universally used for almost everything, saving the entirety of the 1-5% or so of email traffic that is encrypted on the presumption that it wouldn't have been encrypted if it wasn't important might be a good strategy, even if only a tiny fraction of those messages can ever be broken. And certainly saving all of the cipher email traffic from people identified by traffic analysis (group membership, corrospondance with suspicious or known bad-actor people or places, match to profiles profane and devine, etc) is really a no-brainer. The critical thing needed to protect against this chilling threat is email tools that provide perfect forward secrecy. PGP and the like do not, and capturing thus PGP messages in the hope that later on one has access to the private key is a very useful practice. DH key exchange has been around a long time, but so far the tentacles of the NSA have kept it from being a standard automatic part of sendmail, MS Exchange and qmail... Certainly one might want to enclose PGP or SMIME email messages inside the encrypted tunnel to protect privacy in storage and the "store" of store and forward mail routing, but having a secure transport tunnel in the first place forces the vacuum cleaner hose to be attached in quite different places where it is likely to be much more visible and noticed. And sure IPSEC would be nice, but simply making the ESMTP traffic between a short list of mail router programs opaque would certainly leverage a small effort with a large result whilst upgrading TCP/IP stacks and routers is a large effort... I've long heard that the NSA fills warehouses with high density tapes of cyphertext they can't break or don't want to spend the resources to break on the off chance that later on the key will be available or the information deemed truly important enough for cryptanalysis where possible. And sometimes (as in the Venona decrypts) this pays off... -- Dave Emery N1PRE, die at die.com DIE Consulting, Weston, Mass. PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2 5D 27 BD B0 24 88 C3 18 From bill301 at success600.com Sat Sep 5 21:11:51 1998 From: bill301 at success600.com (bill301 at success600.com) Date: Sat, 5 Sep 1998 21:11:51 -0700 (PDT) Subject: Free Laptop or Desktop Computer Message-ID: <00f442406010698VERY@mail.monemakr.com> Sent from: Success by Design 4974 N Cedar #116, Fresno, Ca, 93705 209 444-0550, bill301 at success600.com This text is placed here as stipulated in bill S. 1618 Title 3. http://www.senate.gov/~murkowski/commercialemail/EMailAmendText.html This is a FREE offer if you wish to be removed from future mailings, please e-mail to... (remove at success600.com) and this software will automatically block you from their future mailings. FREE Desktop or Laptop Computer and $1500* $0 Down! ZERO $ Out of Pocket! YES! THIS IS REAL AND IT'S HAPPENING NOW!!! 100% Financing! 99.9% Approval.... We accept A, B, C, and D Credit! Even if you've filed bankruptcy, you will be approved! No money required to sign up! Choose from a Desktop or Laptop. Only $108 per month! *(Paid In Full After 5 Sales) In-House Financing! Over $1.7 Billion available! Also Make money on all your sales $200 first sale $250 second sale $300 third sale $350 fourth sale $400 for every personal sale after that! Plus after 5 personal sales you have an option of taking a $1000 Cash Bonus, or $150 for 50 months! *This pays for your computer! At 10 personal sales receive a $4000 Cash Bonus or if you chose the $150 a month above, you will receive a $500 Cash Bonus! Plus... $500 bonus for every 5 sales after that! Plus... Override commissions from $25 to $100 for all downline sales through 7 generations! Desktop w/Monitor & Printer (or) Laptop only $108 month...or *Paid For after 5 sales! Don't Procrastinate on This One! Get the following Information Now! For more info E-mail to ( free at success600.com) Please leave Name Phone Fax E-mail Thank You From oskar at is.co.za Sat Sep 5 22:21:08 1998 From: oskar at is.co.za (Oskar Pearson) Date: Sat, 5 Sep 1998 22:21:08 -0700 (PDT) Subject: Quantum Computing progress - physnews update.388 Message-ID: <19980906072053.59022@is.co.za> Hi I hope that this is relevant, apologies if it isn't. I am neither a physicist, nor a crypto-oriented-mathematician... I am a part-time software developer and Unix support person :) As for the standard paranoia: trichloroethylene isn't in Ispell's dictionary. The NSA have obviously infiltrated the Linux/Freeware developer community. More proof that we are simply trailing behind the NSA in crypto technology. First link from altavista search for +"quantum computing" +cryptography Probably irrelevant :) http://hwilwww.rdec.redstone.army.mil/MICOM/wsd/ST/RES/QC/qc.html >From a mailing list I am on: 0--------------------------------------------------------------------------0 Date: Thu, 3 Sep 1998 14:03:05 -0400 (EDT) From: physnews at aip.org (AIP listserver) Message-Id: <199809031803.OAA01296 at aip.org> To: physnews-mailing at aip.org Subject: update.388 PHYSICS NEWS UPDATE The American Institute of Physics Bulletin of Physics News Number 388 September 3, 1998 by Phillip F. Schewe and Ben Stein QUANTUM ERROR CORRECTION has been experimentally demonstrated for the first time, greatly advancing the promise of carrying out interesting calculations with quantum computers (Updates 310 and 367). Skeptics have maintained that quantum computers would crash before carrying out a useful calculation since the devices rely on fragile, easily corrupted quantum states. Proposed in 1995 and developed unceasingly since then, quantum error correction has been all theory up until now. Aiming radio- frequency pulses at a liquid solution of alanine or trichloroethylene molecules, researchers at Los Alamos and MIT (Raymond Laflamme, 505-665-3394) spread a single bit of quantum information onto three nuclear spins in each molecule. Spreading out the information made it harder to corrupt. The bit of information was a combination or "superposition" of the values 0 and 1, so that it represented a little amount of 0 and a little amount of 1 at the same time. Measuring the spins directly would destroy this superposition and force the bit to become a 0 or a 1. So, the researchers instead "entangled" or interlinked the properties of the three spins. This allowed them to compare the spins to see if any new differences arose between them without learning the bit of information itself. With this technique, they were able to detect and fix errors in a bit's "phase coherence," the phase relationship between the quantum waves corresponding to the 0 and 1 states.(D.G. Cory et al., Physical Review Letters, 7 Sept 1998.) ------------------- From chargeus at usa.net Sun Sep 6 00:30:21 1998 From: chargeus at usa.net (Merchant Services) Date: Sun, 6 Sep 1998 00:30:21 -0700 (PDT) Subject: CREDIT CARD PROCESSING Message-ID: <199809051930.PAA14411@localhost.localdomain> Dear Friend, How would you like to be able to accept credit cards directly from your website, telephone or fax for your products and services and never need to purchase or lease expensive credit card equipment or pay a monthly fee for online ordering capabilities? **Brand New** Telecharge Credit Card acceptance program allows you to accept VISA or Mastercard any TIME,any WHERE through phone, fax or internet without the need to purchase or lease expensive credit card equipment. This brand new program will allow you to accept credit cards tomorrow. You simply pick up your telephone, dial a special toll free 800# 24 hrs a day 7 days a week, input a passcode and the credit card # and receive an immediate authorization over the phone. Within 2 days the money will be in your bank account. This is an exciting program for all businesses. Before you spend any money on a credit card program LOOK at this new program! To have a representative call you to explain the details of this program please email your Name, Phone Number (Don't forget your area code) and best time to call to: mailto:chargeus at usa.net A representative will return your call within 24hrs. A 100 % approval rate. This is a special promotion and for a limited time. Start today and save an additional 36%. Also receive 6 months of online advertising absolutely FREE! for your business. Feel free to call us and leave a message. A representative will return your call within 24hrs. World Tech Inc. 818-718-9429 7210 Jordan Ave. Canoga Park. CA. From dcab at cwi.se Sun Sep 6 01:51:47 1998 From: dcab at cwi.se (dcab at cwi.se) Date: Sun, 6 Sep 1998 01:51:47 -0700 (PDT) Subject: JUST RELEASED! 10 Million!!! Message-ID: <011328705550122442@ls_flancygerm.com> IT WAS JUST RELEASED!! INTRODUCING...MILLIONS VOL. 1A We took a total of over 92 million email addresses from many of the touted CD's that are out there (bought them all - some were $300+)! We added the millions we had in storage to those. When we combined them all, we had in excess of 100+ million addresses in one huge file. We then ran a super "sort/de-dupe" program against this huge list. It cut the file down to less than 25 million!!! Can you believe that? It seems that most people that are selling CD's are duping the public by putting numerous files of addresses in the CD over and over. This created many duplicate addresses. They also had many program "generated" email addresses like Compuserve, MCI, ANON's, etc. This causes a tremendous amount of undeliverables, and for those that use Stealth programs, clogs up servers quickly with trash, etc. We then ran a program that contained 1800+ keywords to remove addresses with vulgarity, profanity, sex-related names, postmaster, webmaster, flamer, abuse, spam, etc., etc. Also eliminated all .edu, .mil, .org, .gov, etc. After that list was run against the remaining list, it reduced it down to near 10 million addresses! So, you see, our list will save people hundreds of dollars buying all others that are out there on CD and otherwise. Using ours will be like using the 100+ million that we started with, but a lot less money and alot less time!! We also purchased Cyber-Promos ($995.00) CD. We received it just prior to finishing production work on the new CD. We had our people take a random sample of 300,000 addresses from the touted 2.9 that they advertised. We used a program that allows us to take a random sample of addresses from any list. We were able to have the program take every 9th address, thus giving us a 300,000 list of Cyber's email addresses from top to bottom. We cleaned these, and came up with about 100,000 addresses. These are also mixed in. We also included a 6+ million "Remove/Flamer" file broke into seperate files for ease of extracting and adding to your own database of removes. "You can buy from the REST or you can buy from the BEST. Your choice. _____________________________ What others are saying: "I received the CD on Friday evening. Like a kid with a new toy, I immediately started bulking out using the new email addresses. Over the course of the weekend, I emailed out over 500,000 emails and I received less than TWENTY undeliverables!! I am totally satisfied with my purchase!! Thanks Premier!!" Dave Buckley Houston, TX "This list is worth it's weight in gold!! I sent out 100,000 emails for my product and received over 55 orders! Ann Colby New Orleans, LA **************************************** HERE'S THE BOTTOM LINE Here is what you get when you order today! >> 10 Million Email Addresses... 1 per line in simple text format on a CD. Files are in lots of 5,000 (no codes needed to open files). All files are separated by domain name for your convenience. PLUS you receive a tremendous REMOVE list! 6 Million+ >>> NOW ONLY $150.00! This price is effective for the next seven days, thereafter the price will be $199.00 so ORDER NOW! All lists are completely free of any Duplicates. We also on a continual basis, add New Names and Remove Undeliverables and Remove Requests. The result is the Cleanest Email Addresses Available Anywhere to use over and over again, for a FRACTION of the cost that other companies charge. Typical rates for acquiring email lists are from 1 cent to as high as 3 cents per email address - that's "INFORMATION HIGHWAY" ROBBERY!. ***ADDED BONUS*** All our customers will have access to our updates on the CD volume they purchase. That's right, we continually work on our CD. Who knows when those other CDs were made. We're constantly adding and deleting addresses, removes. Etc. It all comes back to quality. No one else offers that! Don't even hesitate on this one or you will miss out on the most effective way to market anywhere...PERIOD! If you have any further questions or to place an order by phone, please do not hesitate to call us at: 800-600-0343 Ext. 2693 To order our email package, simply print out the EZ ORDER FORM below and fax or mail it to our office today. We accept Visa, Mastercard, AMEX, Checks by Fax. _________________ EZ Order Form _____Yes! I would like to order MILLIONS Vol. 1A email addresses for only $150.00. *Please select one of the following for shipping.. ____I would like to receive my package OVERNIGHT. I'm including $15 for shipping. (outside US add an additional $25 for shipping) ____I would like to receive my package 2 DAY delivery. I'm including $10 for shipping. (outside US add an additional $25 for shipping) DATE_____________________________________________________ NAME____________________________________________________ COMPANY NAME___________________________________________ ADDRESS_________________________________________________ CITY, STATE, ZIP___________________________________________ PHONE NUMBERS__________________________________________ FAX NUMBERS_____________________________________________ EMAIL ADDRESS___________________________________________ TYPE OF CREDIT CARD: ______VISA _____MASTERCARD CREDIT CARD# __________________________________________ EXPIRATION DATE________________________________________ NAME ON CARD___________________________________________ AMOUNT $____________________ (Required) SIGNATURE:x________________________ DATE:x__________________ You may fax your order to us at: 1-212-504-8192 CHECK BY FAX SERVICES! If you would like to fax a check, paste your check below and fax it to our office along with all forms to: 1-212-504-8192 ****************************************************** ***24 HOUR FAX SERVICES*** PLEASE PASTE YOUR CHECK HERE AND FAX IT TO US AT 1-212-504-8192 ******************************************************* If You fax a check, there is no need for you to send the original check. We will draft up a new check, with the exact information from your original check. All checks will be held for bank clearance. (7-10 days) Make payable to: "GD Publishing" From stuffed at stuffed.net Sun Sep 6 02:25:58 1998 From: stuffed at stuffed.net (STUFFED NEWS DAILY) Date: Sun, 6 Sep 1998 02:25:58 -0700 (PDT) Subject: Vibrator mistaken for bomb/Keeping sex fresh: Explicit techniques revealed Message-ID: <19980906071000.20692.qmail@eureka.abc-web.com> This issue brings yet another great collection of 30+ super hi-res jpeg photographs; as well as our usual crazy mix of unbelievable (but true) sexy news; informative, educational and entertaining features; and a whole load more... + PAGE 2 'SPREAD' + WILD THUMBNAILS + WHAT A DILDO! + WANKY RACES + THUMBNAIL HEAVEN + SEXY STORY: "A VIRTUAL FANTASY" + THE BEST OF EUREKA! + PUSSY SURPRISE PICS + KEEPING SEX FRESH + SUPER HI-RES POSTER PIC - Enjoy! ----> http://stuffed.net/98/9/6/ <---- Welcome to today's issue of Stuffed. To read it you should click on the URL above. If it is not made clickable by your email program you will need to use your mouse to highlight the URL, copy it and then paste it into your browser (then press Return). This email is never sent unsolicited. Stuffed is the supplement for the Eureka newsletter you subscribed to. Full instructions on unsubscribing are in every issue of Eureka! ----> http://stuffed.net/98/9/6/ <---- From d-starr at usa.net Sun Sep 6 04:04:01 1998 From: d-starr at usa.net (D.STARR) Date: Sun, 6 Sep 1998 04:04:01 -0700 (PDT) Subject: [request for [cdn] export laws.] Message-ID: <19980906110357.28581.qmail@www0i.netaddress.usa.net> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 10802 bytes Desc: not available URL: From chrisharwig at hetnet.nl Sun Sep 6 05:10:26 1998 From: chrisharwig at hetnet.nl (kryz) Date: Sun, 6 Sep 1998 05:10:26 -0700 (PDT) Subject: "In dreams begin responsibility" - W.B. Yeats In-Reply-To: <19980904224426.3.MAIL-SERVER@pub1.pub.whitehouse.gov> Message-ID: ---------- | Date: vrijdag 4 september 1998 22:44:00 | From: The White House | To: Public-Distribution at pub.pub.whitehouse.gov | Subject: 1998-09-04 Remarks by President to Officials of Gateway Computers | | | THE WHITE HOUSE | | Office of the Press Secretary | (Dublin, Ireland) | ________________________________________________________________________ | For Immediate Release September 4, 1998 | | | | REMARKS BY THE PRESIDENT | TO BUSINESS LEADERS, | AND OFFICIALS AND EMPLOYEES OF GATEWAY COMPUTERS | | | Gateway Computers European Facility | Santry, County Dublin, Ireland | | | 4:12 P.M. EDT | | | THE PRESIDENT: Thank you for the wonderful welcome, the waving flag | -- (applause) -- the terrific shirts -- I want one of those shirts | before I leave -- (applause) -- at least shirts have not become virtual, | you can actually have one of them. (Laughter.) | | I want to say to the Taoiseach how very grateful I am for his | leadership and friendship. But I must say that I was somewhat | ambivalent when we were up here giving our virtual signatures. Do you | have any idea how much time I spend every day signing my name? I'm | going to feel utterly useless if I can't do that anymore. (Laughter.) | By the time you become the leader of a country, someone else makes all | the decisions -- you just sign your name. (Laughter.) You may find you | can get away with virtual presidents, virtual prime ministers, virtual | everything. Just stick a little card in and get the predicable | response. | | I want to congratulate Baltimore Technologies on making this possible | as well. And Ted Waitt, let me thank you for the tour of this wonderful | facility. As an American I have to do one little chauvinist thing. I | asked Ted -- I saw the Gateway -- do you see the Gateway boxes over | there and the then the Gateway logo and I got a Gateway golf bag before | I came in and it was black and white like this. (Applause.) So I said, | where did this logo come from? And he said, "It's spots on a cow." He | said, we started in South Dakota and Iowa and people said how can there | be a computer company in the farmland of America? And now there is one | in the farmland of America that happens to be in Ireland. | | But it's a wonderful story that shows the point I want to make later, | which is that there is no monopoly on brain power anywhere. There have | always been intelligent people everywhere, in the most underinvested and | poorest parts of the world. Today on the streets of the poorest | neighborhoods in the most crowded country in the world -- which is | probably India, in the cities -- there are brilliant people who need a | chance. | | And technology, if we handle it right, will be one of the great | liberating and equalizing forces in all of human history, because it | proves that unlike previous economic waves you could be on a small farm | in Iowa or South Dakota or you could be in a country like Ireland, long | under-invested in by outsiders, and all of a sudden open the whole world | up. And you can prove that people you can find on any street corner can | master the skills of tomorrow. So this is a very happy day. | | I want to thank the other officials from the Irish government, | Minister Harney and Minister O'Rourke and others. I thank my great | Commerce Secretary, Bill Daley, for being here, and Jim Lyons, who heads | my economic initiatives for Ireland, and Ambassador Jean Kennedy Smith, | who has done a magnificent job for us and will soon be going home after | having played a major role in getting the peace process started, and we | thank her. | | I thank you all personally for the warm reception you gave George | Mitchell, because you have no idea how much grief he gave me for giving | him this job. (Laughter and applause.) You all voted for the agreement | now, and everything is basically going in the right direction, but it | was like pulling fingernails for three years -- everybody arguing over | every word, every phrase, every semicolon, you know? In the middle of | that, George Mitchell was not all that happy that I had asked him to | undertake this duty. | | But when you stood up and you clapped for him today, for the first | time since I named him, he looked at me and said thank you. So thank | you again, you made my day. (Applause.) Thank you. | | I'd also like to thank your former Prime Minister and Taoiseach, | John Bruton, who's here and who also worked with us on the peace | process. Thank you, John, for coming, it's delightful to see you. | (Applause.) And I would like you to know that there are a dozen members | of the United States Congress here, from both parties -- showing that we | have reached across our own divide to support peace and prosperity in | Ireland. And I thank all the members of Congress and I'd like to ask | them to stand up, just so you'll see how many there are here. Thank you | very much. (Applause.) | | I know that none of the Irish here will be surprised when I tell | you that a recent poll of American intellectuals decided that the best | English language novel of the 20th century was a book set in Dublin, | written by an Irishman, in Trieste and Zurich, and first published in | New York and Paris -- a metaphor of the world in which we now live. | James Joyce's "Ulysses" was the product of many cultures, but it remains | a deeply Irish work. | | Some of you will remember that near the beginning of the book, | Joyce wrote, "History is a nightmare from which I am trying to awake." | Much of Irish history, of course, is rich and warm and wonderful, but we | all know it has its nightmarish aspects. They are the ones from which | Ireland is now awakening, thanks to those who work for peace and thanks | to those who bring prosperity. | | Much of Ireland's new history, of course, will be shaped by the | Good Friday Peace Agreement. You all, from your response to Senator | Mitchell, are knowledgeable of it and proud of it, and I thank you for | voting for it in such overwhelming numbers in the Republic. | | I think it's important that you know it's a step forward not only | for Irish people but for all people divided everywhere who are seeking | new ways to think about old problems, who want to believe that they | don't forever have to be at the throats of those with whom they share a | certain land, just because they are of a different faith or race or | ethnic group or tribe. The leaders and the people of Ireland and | Northern Ireland, therefore, are helping the world to awaken from | history's nightmares. | | Today Ireland is quite an expansive place, with a positive outlook | on the world. The 1990s have changed this country in profound and | positive ways. Not too long ago, Ireland was a poor country by European | standards, inward-looking, sometimes insular. | | Today, as much as any country in Europe, Ireland is connected in | countless ways to the rest of the world, as Ted showed me when we moved | from desk to desk to desk downstairs with the people who were talking to | France and the people who were talking to Germany and the people who | were talking to Scandinavia, and on and on and on. | | This country has strong trade relations with Britain and the | United States, with countries of the European Union and beyond. And | Ireland, as we see here at this place, is fast becoming a technological | capital of Europe. Innovative information companies are literally | transforming the way the Irish interact and communicate with other | countries. That is clear here -- perhaps clearer here than anywhere | else -- at Gateway, a company speaking many languages and most of all | the language of the future. Gateway and other companies like Intel and | Dell and Digital are strengthening Ireland's historic links to the | United States and reaching out beyond. | | I think it is very interesting, and I was not aware of this before | I prepared for this trip, that Dublin is literally becoming a major | telecommunications center for all of Europe. More and more Europeans do | business on more and more telephones, and more and more of their calls | are routed through here. You connect people and businesses in very | combination: a German housewife, a French computer company, a Czech | businessman, a Swedish investor -- people all around Europe learning to | do business on the Internet. | | At the hub of this virtual commerce is Ireland, a natural gateway | for the future also of such commerce between Europe and the United | States. In the 21st century, after years and years and years of being | disadvantaged because of what was most important to the production of | wealth, Ireland will have its day in the sun because the most important | thing in the 21st century is the capacity of people to imagine, to | innovate, to create, to exchange ideas and information. By those | standards, this is a very wealthy nation indeed. | | Your growth has been phenomenal: last year, 7.7 percent; prices | rising at only 1.5 percent; unemployment at a 20-year low. Ireland is | second only to the United States in exporting software. This year the | Irish government may post a surplus of $1.7 billion. The Celtic tiger | is roaring and you should be very proud of it. (Applause.) | | It has been speculated, half seriously, that there are more | foreigners here than at any time since the Vikings pillaged Ireland in | the 9th century. (Laughter.) I guess I ought to warn you -- you know, | whenever a delegation of Congressmen comes to Ireland they all claim to | be Irish -- and in a certain way they all are -- but one of the members | of the delegation here, Congressman Hoyer, who has been a great friend | of the peace process, is in fact of Viking heritage, descent. | (Laughter.) Stand up, Steny. (Applause.) | | Now, all the rest of us come here and pander to you and tell you | we love Ireland because there is so much Irish blood running in our | veins. He comes here and says he loves Ireland because there is so much | of his blood running in your veins. (Laughter and applause.) | | Let me get back to what I was saying about the Internet -- because | your position vis-a-vis telecommunication can be seen through that. | When I came here just three years ago -- had one of the great days of my | life, there was so much hope about the peace process then -- only 3 | million people worldwide were connected to the Internet, three years | ago. Today there are over 120 million people, a 40-fold increase in | three years. In the next decade sometime it will be over a billion. | Already, if you travel, you can see the impact of this in Russia or in | China or other far-flung places around the globe. | | I had an incredible experience in one of these Internet cafes in | Shanghai, where I met with young high school students in China working | the Internet. Even if they didn't have computers at home, they could | come to the cafe, buy a cup of coffee, rent a little time and access the | Internet. This is going to change dramatically the way we work and | live. It is going to democratize opportunity in the world in a way that | has never been the case in all of human history. And if we are wise and | decent about it, we can not only generate more wealth, we can reduce | future wars and conflicts. | | The agreement that we signed today does some important things. It | commits us to reduce unnecessary regulatory barriers, to refrain from | imposing customs duties, to keep taxes to a minimum, to create a stable | and predictable environment for doing business electronically. It helps | us, in other words, to create an architecture for one of the most | important areas of business activity in the century ahead. | | There are already 470 companies in Ireland that are American, and | many of them are in the information sector. The number is growing | quickly. So I say to you that I think this agreement we have signed | today, and the way we have signed it, will not only be helpful in and of | themselves, but will stand for what I hope will be the future direction | of your economy and America's, the future direction of our relationship, | and will open a massive amount of opportunity to ordinary people who | never would have had it before. | | A strong modern economy thrives on education, innovation, respect | for the interests of workers and customers and a respect for the earth's | environment. An enlightened population is our best investment in a good | future. Prosperity reinforces peace as well. The Irish have long | championed prosperity, peace, and human decency, and for all that I am | very grateful. | | I would like to just say, because I can't leave Ireland without | acknowledging this, that there are few nations that have contributed | more than Ireland, even in times which were difficult for this country, | to the cause of peace and human rights around the world. You have given | us now Mary Robinson to serve internationally in that cause. But since | peacekeeping began for the United Nations 40 years ago, 75 Irish | soldiers have given their lives. | | Today we work shoulder to shoulder in Bosnia and the Middle East. | But I think you should know, that as nearly as I can determine, in the | 40 years in which the world has been working together on peacekeeping, | the only country in the world which has never taken a single, solitary | day off from the cause of world peace to the United Nations peacekeeping | operations is Ireland. And I thank you. (Applause.) | | In 1914, on the verge of the First World War, which would change | Europe and Ireland forever, William Butler Yeats wrote his famous line, | "In dreams begin responsibility." Ireland has moved from nightmares to | dreams. Ireland has assumed great responsibility. As a result, you are | moving toward permanent peace, remarkable prosperity, unparalleled | influence, and a brighter tomorrow for your children. May the | nightmares stay gone, the dreams stay bright, and the responsibility | wear easily on your shoulder, because the future is yours. | | Thank you, and God bless you. | | END 4:28 P.M. (L) From master021 at email.msn.com Sun Sep 6 13:02:59 1998 From: master021 at email.msn.com (Jayson Dias) Date: Sun, 6 Sep 1998 13:02:59 -0700 (PDT) Subject: More $$ than you Can Imagine Message-ID: <000101bdd9ce$382ff7c0$ae2e2599@oemcomputer> MAKE TONS OF MONEY FAST AND EASY!!! This is your chance, don't pass it up Please Read... I have personally tried so many of these (Make money on the internet) all of these plans have failed and i lost money on them, but this plan has been making me so much money in so little time... Don't get me wrong, you have to put forth some effort but it all works out in the end. I will stop talking now and let you read how you can make this kind of money on the internet!!! You may have to read through this a couple times to understand it, and no matter what your age, you can still do this as long as you have the internet and an e-mail account... Read on... The following is a copy of the e-mail I read which got me started: $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ This is a LEGAL, MONEYMAKING PHENOMENON. PRINT this letter, read the directions, THEN READ IT AGAIN !!! You are about to embark on the most profitable and unique program you may ever see. Many times over, it has demonstrated and proven its ability to generate large amounts of cash. This program is showing fantastic appeal with a huge and ever-growing on-line population desirous of additional income. This is a legitimate, LEGAL, moneymaking opportunity. It does not require you to come in personal contact with people, do any hard work, and best of all, you never have to leave the house, except to get the mail and go to the bank! This truly is that lucky break you've been waiting for! Simply follow the easy instructions in this letter, and your financial dreams can come true! When followed correctly, this electronic, multilevel marketing program WORKS! Thousands of people have used this program to: - Raise capital to start their own business - Pay off debts - Buy homes, cars, etc., - Even retire! This is your chance, so don't pass it up! ---------------------------------------------------------------------------- ------ OVERVIEW OF THIS EXTRAORDINARY ELECTRONIC MULTILEVEL MARKETING PROGRAM ---------------------------------------------------------------------------- ------ Basically, this is what we do: We send thousands of people a product that they paid us $5.00 US for, that costs next to nothing to produce and e-mail back to them. As with all multilevel businesses, we build our business by recruiting new partners and selling our products. Every state in the U.S. allows you to recruit new multilevel business online (via your computer). We are not promising you anything. You have to put forth some effort to make this business work, but come on how hard is emailing! The products in this program are a series of four business and financial reports costing $5.00 each. Each order you receive is to include: * $5.00 cash United States Currency * The name and number of the report they are ordering * The e-mail address where you will e-mail them the report they ordered. To fill each order, you simply e-mail the product to the buyer. THAT'S IT! The $5.00 is yours! This is the EASIEST electronic multilevel marketing business anywhere! FOLLOW THE INSTRUCTIONS TO THE LETTER AND BE PREPARED TO REAP THE STAGGERING BENEFITS! ******* I N S T R U C T I O N S ******* This is what you MUST do: 1. Order all 4 reports shown on the list below (you can't sell them if you don't order them). * For each report, send $5.00 CASH, the NAME & NUMBER OF THE REPORT YOU ARE ORDERING, YOUR E-MAIL ADDRESS, and YOUR RETURN POSTAL ADDRESS (in case of a problem) to the person whose name appears on the list next to the report. * When you place your order, make sure you order each of the four reports. You will need all four reports so that you can save them on your computer and resell them. * Within a few days you are to receive, via e-mail, each of the four reports. Save them on your computer so they will be accessible for you to send to the 1,000's of people who will order them from you. 2. IMPORTANT -- DO NOT alter the names of the people who are listed next to each report, or their sequence on the list, in any way other than is instructed below in steps "a" through "d" or you will lose out on the majority of your profits. Once you understand the way this works, you'll also see how it doesn't work if you change it. Remember, this method has been tested, and if you alter it, it will not work. a. Look below for the listing of available reports. b. After you've ordered the four reports, replace the name and address under REPORT #1 with your name and address, moving the one that was there down to REPORT #2. c. Move the name and address that was under REPORT #2 down to REPORT #3. d. Move the name and address that was under REPORT #3 down to REPORT #4. e. The name and address that was under REPORT #4 is removed from the list and has NO DOUBT collected large sums of cash! Please make sure you copy everyone's name and address ACCURATELY!!! 3. Take this entire letter, including the modified list of names, and save it to your computer. Make NO changes to the instruction portion of this letter. 4. Now you're ready to start an advertising campaign on the WORLDWIDE WEB! Advertising on the WEB can be very, very inexpensive, and there are HUNDREDS of FREE places to advertise. Another avenue which you could use for advertising is e-mail lists. You can buy these lists for under $20/2,000 addresses or you can pay someone to take care of it for you. BE SURE TO START YOUR AD CAMPAIGN IMMEDIATELY! 5. For every $5.00 you receive, all you must do is e-mail them the report they ordered. THAT'S IT! ALWAYS PROVIDE SAME-DAY SERVICE ON ALL ORDERS! This will help guarantee that the e-mail THEY send out, with YOUR name and address on it, will be prompt because they can't advertise until they receive the report! To grow fast be prompt and courteous. ------------------------------------------ AVAILABLE REPORTS ------------------------------------------ ***Order Each REPORT by NUMBER and NAME*** Notes: - ALWAYS SEND $5 CASH FOR EACH REPORT - ALWAYS SEND YOUR ORDER VIA THE QUICKEST DELIVERY - Make sure the cash is concealed by wrapping it in at least two sheets of paper - On one of those sheets of paper, include: (a) the number & name of the report you are ordering, (b) your e-mail address, and (c) your postal address. _________________________________________________________________ REPORT #1 "HOW TO MAKE $250,000 THROUGH MULTILEVEL SALES" ORDER REPORT #1 FROM: JAYSON DIAS 4793 Birkdale Cir. Fairfield, CA 94585 _________________________________________________________________ REPORT #2 "MAJOR CORPORATIONS AND MULTILEVEL SALES" ORDER REPORT #2 FROM: BOBAYAA 3505 W. Melissa Ln. Douglasville, GA 30135 _________________________________________________________________ REPORT #3 "SOURCES FOR THE BEST MAILING LISTS" ORDER REPORT #3 FROM: M&J's P.O. Box 116 Whitewater, KS 67154 _________________________________________________________________ REPORT #4 "EVALUATING MULTILEVEL SALES PLANS" ORDER REPORT #4 FROM: TanBsPlace P.O. BOX 43365 Richmond Hights, OH 44143 _________________________________________________________________ ---------------------------------------------------------------------------- ---------------------- HERE'S HOW THIS AMAZING PLAN WILL MAKE YOU $MONEY$ ---------------------------------------------------------------------------- ---------------------- Let's say you decide to start small just to see how well it works. Assume your goal is to get 10 people to participate on your first level. (Placing a lot of FREE ads on the Internet will EASILY get a larger response.) Also assume that everyone else in YOUR ORGANIZATION gets ONLY 10 downline members. Follow this example to achieve the STAGGERING results below. First level--your 10 members with $5...........................................$50 Second level--10 members from those 10 ($5 x 100)..................$500 Third level--10 members from those 100 ($5 x 1,000)..........$5,000 Fourth level--10 members from those 1,000 ($5 x 10,000)...$50,000 THIS TOTALS ----------->$55,550 and more to come! Remember friends, this assumes that the people who participate only recruit 10 people each. Think for a moment what would happen if they got 20 people to participate! Lots of people get 100s of participants! THINK ABOUT IT! Your cost to participate in this is practically nothing (surely you can afford $20). You obviously already have an Internet connection and e-mail is FREE! REPORT#3 shows you the most productive methods for bulk e-mailing and purchasing e-mail lists. Some list & bulk e-mail vendors even work on trade! About 50,000 new people get online every month! *******TIPS FOR SUCCESS******* * TREAT THIS AS YOUR BUSINESS! Be prompt, professional, and follow the directions accurately. * Send for the four reports IMMEDIATELY so you will have them when the orders start coming in because: When you receive a $5 order, you MUST send out the requested product/report to comply with the U.S. Postal & Lottery Laws, Title 18, Sections 1302 and 1341 or Title 18, Section 3005 in the U.S. Code, also Code of Federal Regs. vol. 16, Sections 255 and 436, which state that "a product or service must be exchanged for money received." * ALWAYS PROVIDE SAME-DAY SERVICE ON THE ORDERS YOU RECEIVE. * Be patient and persistent with this program. If you follow the instructions exactly, the results WILL undoubtedly be SUCCESSFUL! * ABOVE ALL, HAVE FAITH IN YOURSELF AND KNOW YOU WILL SUCCEED! *******YOUR SUCCESS GUIDELINE******* Follow these guidelines to help assure your success: If you don't receive 10 to 20 orders for REPORT #1 within two weeks, continue advertising until you do. Then, a couple of weeks later you should receive at least 100 orders for REPORT #2. If you don't, continue advertising until you do. Once you have received 100 or more orders for REPORT #2, YOU CAN RELAX, because the system is already working for you, and the cash can continue to roll in! THIS IS IMPORTANT TO REMEMBER: Every time your name is moved down on the list, you are placed in front of a DIFFERENT report. You can KEEP TRACK of your PROGRESS by watching which report people are ordering from you. If you want to generate more income, send another batch of e-mails and start the whole process again! There is no limit to the income you will generate from this business! NOTE: If you need help with starting a business, registering a business name, how income tax is handled, etc., contact your local office of the Small Business Administration (a Federal agency) for free help and answers to questions. Also, the Internal Revenue Service offers free help via telephone and free seminars about business taxes. This letter has been edited to help comply with the Federal Trade Commission requirements. Any amounts of earnings listed in this letter can be factual or fictitious. Your earnings and results are highly dependent on your activities and advertising. This letter constitutes no guarantees stated nor implied. In the event that it is determined that this letter constitutes a guarantee of any kind, that guarantee is now void. If you have any question of the legality of this letter contact the Office of Associate Director for Marketing Practices Federal Trade Commission Bureau of Consumer Protection in Washington, DC. *******T E S T I M O N I A L S******* This program does work, but you must follow it EXACTLY! Especially the rule of not trying to place your name in a different position, it won't work and you'll lose a lot of potential income. I'm living proof that it works. It really is a great opportunity to make relatively easy money, with little cost to you. If you do choose to participate, follow the program exactly, and you'll be on your way to financial security. Sean McLaughlin, Jackson, MS My name is Frank. My wife, Doris, and I live in Bel-Air, MD. I am a cost accountant with a major U.S. Corporation and I make pretty good money. When I received the program I grumbled to Doris about receiving "junk mail." I made fun of the whole thing, spouting my knowledge of the population and percentages involved. I "knew" it wouldn't work. Doris totally ignored my supposed intelligence and jumped in with both feet. I made merciless fun of her, and was ready to lay the old "I told you so" on her when the thing didn't work ... well, the laugh was on me! Within two weeks she had received over 50 responses. Within 45 days she had received over $147,200 in $5 bills! I was shocked! I was sure that I had it all figured and that it wouldn't work. I AM a believer now. I have joined Doris in her "hobby." I did have seven more years until retirement, but I think of the "rat race" and it's not for me. We owe it all to MLM. Frank T., Bel-Air, MD I just want to pass along my best wishes and encouragement to you. Any doubts you have will vanish when your first orders come in. I even checked with the U.S. Post Office to verify that the plan was legal. It definitely is! IT WORKS! Paul Johnson, Raleigh, NC The main reason for this letter is to convince you that this system is honest, lawful, extremely profitable, and is a way to get a large amount of money in a short time. I was approached several times before I checked this out. I joined just to see what one could expect in return for the minimal effort and money required. To my astonishment, I received $36,470.00 in the first 14 weeks, with money still coming in. Sincerely yours, Phillip A. Brown, Esq. Not being the gambling type, it took me several weeks to make up my mind to participate in this plan. But conservative that I am, I decided that the initial investment was so little that there was just no way that I wouldn't get enough orders to at least get my money back. Boy, was I surprised when I found my medium-size post office box crammed with orders! For a while, it got so overloaded that I had to start picking up my mail at the window. I'll make more money this year than any 10 years of my life before. The nice thing about this deal is that it doesn't matter where in the U.S. the people live. There simply isn't a better investment with a faster return. Mary Rockland, Lansing, MI I had received this program before. I deleted it, but later I wondered if I shouldn't have given it a try. Of course, I had no idea who to contact to get another copy, so I had to wait until I was e-mailed another program...11 months passed then it came...I didn't delete this one!...I made more than $41,000 on the first try!! D. Wilburn, Muncie, IN This is my third time to participate in this plan. We have quit our jobs, and will soon buy a home on the beach and live off the interest on our money. The only way on earth that this plan will work for you is if you do it. For your sake, and for your family's sake don't pass up this golden opportunity. Good luck and happy spending! Charles Fairchild, Spokane, WA ORDER YOUR REPORTS TODAY AND GET STARTED ON YOUR ROAD TO FINANCIAL FREEDOM!!! From stocks at smart-stocks.com Sun Sep 6 20:17:06 1998 From: stocks at smart-stocks.com (stocks at smart-stocks.com) Date: Sun, 6 Sep 1998 20:17:06 -0700 (PDT) Subject: AD: Free Investment Newsletter Message-ID: <199809070317.UAA07181@toad.com> This message is sent in compliance of the new e-mail bill: SECTION 301, Paragraph (a)(2)(C) of s. 1618 Sender : Smart-Stocks, P.O. Box 130544, St Paul, MN 55113 Phone : 1-612-646-8174 E-mail : stocks at smart-stocks.com To be removed from our mailing list, simply reply with "REMOVE" in the subject. Do you need stock tips? This is an invitation to join the Smart-Stocks Premier Newsletter for a free 90 day trial. We are dedicated to providing comprehensive and up-to-date information about emerging growth stocks often overlooked by most brokerages and stock market research services. Whether you are a seasoned investor or just getting started, The Smart-Stocks Web Site could help you discover the next Intel, Blockbuster or Merck long before the rest of Wall Street! To sign up for your free trial newsletter just go to our site at http://www.smart-stocks.com Thank you for your time. From watch34 at usa.net Sun Sep 6 21:30:47 1998 From: watch34 at usa.net (watch34 at usa.net) Date: Sun, 6 Sep 1998 21:30:47 -0700 (PDT) Subject: Two most exciting BREAKTHROUGHS in health Science in the 20th century! Message-ID: <199809071429.JAA24854@paknet2.ptc.pk> Subject: TWO Most Exciting BREAKTHROUGHS in Health Science in the 20TH CENTURY ONE: AGE REVERSING MIRACLE--- Medical Science PROVES it is now possible to REVERSE 10 TO 20 YEARS of AGING in as little as 6 MONTHS. This PRODUCT releases the only substance in the body which has been Clinically Proven to decrease wrinkles, increase energy, lose fat-gain muscle, improve vision, re-grow hair, restore sex drive, reduce cholesterol regenerate heart, liver, lungs, kidneys, prostate---and the list goes on--- TWO: IMMUNE SYSTEM BUILDER---Fights COLDS to CANCERS NOW--An aternative to the overused antibiotics and other synthetic drugs- A natural product that boosted immune systems by an ave.of 1,267 % in one study group of over 100 people. * All types of Cancer--- in Remission *CFS Patients--Recovered and Feeling Great *Relief from Allergies--Colds--Flu *Even relief from Lupus--Aids--Hepatitus 20 Years and 20 Million Dollars in Research to bring this Product to the Public. xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx For Complete Details on the Products and/or the Huge Financial Opportunity with a Very Minimal Investment--CALL 1-800-896-8991 Leave your name and number--We can then provide Recorded Calls, Websites, Brochures, Tapes and etc. SJC Solutions 1292 Seven Springs Cir. Marietta GA 30068 To be removed from future mailings, please provide your E-mail address From roger at opusnet.com Sun Sep 6 09:37:30 1998 From: roger at opusnet.com (roger at opusnet.com) Date: Mon, 7 Sep 1998 00:37:30 +0800 Subject: Let Us Promote Your Site -bfftoehx Message-ID: ------------------------------------------------------------------- cypherpunks Removal Instructions can be found at the bottom of this page ! ------------------------------------------------------------------- Hello cypherpunks I found your name on this website if you are not the contact for it please foward this to the proper party. Your Site Lost in Cyberspace? Let our team of Experts Professionally Submit your Web Page for you to as many as 900 Sites. As low as .02 per search engine submission. 1: GET MAXIMUM EXPOSURE 2: MAKE MONEY 3: YOUR TIME IS VALUABLE 4: MISTAKES CAN BE COSTLY How quickly can you do it? We'll start immediately. Submissions are usually completed within 5 working days (Monday to Friday) of receiving your confirmation. When will my listings appear? Some sites post additions immediately, others may take up to several weeks to process submissions. How will I know that the submissions were done? Within days of completion we will provide you with a report detailing exactly where your listing was submitted. If you want to, you can easily go to the sites and check for yourself. Although we can not guarantee that all sites will accept your listing (content may not be appropriate) Also, we have carefully selected sites that are likely to accept all submissions. What's it going to Cost me? Submit to 900 sites Only $25.00 One time Special from this e-mail if you order in the next 48 hours 8: YES! Submit my Web page for me! Don't delay a minute longer! If you are serious about doing business on the Internet, this is the most essential step you need to take after getting your pages on-line. Simply fill out our order form fax it in to us and Start building your traffic today! -------------------------------CUT HERE------------------------------------- SECTION 1: Personal Information Your Full Name:__________________________ Your eMail Address:_________________________ Your Phone#:_________________________ Your Fax#:___________________________ SECTION 3: Submission Information Save Time and Delays by following our guidelines closely. If a length limit is exceeded (for example) we will have to ask you to shorten your information - thus delaying the process. Please do not type in ALL CAPS. NOTE: Each submission site has different submission forms. We will complete all available fields, however, all of the following information may not be listed at all sites. Company or Business name to include in submissions: ___________________________________________ Enter Your Web Page Title:_______________________________ NOTES: Your title should be no more than 40 CHARACTERS and include good keywords that describe the content of your Web page. Also, if you want it to appear near the top of alphabetically arranged lists and directories try and have the first letter of the title be an "A", "B", or "C" etc. Whatever you do, it should look like it belongs there or it may get chopped of by a site administrator. It doesn't necessarily have to match your actual Web Page title. In our opinion, it is redundant to include words such as "home page", "corporation" or other redundant words that are unlikely to be searched for, or that that unlikely to entice the viewer to click on YOUR title. You have only a few seconds to get a web surfers attention! Enter the URL for your Web Page:___________________________________ NOTE: If you wish to have us submit more than one web page please fill out and submit this form for each individual page (simply fill out the form, submit it, make any necessary changes and submit it again). We can submit any page that has a unique URL. Suggest a possible category to place your listings in: __________________________________ Enter a DESCRIPTION of the nature of your Web page (it MUST be 25 WORDS or less). Use good words in your description so that when a directory is searched your listing will be returned. Make sure you include your most important KEYWORDS as only a few sites have a field that allow us to submit KEYWORDS as a separate item. Don't overlook the obvious (computers, software, travel, book, gifts, etc.)!: ______________________ Enter an alternate Short DESCRIPTION of the nature of your Web page (8 WORDS or less). We will use the long description wherever possible: ________________________ Enter up to 20 single KEYWORDS (separated by spaces) that best describe the content of your Web page: __________________ Person's name to include in submissions: __________________________ eMail address to include in submissions: __________________________ Phone number with area code to include in submissions: _____________________ Fax number with area code to include in submissions (RECOMMENDED): ________________ Toll Free 0800 number to include in submissions (if available): ____________________________ Mailing Address to include in submissions: _____________________________ SECTION 3: Payment Information Under no circumstances will any work commence until a valid form of payment is received! NOTE: you can call us in person at our voice or Fax number, OR you may fill out this form, print it out and Fax it to us. Lucid Technologies Inc 5646 Wellesly Pk. Dr. Boca Raton, FL 33433 Our voice number is: 561-347-7304, our Fax number is: 561-347-7304 Also if you would like you site or product promoted by mass email or wish to buy mass e-mail products please call 561-347-7304 Sales Code #DS1021 Method of Payment: We Accept Check by Fax or Credit cards If paying by Credit Card we will need the following information We accept Visa, Mastercard, Diners Club Card Holders Name: _______________________________ Mailing Address For Credit Card bill: Street: _______________________ ____________________________ City:_______ State:___________ ZIP:____________ To Pay By Check Please Print Out this Form Take a blank check write void on it and tape it to this form and fax it back to us and enter your drivers licence number or state id here ___________________________________ Tape Check here Fax this form to 561-347-7304 ------------------------------------------CUT HERE------------------------------------- The Sender Of this E-mail is a Member of the Internet responsible marketers (I.R.M.A) Association #12995 The Mailing List that you are being mailed from was filtered against the Global Remove List at: http://remove-list.com Remove-List is a free public service offering to help the general public get removed from bulk mailings lists and has not sent this message. If you want their help please add your name to their list and we you will not receive a bulk email from us or any other ethical bulk emailer. Also if you wish to have your product or service promoted by Bulk mail please call 561-347-7304 From rah at shipwright.com Sun Sep 6 09:46:07 1998 From: rah at shipwright.com (Robert Hettinga) Date: Mon, 7 Sep 1998 00:46:07 +0800 Subject: IP: Encryption Expert Says U.S. Laws Led to Renouncing of Citizenship Message-ID: --- begin forwarded text Delivered-To: ignition-point at majordomo.pobox.com X-Sender: believer at telepath.com Date: Mon, 07 Sep 1998 11:29:29 -0500 To: believer at telepath.com From: believer at telepath.com Subject: IP: Encryption Expert Says U.S. Laws Led to Renouncing of Citizenship Mime-Version: 1.0 Sender: owner-ignition-point at majordomo.pobox.com Precedence: list Reply-To: believer at telepath.com Source: New York Times http://www.nytimes.com/library/tech/yr/mo/cyber/articles/06encrypt.html September 6, 1998 Encryption Expert Says U.S. Laws Led to Renouncing of Citizenship By PETER WAYNER Most people who leave the United States and move to the Caribbean dream of the freedom of perfect beaches, warm winters and tropical fruits. Vince Cate says he sees a world where he has complete freedom to write computer software and send it around the world. In 1994, Cate moved to Anguilla and helped bring Internet service to the tiny island. Last Sunday night, he went a step further and flew to Barbados, site of the nearest American consulate, to fill out the paperwork to renounce his U.S. citizenship. Cate, an encryption expert and one of the sponsors of an annual academic conference on financial cryptography in Anguilla, said he made the decision because he is setting up a new company, Secure Accounts, that will design and build basic software to handle electronic transactions. The software will rely heavily on encryption to scramble the data traveling between users in order to prevent fraud, theft and embezzlement. After renouncing his citizenship, Cate said in an e-mail message that he wanted "to be free from the silly U.S. laws on crypto." Normally, setting up an international company does not require forgoing citizenship in the United States, but Cate's expertise in creating encryption software places him in a special class. If he were to offer any advice to non-U.S. citizens about the encryption work built into his financial transaction software, he would violate U.S. laws, which treat the transfer of such encryption as illegal international arms traffic. These laws apply throughout the world and are intended to stop U.S. citizens from assisting others in developing encryption software. "I'm not actually writing any crypto code," Cate said in a telephone interview on Thursday. "But I'm supervising people who are." The U.S. government treats secret coding software in the same way it treats howitzers, tanks and chemical weapons because it can allow foreigners to hide their communications from U.S. intelligence-gathering organizations. In past wars, the United States gained important advantages in the field of battle through carefully gathered information, and the government does not want to lose what it sees as technical high ground. Many American software companies, however, see themselves losing market share to foreign competitors who are able to create encryption products unhampered by U.S. laws. They argue that good cryptographic expertise is already well distributed around the world and that the laws only give foreign competitors an advantage. "We can provide a solution that works over the whole planet." Cate said of his company. "U.S. companies can only provide a solution that is U.S. only. We certainly have a competitive edge by being offshore." Recently, many leading software companies like Sun Microsystems and C2 Net have opened branches outside the United States, hiring foreign nationals to do the work. This has required a complicated dance to avoid breaking U.S. export laws like the ones that Cate is escaping. Steve Walker, the former president of the encryption manufacturer Trusted Information Systems, said of Cate's move, "All of us have thought from time to time that we're fed up with things, but in reality it doesn't accomplish much and you give up a lot." Sameer Parekh, the president of the Web server company C2 Net, said: "I think it's essential if you want business that you're doing your development overseas. It's pretty clear to anyone internationally that anything exportable [from the United States] is a joke." C2 Net has development offices in Anguilla and Newbury, England. Parekh says that there is great demand overseas for programmers who know cryptography. Walker agreed that American companies are hurt by the existing laws. "There are foreign companies out there who are doing very well," he said, "in part because they're selling products out there that the U.S. can't sell." Rozell Thompson, a lawyer who specializes in negotiating export licenses, said of Cate's decision: " I think that's pretty unnecessary in this particular case. If you're developing crypto for financial applications, it's exportable anyways. There's a recognition that cryptography for electronic commerce applications is going to be exportable." The government is more lenient with software used by banks and other financial institutions, in part because it recognizes the great need for such software and in part because it already receives reports about much of the transaction data cloaked by the encryption. Thompson said that Cate would probably have been able to negotiate some sort of license with the U.S. government, although this would have taken months and would need to be repeated for each new project. Cate's move also illuminates a bit of the international market for citizenship. Before renouncing his U.S. citizenship, Cate became a citizen of Mozambique for a fee of about $5,000. "This makes me an American-African," he joked. Cate's current home, Anguilla, requires people to wait 15 years before applying for citizenship. He moved there in 1994 and has worked to establish strong ties. In his spare time, he runs a computer club that places old computers in the island's schools. "The computer club is also my best source of talent searching," he said. "I have hired three students right out of high school because I knew them from the computer club." Edward Betancourt, a lawyer for the U.S. Department of State, said that the notion that a person could freely choose their citizenship dates back to the war of 1812, when British warships would often capture Americans under the argument that they were really British subjects. He said: "Most people seem to renounce for family reasons. They haven't lived in the U.S. for some time and they don't want to deal with another bureaucracy. Whether a person articulates [the decision] to us or not is up to them. In most instances, people say 'I'm grateful to the U.S. and it's not done in anger.'" In 1996, the latest year for which data is available, 612 people lost their citizenship. This number includes people like Cate who renounced their citizenship, as well as others who expatriated themselves by serving in foreign governments. The government requires a lengthy interview, in part to determine whether people are leaving for tax reasons and to ensure that the decision is made correctly. Right now, Cate sees several advantages in his choice. "There's less chance of getting in any trouble with the U.S. government and there's also less chance of getting shot by a terrorist," he said, referring to the recent actions targeting U.S. citizens. Copyright 1998 The New York Times Company ----------------------- NOTE: In accordance with Title 17 U.S.C. section 107, this material is distributed without profit or payment to those who have expressed a prior interest in receiving this information for non-profit research and educational purposes only. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml ----------------------- ********************************************** To subscribe or unsubscribe, email: majordomo at majordomo.pobox.com with the message: (un)subscribe ignition-point email at address ********************************************** www.telepath.com/believer ********************************************** --- end forwarded text ----------------- Robert A. Hettinga Philodox Financial Technology Evangelism 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From Me2again3 at aol.com Mon Sep 7 01:19:06 1998 From: Me2again3 at aol.com (Me2again3 at aol.com) Date: Mon, 7 Sep 1998 01:19:06 -0700 (PDT) Subject: MORE MONEY THAN YOU CAN SPEND!!! Message-ID: <79fe2d38.35f38fd2@aol.com> WAIT! Don�t Delete this message. I know what you�re probably thinking, but think again. This is without a doubt the best way to make money I have ever tried and you owe it to yourself to at least try it. You have practically nothing to lose ( It doesn�t even take very much time) and so much to gain. If you will read this letter and do exactly as it says, you will soon find that life is good....very good! read on!!! $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ This is a LEGAL, MONEYMAKING PHENOMENON. PRINT this letter, read the directions, THEN READ IT AGAIN !!! You are about to embark on the most profitable and unique program you may ever see. Many times over, it has demonstrated and proven its ability to generate large amounts of cash. This program is showing fantastic appeal with a huge and ever-growing on-line population desirous of additional income. This is a legitimate, LEGAL, moneymaking opportunity. It does not require you to come in personal contact with people, do any hard work, and best of all, you never have to leave the house, except to get the mail and go to the bank! This truly is that lucky break you've been waiting for! Simply follow the easy instructions in this letter, and your financial dreams can come true! When followed correctly, this electronic, multilevel marketing program WORKS! Thousands of people have used this program to: - Raise capital to start their own business - Pay off debts - Buy homes, cars, etc., - Even retire! This is your chance, so don't pass it up! ------------------------------------------------------------------------------ ---- OVERVIEW OF THIS EXTRAORDINARY ELECTRONIC MULTILEVEL MARKETING PROGRAM ------------------------------------------------------------------------------ ---- Basically, this is what we do: We send thousands of people a product that they paid us $5.00 US for, that costs next to nothing to produce and e-mail back to them. As with all multilevel businesses, we build our business by recruiting new partners and selling our products. Every state in the U.S. allows you to recruit new multilevel business online (via your computer). We are not promising you anything. You have to put forth some effort to make this business work, but come on how hard is emailing! The products in this program are a series of four business and financial reports costing $5.00 each. Each order you receive is to include: * $5.00 cash United States Currency * The name and number of the report they are ordering * The e-mail address where you will e-mail them the report they ordered. To fill each order, you simply e-mail the product to the buyer. THAT'S IT! The $5.00 is yours! This is the EASIEST electronic multilevel marketing business anywhere! FOLLOW THE INSTRUCTIONS TO THE LETTER AND BE PREPARED TO REAP THE STAGGERING BENEFITS! ******* I N S T R U C T I O N S ******* This is what you MUST do: 1. Order all 4 reports shown on the list below (you can't sell them if you don't order them). * For each report, send $5.00 CASH, the NAME & NUMBER OF THE REPORT YOU ARE ORDERING, YOUR E-MAIL ADDRESS, and YOUR RETURN POSTAL ADDRESS (in case of a problem) to the person whose name appears on the list next to the report. * When you place your order, make sure you order each of the four reports. You will need all four reports so that you can save them on your computer and resell them. * Within a few days you are to receive, via e-mail, each of the four reports. Save them on your computer so they will be accessible for you to send to the 1,000's of people who will order them from you. 2. IMPORTANT -- DO NOT alter the names of the people who are listed next to each report, or their sequence on the list, in any way other than is instructed below in steps "a" through "d" or you will lose out on the majority of your profits. Once you understand the way this works, you'll also see how it doesn't work if you change it. Remember, this method has been tested, and if you alter it, it will not work. a. Look below for the listing of available reports. b. After you've ordered the four reports, replace the name and address under REPORT #1 with your name and address, moving the one that was there down to REPORT #2. c. Move the name and address that was under REPORT #2 down to REPORT #3. d. Move the name and address that was under REPORT #3 down to REPORT #4. e. The name and address that was under REPORT #4 is removed from the list and has NO DOUBT collected large sums of cash! Please make sure you copy everyone's name and address ACCURATELY!!! 3. Take this entire letter, including the modified list of names, and save it to your computer. Make NO changes to the instruction portion of this letter. 4. Now you're ready to start an advertising campaign on the WORLDWIDE WEB! Advertising on the WEB can be very, very inexpensive, and there are HUNDREDS of FREE places to advertise. Another avenue which you could use for advertising is e-mail lists. You can buy these lists for under $20/2,000 addresses or you can pay someone to take care of it for you. BE SURE TO START YOUR AD CAMPAIGN IMMEDIATELY! 5. For every $5.00 you receive, all you must do is e-mail them the report they ordered. THAT'S IT! ALWAYS PROVIDE SAME-DAY SERVICE ON ALL ORDERS! This will help guarantee that the e-mail THEY send out, with YOUR name and address on it, will be prompt because they can't advertise until they receive the report! To grow fast be prompt and courteous. ------------------------------------------ AVAILABLE REPORTS ------------------------------------------ ***Order Each REPORT by NUMBER and NAME*** Notes: - ALWAYS SEND $5 CASH FOR EACH REPORT - ALWAYS SEND YOUR ORDER VIA THE QUICKEST DELIVERY - Make sure the cash is concealed by wrapping it in at least two sheets of paper - On one of those sheets of paper, include: (a) the number & name of the report you are ordering, (b) your e-mail address, and (c) your postal address. _________________________________________________________________ REPORT #1 "HOW TO MAKE $250,000 THROUGH MULTILEVEL SALES" ORDER REPORT #1 FROM: Me2Again3 4205 NE 130th AVE. Vancouver, WA. 98682 _________________________________________________________________ REPORT #2 "MAJOR CORPORATIONS AND MULTILEVEL SALES" ORDER REPORT #2 FROM JAYSON DIAS 4793 Birkdale Cir. Fairfield, CA 94585 _________________________________________________________________ REPORT #3 "SOURCES FOR THE BEST MAILING LISTS" ORDER REPORT #3 FROM: BOBAYAA 3505 W. Melissa Ln. Douglasville, GA 30135 _________________________________________________________________ REPORT #4 "EVALUATING MULTILEVEL SALES PLANS" ORDER REPORT #4 FROM: :M&J's P.O. Box 116 Whitewater, KS _________________________________________________________________ ------------------------------------------------------------------------------ -------------------- HERE'S HOW THIS AMAZING PLAN WILL MAKE YOU $MONEY$ ------------------------------------------------------------------------------ -------------------- Let's say you decide to start small just to see how well it works. Assume your goal is to get 10 people to participate on your first level. (Placing a lot of FREE ads on the Internet will EASILY get a larger response.) Also assume that everyone else in YOUR ORGANIZATION gets ONLY 10 downline members. Follow this example to achieve the STAGGERING results below. First level--your 10 members with $5...........................................$50 Second level--10 members from those 10 ($5 x 100)..................$500 Third level--10 members from those 100 ($5 x 1,000)..........$5,000 Fourth level--10 members from those 1,000 ($5 x 10,000)...$50,000 THIS TOTALS ----------->$55,550 and more to come! Remember friends, this assumes that the people who participate only recruit 10 people each. Think for a moment what would happen if they got 20 people to participate! Lots of people get 100s of participants! THINK ABOUT IT! Your cost to participate in this is practically nothing (surely you can afford $20). You obviously already have an Internet connection and e-mail is FREE! REPORT#3 shows you the most productive methods for bulk e-mailing and purchasing e-mail lists. Some list & bulk e-mail vendors even work on trade! About 50,000 new people get online every month! *******TIPS FOR SUCCESS******* * TREAT THIS AS YOUR BUSINESS! Be prompt, professional, and follow the directions accurately. * Send for the four reports IMMEDIATELY so you will have them when the orders start coming in because: When you receive a $5 order, you MUST send out the requested product/report to comply with the U.S. Postal & Lottery Laws, Title 18, Sections 1302 and 1341 or Title 18, Section 3005 in the U.S. Code, also Code of Federal Regs. vol. 16, Sections 255 and 436, which state that "a product or service must be exchanged for money received." * ALWAYS PROVIDE SAME-DAY SERVICE ON THE ORDERS YOU RECEIVE. * Be patient and persistent with this program. If you follow the instructions exactly, the results WILL undoubtedly be SUCCESSFUL! * ABOVE ALL, HAVE FAITH IN YOURSELF AND KNOW YOU WILL SUCCEED! *******YOUR SUCCESS GUIDELINE******* Follow these guidelines to help assure your success: If you don't receive 10 to 20 orders for REPORT #1 within two weeks, continue advertising until you do. Then, a couple of weeks later you should receive at least 100 orders for REPORT #2. If you don't, continue advertising until you do. Once you have received 100 or more orders for REPORT #2, YOU CAN RELAX, because the system is already working for you, and the cash can continue to roll in! THIS IS IMPORTANT TO REMEMBER: Every time your name is moved down on the list, you are placed in front of a DIFFERENT report. You can KEEP TRACK of your PROGRESS by watching which report people are ordering from you. If you want to generate more income, send another batch of e-mails and start the whole process again! There is no limit to the income you will generate from this business! NOTE: If you need help with starting a business, registering a business name, how income tax is handled, etc., contact your local office of the Small Business Administration (a Federal agency) for free help and answers to questions. Also, the Internal Revenue Service offers free help via telephone and free seminars about business taxes. This letter has been edited to help comply with the Federal Trade Commission requirements. Any amounts of earnings listed in this letter can be factual or fictitious. Your earnings and results are highly dependent on your activities and advertising. This letter constitutes no guarantees stated nor implied. In the event that it is determined that this letter constitutes a guarantee of any kind, that guarantee is now void. If you have any question of the legality of this letter contact the Office of Associate Director for Marketing Practices Federal Trade Commission Bureau of consumer Protection in Washington, DC. *******T E S T I M O N I A L S******* This program does work, but you must follow it EXACTLY! Especially the rule of not trying to place your name in a different position, it won't work and you'll lose a lot of potential income. I'm living proof that it works From gwb at gwb.com.au Mon Sep 7 02:01:58 1998 From: gwb at gwb.com.au (Global Web Builders) Date: Mon, 7 Sep 1998 02:01:58 -0700 (PDT) Subject: One Nation's Primary Industry Policy Message-ID: <1.5.4.32.19980907090341.008d8474@gwb.com.au> Dear One Nation supporter in NSW Pauline Hanson's One Nation has just released its Primary Industry policy. Please view: http://www.gwb.com.au/onenation/policy/dpi.html for details GWB Scott Balson From edsmith at IntNet.net Sun Sep 6 12:26:07 1998 From: edsmith at IntNet.net (Edwin E. Smith) Date: Mon, 7 Sep 1998 03:26:07 +0800 Subject: "In dreams begin responsibility" - W.B. Yeats In-Reply-To: <19980904224426.3.MAIL-SERVER@pub1.pub.whitehouse.gov> Message-ID: <3.0.2.32.19980906142140.008f3740@mailhost.IntNet.net> At 06:22 PM 9/5/98 -0000, you wrote: > > >---------- >| Date: vrijdag 4 september 1998 22:44:00 >| From: The White House >| To: Public-Distribution at pub.pub.whitehouse.gov >| Subject: 1998-09-04 Remarks by President to Officials of Gateway Computers >| ---crap cut--- I thought you were dead. From guy at panix.com Sun Sep 6 13:10:07 1998 From: guy at panix.com (Information Security) Date: Mon, 7 Sep 1998 04:10:07 +0800 Subject: Thoughtcrime Message-ID: <199809062006.QAA12936@panix7.panix.com> > From: Ray Arachelian > > IMHO, it shouldn't matter to us who is arrested, whether Jim Bell, Toto, > Anonymous, or Vulis if the crime is nothing more than thoughtcrime. Whether something is "thoughtcrime" can be shades of grey, when it involves talk of threats of violence. Thoughtcrime: arrested for possessing or viewing certain images of sex. 1/4 shade of grey: lottery talk to terminate government workers. 1/2 shade of grey: above person also caught hassling government employees. (I haven't really followed the Bell case; wasn't he caught stink-bombing IRS offices or something? 3/4 shade of grey: a magazine accepting an ad for ~"killer for hire". black: Vulis sending threats in my name. ---guy, Vulis AntiMatter From guy at panix.com Sun Sep 6 13:15:17 1998 From: guy at panix.com (Information Security) Date: Mon, 7 Sep 1998 04:15:17 +0800 Subject: 090498_crypto Message-ID: <199809062012.QAA00594@panix7.panix.com> Ying: > From: Jim Choate > > Tauzin: FBI won't get crypto key and more on high-tech and Capitol Hill > September 3, 1998 5:55 PM PT > Updated at 6:58 PM PT > > SAN FRANCISCO -- An influential Congressman says Congress is close to > resolving the bitter dispute over encryption software, and it looks as > though it will be decided in favor of the high-tech industry. > > U.S. Rep. Bill Tauzin, R-La., said flatly that "we're not going to > give the FBI the keys to the encryption system." The remark came as > part of a wide-ranging interview with ZDNN. Yang: Subject: Terrorist FBI, on Terrorism Date: Fri, 4 Sep 1998 09:58:23 EDT Statement for the Record FBI Director Louis J. Freeh before the Senate Judiciary Committee, September 3, 1998 Good morning Chairman Hatch and members of the judiciary committee. I am pleased to be with you this morning as you explore the U.S. Government's response to international terrorism. [snip] THE FUTURE Would like to close by talking briefly about steps we can take to further strengthen our abilities to prevent and investigate terrorist activity. ENCRYPTION One of the most important of these steps involves the FBI's encryption initiative. Communication is central to any collaborative effort -- including criminal conspiracies. Like most criminals, terrorists are naturally reluctant to put the details of their plots down on paper. Thus, they generally depend on oral or electronic communication to formulate the details of their terrorist activities. For this reason, the law enforcement community is very concerned about the serious threat posed by the proliferation of encryption technology. Current standards do not allow for law enforcement access or the timely decryption of critical evidence obtained through lawful electronic surveillance or search and seizures. The FBI supports a balanced encryption policy that satisfies fourth amendment concerns for privacy, the commercial needs of industry for robust encryption, and the government's public safety and national security needs. The encryption capabilities available to criminals and terrorists today effectively thwart the ability of law enforcement agencies to implement the court-ordered surveillance techniques that have helped put some of the nation's most dangerous offenders behind bars. Whether a state police department is racing the clock to find a kidnapped child or the FBI is attempting to track and prevent the destructive ambitions of an international terrorist group, the need for timely access to legally obtained electronic surveillance cannot be overstated. [snip] EXPANSION OF FBI LEGATS Likewise, the expansion of the number of FBI LEGATS around the world has enhanced the ability of the FBI to prevent, respond to, and investigate terrorist acts committed by international terrorists against U.S. Interests worldwide. As evidenced by developments in the embassy bombing cases in East Africa, the ability to bring investigative resources to bear quickly in the aftermath of a terrorist act can have significant impact on our ability to identify those responsible. I encourage Congress to support our efforts to counter the international terrorist threat by continuing to support expansion of our LEGAT program. [snip] From rah at shipwright.com Sun Sep 6 13:57:46 1998 From: rah at shipwright.com (Robert Hettinga) Date: Mon, 7 Sep 1998 04:57:46 +0800 Subject: "Einstein's degree wasn't honorary...." In-Reply-To: <199809050213.VAA10742@einstein.ssz.com> Message-ID: ...says Jim Choate from the bowels of my kill file. I believe I was talking about his doctorate, which, I think you'll see, was in fact given to him on the strength of his already published work, by a school in which he wasn't enrolled. I would call that, no matter the rigor attached to the degree and the quality of the school handing it out -- both of which were considerable, if I remember -- an "honorary" doctorate. As honorary degrees go, the Swiss school which did confer a doctorate upon Einstein, and upon Diffie as well, I think, was supposed to be about the best one you can get. Cheers, Bob Hettinga ----------------- Robert A. Hettinga Philodox Financial Technology Evangelism 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From ravage at einstein.ssz.com Sun Sep 6 14:28:50 1998 From: ravage at einstein.ssz.com (Jim Choate) Date: Mon, 7 Sep 1998 05:28:50 +0800 Subject: Einsteins Doctorate Message-ID: <199809062144.QAA00440@einstein.ssz.com> Forwarded message: > X-within-URL: http://tesuque.cs.sandia.gov/~bbooth/docs/einstein/einachievements.html > Einstein worked at the patent office in Bern, Germany from 1902 to 1909. While > he was there, he completed many publications of his theories concerning > physics. He finished these on his own with no help from any scientific > literature or colleagues. Eins tein earned a doctorate from the University of > Zurich in 1905. In 1908, he became a lecturer at the Universtiy of Bern, and in > the following year became professor of physics at the University of Zurich. Nothing here or anywhere else I can find about Einstein getting an honorary anything other than a membership in the New York Plumbers Union after Albert had made a comment about being a plumber after being asked what he would do if he didn't do physics. ____________________________________________________________________ To understand is to invent Jean Piaget The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From ravage at EINSTEIN.ssz.com Sun Sep 6 14:36:35 1998 From: ravage at EINSTEIN.ssz.com (Jim Choate) Date: Mon, 7 Sep 1998 05:36:35 +0800 Subject: Einstein, more specific about degree Message-ID: <199809062153.QAA00511@einstein.ssz.com> Forwarded message: > X-within-URL: http://www.geocities.com/CapeCanaveral/Lab/3555/einwho2.html > Einstein as a patent clerk Albert Einstein returned to the Zurich > Polytechnic, after attending secondary school at Arau and graduated > there in the spring of 1900 as a secondary school teacher of > mathematics and physics. By then he had given up German citizenship in > favor of Swiss, to avoid the draft. He worked about two month as a > mathematics teacher, before he was employed as examiner at the Swiss > patent office in Bern. Having now a certain economic security he > married Mileva Maric, his university girlfriend three years later. > > Einstein became father in 1904 when his wife gave birth to his son > Hans Albert. > > Early in 1905 he published a thesis, "A New Determination of Molecular > Dimensions" in the prestigious physics monthly "Analen der Physik" > which won him a Ph.D. from the University and was the begin of the end > for the old view of the universe. Previous ____________________________________________________________________ To understand is to invent Jean Piaget The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From ulf at fitug.de Sun Sep 6 16:54:14 1998 From: ulf at fitug.de (Ulf =?iso-8859-1?Q?M=F6ller?=) Date: Mon, 7 Sep 1998 07:54:14 +0800 Subject: ISAKMP Key Recovery Extensions In-Reply-To: <199809011443.KAA23307@ietf.org> Message-ID: >From the IETF's IPSEC Working Group: Title : ISAKMP Key Recovery Extensions Author(s) : T. Markham Filename : draft-rfced-exp-markham-00.txt Pages : 13 Date : 31-Aug-98 This document describes the proposed approach for negotiating and exchanging key recovery information within the Internet Security Association Key Management Protocol (ISAKMP). ftp://ftp.ietf.org/internet-drafts/draft-rfced-exp-markham-00.txt From ravage at EINSTEIN.ssz.com Sun Sep 6 18:32:07 1998 From: ravage at EINSTEIN.ssz.com (Jim Choate) Date: Mon, 7 Sep 1998 09:32:07 +0800 Subject: Last Einstein & his degree... Message-ID: <199809070147.UAA00864@einstein.ssz.com> Forwarded message: > X-within-URL: http://www.humboldt1.com/~gralsto/einstein/early.html > After two years he obtained a post at the Swiss patent office in Bern. > The patent-office work required Einstein's careful attention, but > while employed (1902-09) there, he completed an astonishing range of > publications in theoretical physics. For the most part these texts > were written in his spare time and without the benefit of close > contact with either the scientific literature or theoretician > colleagues. Einstein submitted one of his scientific papers to the > University of Zurich to obtain a Ph.D. degree in 1905. In 1908 he sent > a second paper to the University of Bern and became a lecturer there. > The next year Einstein received a regular appointment as associate > professor of physics at the University of Zurich. ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From declan at pathfinder.com Sun Sep 6 19:15:27 1998 From: declan at pathfinder.com (Declan McCullagh) Date: Mon, 7 Sep 1998 10:15:27 +0800 Subject: 090498_crypto In-Reply-To: <199809062012.QAA00594@panix7.panix.com> Message-ID: Crypto came up a couple times during Q&A as well. -Declan On Sun, 6 Sep 1998, Information Security wrote: > Ying: > > > From: Jim Choate > > > > Tauzin: FBI won't get crypto key and more on high-tech and Capitol Hill > > September 3, 1998 5:55 PM PT > > Updated at 6:58 PM PT > > > > SAN FRANCISCO -- An influential Congressman says Congress is close to > > resolving the bitter dispute over encryption software, and it looks as > > though it will be decided in favor of the high-tech industry. > > > > U.S. Rep. Bill Tauzin, R-La., said flatly that "we're not going to > > give the FBI the keys to the encryption system." The remark came as > > part of a wide-ranging interview with ZDNN. > > Yang: > > Subject: Terrorist FBI, on Terrorism > Date: Fri, 4 Sep 1998 09:58:23 EDT > > Statement for the Record > FBI Director Louis J. Freeh before the Senate Judiciary Committee, > September 3, 1998 > > Good morning Chairman Hatch and members of the judiciary committee. I > am pleased to be with you this morning as you explore the U.S. > Government's response to international terrorism. > > [snip] > > THE FUTURE > > Would like to close by talking briefly about steps we can take to > further strengthen our abilities to prevent and investigate terrorist > activity. > > ENCRYPTION > > One of the most important of these steps involves the FBI's encryption > initiative. Communication is central to any collaborative effort -- > including criminal conspiracies. Like most criminals, terrorists are > naturally reluctant to put the details of their plots down on paper. > Thus, they generally depend on oral or electronic communication to > formulate the details of their terrorist activities. > > For this reason, the law enforcement community is very concerned about > the serious threat posed by the proliferation of encryption > technology. Current standards do not allow for law enforcement access > or the timely decryption of critical evidence obtained through lawful > electronic surveillance or search and seizures. > > The FBI supports a balanced encryption policy that satisfies fourth > amendment concerns for privacy, the commercial needs of industry for > robust encryption, and the government's public safety and national > security needs. > > The encryption capabilities available to criminals and terrorists > today effectively thwart the ability of law enforcement agencies to > implement the court-ordered surveillance techniques that have helped > put some of the nation's most dangerous offenders behind bars. Whether > a state police department is racing the clock to find a kidnapped > child or the FBI is attempting to track and prevent the destructive > ambitions of an international terrorist group, the need for timely > access to legally obtained electronic surveillance cannot be > overstated. > > [snip] > > EXPANSION OF FBI LEGATS > > Likewise, the expansion of the number of FBI LEGATS around the world > has enhanced the ability of the FBI to prevent, respond to, and > investigate terrorist acts committed by international terrorists > against U.S. Interests worldwide. As evidenced by developments in the > embassy bombing cases in East Africa, the ability to bring > investigative resources to bear quickly in the aftermath of a > terrorist act can have significant impact on our ability to identify > those responsible. I encourage Congress to support our efforts to > counter the international terrorist threat by continuing to support > expansion of our LEGAT program. > > [snip] > > From tcmay at got.net Sun Sep 6 20:06:10 1998 From: tcmay at got.net (Tim May) Date: Mon, 7 Sep 1998 11:06:10 +0800 Subject: What we are Fighting In-Reply-To: <199809062012.QAA00594@panix7.panix.com> Message-ID: >> Subject: Terrorist FBI, on Terrorism >> Date: Fri, 4 Sep 1998 09:58:23 EDT >> >> Statement for the Record >> FBI Director Louis J. Freeh before the Senate Judiciary Committee, >> September 3, 1998 >> The FBI supports a balanced encryption policy that satisfies fourth >> amendment concerns for privacy, the commercial needs of industry for >> robust encryption, and the government's public safety and national >> security needs. For the Nth time, let me restate the obvious: all current crypto restrictions being discussed involve _exports_. There are no domestic restrctictions whatsoever on domestic use of crypto. Any of us, even resident aliens, tourists, terrorists, etc. are perfectly free to use PGP, one time pads, stego, and even Meganet Snake Oil Unbreakable Crypto. There are, officially, no proposals on the table to limit speech within the U.S. by limiting the types and forms of language may use. There is the SAFE bill, which stands zero chance of passing, but this involves relaxing export requirements (though I expect compromises added, such as the felonization of crypto use in a crime, are an unwelcome step toward domestic restrictions). But it bears constant repeating, especially to the skeptical, that there are NO DOMESTIC CRYPTO LAWS. Unlike some other countries, the fascists have not yet managed to get a foothold in the attempt to limit use of crypto by the citizen-units. We all know this, but Freeh and Company continue to mumble about "meeting the legitmate needs of law enforcement." What can they be speaking of? And since the Fourth Amendment is an internal U.S. thing (not counting limited applicability to some foreigners, and of course to U.S. citizens abroad who encounter U.S. offices, etc.), what can Louis possibly be referring to when he speaks of the Fourth Amendment? Surely he is not referring to satisfying the Fourth Amendment concerns for privacy amongst the Russians, Afghans, and so forth? Obviously his side is contemplating domestic crypto restrictions. We all know this, but it sometimes bears repeating what the Constitution says, what the status quo is, and what they are proposing. They are planning domestic crypto restrictions, GAK, and all the rest of what we have long expected. When that comes, anyone will be full jusfified in taking action by any means necessary to halt the onset of the total state. --Tim May "The tree of liberty must be watered periodically with the blood of tyrants...." ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Licensed Ontologist | black markets, collapse of governments. From stuffed at stuffed.net Mon Sep 7 12:16:27 1998 From: stuffed at stuffed.net (STUFFED NEWS DAILY) Date: Mon, 7 Sep 1998 12:16:27 -0700 (PDT) Subject: Bruise Cruise: New charter liner offers harsh reception/Grave Throbbing: Cemetary sex Message-ID: <19980907071001.28854.qmail@eureka.abc-web.com> Our Photo Editor had a field day today selecting a superb bunch of pics for you. So surf over to Stuffed now, and enjoy today's hot extravaganza! + PAGE 2 'SPREAD' + THUMBNAIL HEAVEN + GOOD F**K CHARM + SEXY STORY: "MY BEST FRIEND" + THE VERY BEST OF EUREKA! + CLITTY CLITTY BANG BANG + SUPER SEXY SURPRISE THUMBS + THUMBNAIL ORGY + ULTRA HI-RES POSTER PIC + LOADS AND LOADS MORE STUFF! - Happy Labor Day! ----> http://stuffed.net/98/9/7/ <---- Welcome to today's issue of Stuffed. To read it you should click on the URL above. If it is not made clickable by your email program you will need to use your mouse to highlight the URL, copy it and then paste it into your browser (then press Return). This email is never sent unsolicited. Stuffed is the supplement for the Eureka newsletter you subscribed to. Full instructions on unsubscribing are in every issue of Eureka! ----> http://stuffed.net/98/9/7/ <---- From announce at inbox.nytimes.com Sun Sep 6 21:20:16 1998 From: announce at inbox.nytimes.com (New York Times subscription robot) Date: Mon, 7 Sep 1998 12:20:16 +0800 Subject: Welcome to The New York Times on the Web Message-ID: <199809070504.AAA45356@inbox.nytimes.com> Welcome bogus47, Thank you for registering for The New York Times on the Web! Your ID is bogus47 You selected your password at registration. Your e-mail address is cypherpunks at cyberpass.net The Times on the Web brings you the authority and integrity of The New York Times, with the immediacy, utility and depth of the Internet. You'll find the daily contents of The Times, along with news updates every 10 minutes from the Associated Press and throughout the day from New York Times editors. You'll also find reports and features exclusive to the Web in our Technology and Books areas. You can explore a 365-day archive of The New York Times for free, and download articles at a small charge. The site also features: == Up-to-the-minute sports scores and statistics == Breaking market news and custom stock portfolios == Current weather conditions and five-day forecasts for more than 1,500 cities worldwide == A free, searchable library of more than 50,000 New York Times book reviews == A searchable database of help wanted listings == The crossword puzzle, bridge and chess columns, available by subscription Thanks again for registering. Please visit us again soon at http://www.nytimes.com Sincerely, Rich Meislin Editor in Chief The New York Times Electronic Media company ***************************************** Please do not reply to this message. If you did not authorize this registration, someone has mistakenly registered using your e-mail address. We regret the inconvenience; please see http://www.nytimes.com/subscribe/help/cancel.html for instructions. For more information about The New York Times on the Web and your registration, please visit the Help Center at: http://www.nytimes.com/subscribe/help/ From jonkc at worldnet.att.net Sun Sep 6 23:05:10 1998 From: jonkc at worldnet.att.net (John Clark) Date: Mon, 7 Sep 1998 14:05:10 +0800 Subject: Shakespeare Message-ID: <000201bdda24$dd4c87e0$0d924d0c@flrjs> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Tim May tcmay at got.net Wrote: >I read part of a book about some pretty convincing evidence that the >works of "Shakespeare" were probably written by a member of Queen >Elizabeth's royal court. I think that's unlikely, the myth probably started because some people can't imagine a person without royal blood being a genius. >This guy had the time, had the education, knew the workings of >royalty, and was an accomplished writer...all things the nearly-illiterate >(evidence shows) Wm. Shakespeare, a merchant, did not have. There is little evidence that Shakespeare was a merchant, although his father was, he was a glover and a very successful one, at least until Shakespeare was a teenager when his Father lost most of his money. Although he doesn't seem to have gone to collage, as the son of a rich man he did go to the equivalent of very good grade and high schools where he certainly learned Latin and Greek and History. In addition there Is a 10 year gap between the time he finished "high school" and he when he wrote his first play. Some think he traveled, some think he was in the military, whatever he did he must have learned about the world. Also, I don't see how an actor could be illiterate, true he did spell his name differently on occasion but that wasn't unusual at a time before spelling was standardized. There was certainly an actor named William Shakespeare who got rich off the royalties from plays he claimed to have written over a period of 20 years, he made enough money to buy the second largest house in his hometown. If Shakespeare didn't write them it's hard to understand why the real author never objected but instead kept writing new plays to make another man even more money. >one of the biggest problems with applying computerized analysis >to these works is the paucity of material known to be written by the >"real" Wm. Shakespeare, the historical person. If you look at all the words in Shakespeare's plays and poems you will find that about 30% of the words he uses one time and never again in anything he wrote. This percentage is vastly greater than any other writer of his day or our own. I think this statistic is amazing and probably important, but I confess I'm not quite sure what to make of it. Does it prove it was written by a committee or by a genius who could always find exactly the right word? I lean toward the genius theory. PS; Tim this is the first time I've had the pleasure of responding to one of your posts since you were on the Extropian List, I'm still on that list because it has a much higher signal to noise ratio than most, feel free to drop by for a visit, you would be welcome. John K Clark jonkc at att.net -----BEGIN PGP SIGNATURE----- Version: PGP for Personal Privacy 5.5.5 iQA/AwUBNfN1JN+WG5eri0QzEQIVTACfbLmnspemT7gid05/JlPBDtuMUfUAoP+E S8k9L8yiMJmJzN+chRDY7tjV =vAg0 -----END PGP SIGNATURE----- From fod at brd.ie Sun Sep 6 23:43:03 1998 From: fod at brd.ie (Frank O'Dwyer) Date: Mon, 7 Sep 1998 14:43:03 +0800 Subject: [Fwd: ISAKMP Key Recovery Extensions] Message-ID: <35F37E90.76109489@brd.ie> Well, the attached draft is not designed for corporate recovery of encrypted email, that's for sure. Cheers, Frank O'Dwyer. To: cryptography at c2.net, cypherpunks at algebra.com Subject: Re: ISAKMP Key Recovery Extensions From: ulf at fitug.de (Ulf M�ller) Date: Mon, 7 Sep 98 01:47 +0200 In-Reply-To: <199809011443.KAA23307 at ietf.org> Organization: HR13 Sender: owner-cypherpunks at algebra.com >From the IETF's IPSEC Working Group: Title : ISAKMP Key Recovery Extensions Author(s) : T. Markham Filename : draft-rfced-exp-markham-00.txt Pages : 13 Date : 31-Aug-98 This document describes the proposed approach for negotiating and exchanging key recovery information within the Internet Security Association Key Management Protocol (ISAKMP). ftp://ftp.ietf.org/internet-drafts/draft-rfced-exp-markham-00.txt From wombat at mcfeely.bsfs.org Mon Sep 7 00:00:52 1998 From: wombat at mcfeely.bsfs.org (Rabid Wombat) Date: Mon, 7 Sep 1998 15:00:52 +0800 Subject: Shakespeare In-Reply-To: <000201bdda24$dd4c87e0$0d924d0c@flrjs> Message-ID: On Mon, 7 Sep 1998, John Clark wrote: > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA1 > > Tim May tcmay at got.net Wrote: > > >I read part of a book about some pretty convincing evidence that the > >works of "Shakespeare" were probably written by a member of Queen > >Elizabeth's royal court. > > I think that's unlikely, the myth probably started because some people can't > imagine a person without royal blood being a genius. > It is possible that you are both right, to some extent. Shakespeare has often been accused of borrowing other's works, but the practice was quite common in his day. If one author could not pull off a successful presentation of a story line, another would often pick up the idea, refine it, and present the concept in a somewhat different light. There were no copyrights in those days. (it was also hard to come by an entire script - these were jealously guarded to discourage plagirism - if a play was "copied", it was more often from memory of a performance, or from the recollection of actors than from the actual script itself) There were also two distinct forms of theatre; the small indoor presentations (such as were presented to the royal court) were highbrow, while the outdoor theatres were sustained by the commoners and varied from the serious to the bawdy (or downright vulgar - the outdoor theatres were not well received in some social circles, either). It is entirely possible that a play that failed to gain acceptance, or even an audience, at a more prestigeous indoor theatre was re-worked by another author for the Theatre, or even the Curtain (a rowdy playhouse that often doubled as a bear pit). Shakespeare may very well have picked up the central theme for one(or more) of his works from an obscure indoor play, possibly written by a courtier; that doesn't diminish his genius. From whgiii at invweb.net Mon Sep 7 00:38:02 1998 From: whgiii at invweb.net (William H. Geiger III) Date: Mon, 7 Sep 1998 15:38:02 +0800 Subject: [Fwd: ISAKMP Key Recovery Extensions] In-Reply-To: <35F37E90.76109489@brd.ie> Message-ID: <199809070734.DAA21427@domains.invweb.net> In <35F37E90.76109489 at brd.ie>, on 09/07/98 at 07:34 AM, "Frank O'Dwyer" said: >Well, the attached draft is not designed for corporate recovery of >encrypted email, that's for sure. 4. ACKNOWLEDGMENTS This document was produced based on the combined efforts of the protocol subcommittee of the Key Recovery Alliance. Why am I not surprised? I hope the IETF will not accept the implementation of *any* GAK proposals into the RFC's. If these people want to force Big Brother on us they should not have the benefit of the IETF to do so. I plan on writting to the Security Group at the IETF on this. Hopefully it will not be accepted for consideration. I would like to see the IETF have a blanket policy automatically rejecting any GAK proposals but that might be too much to ask. -- --------------------------------------------------------------- William H. Geiger III http://www.openpgp.net Geiger Consulting Cooking With Warp 4.0 Author of E-Secure - PGP Front End for MR/2 Ice PGP & MR/2 the only way for secure e-mail. OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html --------------------------------------------------------------- From vznuri at netcom.com Mon Sep 7 01:01:00 1998 From: vznuri at netcom.com (Vladimir Z. Nuri) Date: Mon, 7 Sep 1998 16:01:00 +0800 Subject: Snakes of Medusa torment Larry Detweiler In-Reply-To: Message-ID: <199809070757.AAA07875@netcom13.netcom.com> hi timmy. we have reached a breakthrough in your psychotherapy in which you actually address me directly you completely gloss over my point about Linux, because it demonstrates my arguments very well. those who work on Linux are very similar to cpunks. distributed all over the world, and they are united by a common desire/vision and mailing lists. you have an unexpressed hatred of some aspects of hacking, of course, so you find linux repulsive and incomprehensible. this list has always lacked vision, by *anyone*. a group is united by a vision. if you have no vision, you have nothing but a bunch of anarchists who cannot accomplish anything substantial together. want proof? how about the history of the last few years of mounting irrelevance of this list? what you get is miniature projects that may succeed or fail, and if they succeed, an implication is carried that they are "cpunk" projects. there are obviously no cpunk projects. and that's the weakness of this so-called "group". any time such a project is proposed by anyone, self-righteous anarchists such as yourself shoot it down. ok, mount one of your lame arguments that "this is only a mailing list. there are no projects". again, precisely. you want more out of this list, or less? every time I tell you how to get more, you say you want less. every time you complain you get less, I tell you how to get more. sure, let's have an immature debate society. we've had that for what, ~6 years or so? the time flies when you're having fun aren't you somewhat ashamed that the recent EFF crack had *nothing* to do with anyone on this list? frankly, I think it's pretty lame. imagine the way a mailing list can help mobilize support and resources. we've seen glimpes in the past of this. instead Gilmore did it entirely behind the scenes, never announcing it to this list, because clearly no one here has the maturity to cooperate to complete a meaningful project. there are only complaints, as lead by the Lead Sniper. (wow, that's a funny term, with lots of implications, I think I might start using it more often!!!) btw, killed any cats lately?? a huge waste of talent, if you ask me, and the main reason that you have such a high turnover/attrition on this list. ever asked yourself why there is so much turnover/attrition here? but we're not going to get very far, with you conveniently deleting my key points as usual. stick your head in the digital /dev/null some more. see no VZN, hear no VZN, speak no VZN. truly your philosophy...!!! "eletrocracy"? I have no idea what you're talking about. whatever it is, it does sound pretty infantile!!! a useful straw man, I suppose. maybe if you elaborated it might refresh my memory From whgiii at invweb.net Mon Sep 7 01:07:33 1998 From: whgiii at invweb.net (William H. Geiger III) Date: Mon, 7 Sep 1998 16:07:33 +0800 Subject: KRAP is at it in the IETF Message-ID: <199809070805.EAA21826@domains.invweb.net> -----BEGIN PGP SIGNED MESSAGE----- Hello, It has come to my attention that the KRAP (key recovery alliance program) has submitted an I-D (internet draft) to the IETF for adding GAK (government access to keys) to the IPSEC protocols: ftp://ftp.ietf.org/internet-drafts/draft-rfced-exp-markham-00.txt ISAKMP Key Recovery Extensions 7. AUTHOR INFORMATION Tom Markham Secure Computing Corp 2675 Long Lake Road Roseville, MN 55113 USA Phone: 651.628.2754, Fax: 651.628.2701 EMail: tom_markham at securecomputing.com I consider this a perversion of the standards process of the IETF to advance a political agenda which must be stopped at all cost. Below are the e-mail addresses of some people that you should write (politely) expressing your objections to any such additions to the protocols: IPSEC Chairs: Theodore Ts'o Robert Moskowitz Security Area Directors: Jeffrey Schiller Marcus Leech As I mentioned before, be polite. These people are not the ones proposing GAK be added to the IPSEC protocols. They have put a lot of time and effort in forwarding the cause for strong encryption. They should be made aware of the communities objections to these attempts by KRAP. Thanks, - -- - --------------------------------------------------------------- William H. Geiger III http://www.openpgp.net Geiger Consulting Cooking With Warp 4.0 Author of E-Secure - PGP Front End for MR/2 Ice PGP & MR/2 the only way for secure e-mail. OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html - --------------------------------------------------------------- Tag-O-Matic: It's OS/2, Jim, but not OS/2 as we know it. -----BEGIN PGP SIGNATURE----- Version: 2.6.3a-sha1 Charset: cp850 Comment: Registered_User_E-Secure_v1.1b1_ES000000 iQCVAwUBNfOVk49Co1n+aLhhAQFJwwP+O4vrZVKFpOG8vCHFwbDuPIv/99AhBnKF RK/Ikc5y2gGKq9hfxkTb4o77YUrDaEGkYUPHk+ZC57Oag0Lu1v6W1EAbQ5T4RpzH JWYXOonQmbqw5rH0h6brzqrH3ep9Ej9DR0gv4mGgIfSNlJSUu6TWO5ZHXKWiE4yy 5flH0Ngg/TI= =EzNL -----END PGP SIGNATURE----- From vznuri at netcom.com Mon Sep 7 01:13:31 1998 From: vznuri at netcom.com (Vladimir Z. Nuri) Date: Mon, 7 Sep 1998 16:13:31 +0800 Subject: digital sig bill Message-ID: <199809070809.BAA08498@netcom13.netcom.com> ------- Forwarded Message To: believer at telepath.com From: believer at telepath.com Subject: IP: About Digital Signature Bill 09/05/98 0752 Source: US Newswire http://www.usnewswire.com/topnews/Current_Releases/0904-138.txt Abraham Urges Senate to Pass Digital Signature Bill U.S. Newswire 4 Sep 17:30 Abraham Urges Senate to Pass Digital Signature Bill Next Week To: National Desk Contact: Joe McMonigle of the Office of U.S. Sen. Spencer Abraham, 202-224-8833 WASHINGTON, Sept. 4 /U.S. Newswire/ -- While President Clinton used a visit in Ireland today to digitally sign an electronic commerce agreement with Irish Prime Minister Bertie Ahern on a laptop computer, U.S. Sen. Spencer Abraham (R-Mich.) urged his colleagues in the Senate to pass his legislation requiring federal agencies to start allowing the public to do the same. S.2107, the Government Paperwork Elimination Act, would require federal agencies to make versions of their forms available online and allow people to submit these forms with digital signatures instead of handwritten ones. It also sets up a process by which commercially developed digital signatures can be used in submitting forms to the government and permits the digital storage of federal documents. "If it's okay for President Clinton and Prime Minister Ahern, it should also be okay for the federal government to recognize the digital signature of ordinary Americans," Abraham said. "This legislation will bring the federal government into the electronic age, in the process saving American individuals and companies millions of dollars and hundreds of hours currently wasted on government paperwork," Abraham said. "Each and every year, Americans spend in excess of $600 billion simply filing out, documenting and handling government paperwork. This huge loss of time and money constitutes a significant drain on our economy and we must bring it under control." "By providing individuals and companies with the option of electronic filing and storage, this bill will reduce the paperwork burden imposed by government on the American people and the American economy. It will allow people to move from printed forms they must fill out using typewriters or handwriting to digitally-based forms that can be filled out using a word processor. This savings in time, storage and postage will be enormous," said Abraham. The Government Paperwork Elimination Act would: -- Require the federal government make available its forms online and allow citizens to sign forms by the use of digital signatures. -- Direct the Commerce Department to conduct a study of the impact of this Act on the use of digital signatures for electronic commerce and on individual privacy. -- Allow Executive Agencies 18 months to establish a method for agencies to put forms online. The forms must be able to be filled out, signed and filed with the agency electronically. -- Work to develop a system whereby fees and payments associated with the forms can also be submitted at the same time. For example, a citizen could use their tax software to create all the information necessary for filling out their tax forms, fill in the IRS online form, submit it and any indicated payments, and immediately receive a tax receipt. -- Enable the federal government to allow its employees to have digital signatures for use with citizens and allow agencies to use electronic notice where written notice had been required, if the citizen prefers electronic notice. -- Establish that a digital signature will have legal standing. -- Provide that Administration guidelines and procedures for electronic signatures that are used for the government forms that are compatible with those the private sector will be using for commerce, and specifies that any system used by the government must be industry and technology neutral. -- State that if an employer is required to collect, file and store paper forms that are completed by employees, that electronic storage will likely be accepted. -- Allow the government five years to implement these provisions. "The information age is no longer new. We are in the midst of a revolution in the way people do business and maintain records. The Government Paperwork Elimination Act will force Washington to catch up with these developments, and release our businesses from the drag of an obsolete bureaucracy as they pursue further innovations," said Abraham. Co-sponsors of the Paperwork Elimination Act include Sens. Ron Wyden (D-Ore.), Jack Reed (D-R.I.), John McCain (R-Ariz.), Trent Lott (R-Miss.), Thad Cochran (R-Miss.), and Conrad Burns (R-Mont.) -0- /U.S. Newswire 202-347-2770/ 09/04 17:30 Copyright 1998, U.S. Newswire - ----------------------- NOTE: In accordance with Title 17 U.S.C. section 107, this material is distributed without profit or payment to those who have expressed a prior interest in receiving this information for non-profit research and educational purposes only. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml - ----------------------- ********************************************** To subscribe or unsubscribe, email: majordomo at majordomo.pobox.com with the message: (un)subscribe ignition-point email at address ********************************************** www.telepath.com/believer ********************************************** ------- End of Forwarded Message From mok-kong.shen at stud.uni-muenchen.de Mon Sep 7 02:04:09 1998 From: mok-kong.shen at stud.uni-muenchen.de (Mok-Kong Shen) Date: Mon, 7 Sep 1998 17:04:09 +0800 Subject: IP: Encryption Expert Says U.S. Laws Led to Renouncing of Citizenship In-Reply-To: Message-ID: <35F3A0CC.37385749@stud.uni-muenchen.de> Robert Hettinga wrote: > > Sameer Parekh, the president of the Web server company C2 Net, said: > "I think it's essential if you want business that you're doing your > development overseas. It's pretty clear to anyone internationally that > anything exportable [from the United States] is a joke." Let's wait and see whether AES will be genuinely exportable. M. K. Shen From mok-kong.shen at stud.uni-muenchen.de Mon Sep 7 02:25:46 1998 From: mok-kong.shen at stud.uni-muenchen.de (Mok-Kong Shen) Date: Mon, 7 Sep 1998 17:25:46 +0800 Subject: request for [cdn] export laws. In-Reply-To: <3.0.3.32.19980905160024.0070f7c0@dowco.com> Message-ID: <35F3A435.4C8C4D26@stud.uni-muenchen.de> jkthomson wrote: > > I have been looking for the export restrictions (if any) that regulate > canadian encryption products. I have tried searching the net for a little Perhaps the URL http://www.efc.ca/ is of some interest to you. M. K. Shen From blancw at cnw.com Mon Sep 7 03:09:54 1998 From: blancw at cnw.com (Blanc) Date: Mon, 7 Sep 1998 18:09:54 +0800 Subject: Snakes of Medusa torment Larry Detweiler In-Reply-To: <199809070757.AAA07875@netcom13.netcom.com> Message-ID: <000701bdda48$215d3920$4f8195cf@blanc> >From Vladimir Z Neurological: : sure, let's have an immature debate society. we've had : that for what, ~6 years or so? the time flies when you're : having fun [ . . . ] : a huge waste of talent, if you ask me, and the main reason : that you have such a high turnover/attrition on this list. : ever asked yourself why there is so much turnover/attrition : here? [... and so forth ... ] ......................................................... I ask myself why you're still hanging around on this worthless list after all this time, LD, seeing as how you yourself - unlike everyone else - are so mature, so talented, and would rather be coding than wasting your time reading what TCM has to say about anything. It must be that you really enjoy it and find it intrinsically valuable. .. Blanc From guy at panix.com Mon Sep 7 05:05:17 1998 From: guy at panix.com (Information Security) Date: Mon, 7 Sep 1998 20:05:17 +0800 Subject: What we are Fighting Message-ID: <199809071201.IAA01590@panix7.panix.com> > From: Tim May > >Information "I am not a klook" Security wrote: > > >> Subject: Terrorist FBI, on Terrorism > >> Date: Fri, 4 Sep 1998 09:58:23 EDT > >> > >> Statement for the Record > >> FBI Director Louis J. Freeh before the Senate Judiciary Committee, > >> September 3, 1998 > > >> The FBI supports a balanced encryption policy that satisfies fourth > >> amendment concerns for privacy, the commercial needs of industry for > >> robust encryption, and the government's public safety and national > >> security needs. > > But it bears constant repeating, especially to the skeptical, that there > are NO DOMESTIC CRYPTO LAWS. > > We all know this, but Freeh and Company continue to mumble about "meeting > the legitmate needs of law enforcement." What can they be speaking of? > > Obviously his side is contemplating domestic crypto restrictions. > > They are planning domestic crypto restrictions, GAK, and all the rest of > what we have long expected. They have stated so openly; ~"if we hear a lot of encrypted hiss from [CALEA] intercepts, we'll need GAK to be the law of the land". (a tilde before the quote means I am paraphrasing). In fact, at the same time the FBI used to say they weren't calling for such a law, they were pushing behind the scenes for it. * http://epic.org/crypto/ban/fbi_dox/impact_text.gif * * SECRET FBI report * * NEED FOR A NATIONAL POLICY * * A national policy embodied in legislation is needed which insures * that cryptography use in the United States should be forced to be * crackable by law enforcement, so such communications can be monitored * with real-time decryption. * * All cryptography that cannot meet this standard should be prohibited. And here's the ECHELON/UKUSA slant: * What Is The OECD * * The Organization for Economic Co-operation and Development, based in * Paris, France, is a unique forum permitting governments of the * industrialized democracies to study and formulate the best policies * possible in all economic and social spheres. : From owner-firewalls-outgoing at GreatCircle.COM Wed May 14 18:54:15 1997 : Received: from osiris (osiris.nso.org [207.30.58.40]) by ra.nso.org : (post.office MTA v1.9.3 ID# 0-13592) with SMTP id AAA322 : for ; Wed, 14 May 1997 12:56:13 -0400 : Date: Wed, 14 May 1997 12:58:46 -0400 : To: firewalls at GreatCircle.COM : From: research at isr.net (Research Unit I) : Subject: Re: Encryption Outside US : : : I was part of that OECD Expert Group, and believe I may shine at least : some light on what exactly was said and happened at the meetings. : : The main conflict during all sessions was the demand of the US to be : able to decrypt anything, anywhere at any time versus the European : focus: we want to have the choice - with an open end - to maintain : own surveillance. The US demand would have caused an immediate : ability to tap into what the European intelligence community believes to : be its sole and exclusive territory. In fact the Europeans were not at all : pleased with the US view points of controlling ALL crypto. Germany and : France vigorously refused to work with the US on this issue. : : The Clipper initiative (at the time not readily developed) was completely : banned, except for the Australian and UK views that felt some obligation : from the 1947 UKUSA treaty (dealing with interchange of intelligence). : : With a vast majority the US was cornered completely, and had to accept : the international views. And actually adopted those as well. EFF, EPIC and : other US organizations were delighted to see the formal US views barred, : but expressed their concern on the development of alternate political : pressure that would cause the same effects. : : As time went by that was indeed what the US did, and up to now with minor : success. : : Bertil Fortrie : Internet Security Review Declan, wanna track down this person and find out the names of those who spoke of the ultra-secret UKUSA treaty that's never been seen, and interview them? ---- When Sonny Bono hit a tree, yet another Senator convinced by the FBI/NSA's little presentation of horrors (which is preceded by a visible sweep for electronic bugs) was lost. Only an Executive Order seems like it will get domestic crypto "outlawed". One continued worrisome slant to the FBI/NSAs pushing for domestic GAK is that they use the same arguments for retaining export controls (which Clinton did by Executive Order, or they would have expired) as they give for wanting to extend these controls domestically. LART me if I'm wrong, but that makes the issue different from most other export-controlled non-secret technology/products. ---- I still think someone (without a job ;-) should test the export law by pulling in PGP from outside the US and then immediately putting it back at the same site. If could find someone on the lower East Side willing to do it for $5000. Gilmore, care to make another investment in making the government's position look silly? ;-) ---guy From your.name at pcm.bosch.de Mon Sep 7 05:05:28 1998 From: your.name at pcm.bosch.de (your name) Date: Mon, 7 Sep 1998 20:05:28 +0800 Subject: Child-Molesting Forger's Chilling Confession!!!1! Message-ID: <199809071159.NAA05822@frnext1a.fr.bosch.de> A non-text attachment was scrubbed... Name: not available Type: application/x-www-form-urlencoded Size: 34 bytes Desc: not available URL: From guy at panix.com Mon Sep 7 05:22:38 1998 From: guy at panix.com (Information Security) Date: Mon, 7 Sep 1998 20:22:38 +0800 Subject: [Fwd: ISAKMP Key Recovery Extensions] Message-ID: <199809071219.IAA01745@panix7.panix.com> > From: "William H. Geiger III" > > In <35F37E90.76109489 at brd.ie>, on 09/07/98 > at 07:34 AM, "Frank O'Dwyer" said: > > >Well, the attached draft is not designed for corporate recovery of > >encrypted email, that's for sure. > > 4. ACKNOWLEDGMENTS > > This document was produced based on the combined efforts of the protocol > subcommittee of the Key Recovery Alliance. > > Why am I not surprised? > > I hope the IETF will not accept the implementation of *any* GAK proposals > into the RFC's. If these people want to force Big Brother on us they > should not have the benefit of the IETF to do so. ftp://ftp.ietf.org/internet-drafts/draft-rfced-exp-markham-00.txt o Government Requirements: Governments must be able to intercept the CKRB at the time of key establishment or periodically while the security association remains active. This requires that the key recovery enabled entity transmit the CKRB during the key establishment protocol and every N hours during the security association. Whooey! They've been infiltrated by idjits. ---guy From jya at pipeline.com Mon Sep 7 05:27:49 1998 From: jya at pipeline.com (John Young) Date: Mon, 7 Sep 1998 20:27:49 +0800 Subject: What we are Fighting In-Reply-To: Message-ID: Tim asks: >Freeh and Company continue to mumble about "meeting >the legitmate needs of law enforcement." What can they >be speaking of? ... >Obviously his side is contemplating domestic crypto restrictions. Threat of terrorism will be the impetus for applying national security restrictions domestically, for relaxing cold war limitations on spying on Americans, for dissolving barriers between law enforcement and military/intelligence agencies. Technical means for access to encrypted data will probably come first in communications, then to stored material. There will be an agreement for increased CALEA wiretap funding, which is what the two cellular and wired suits against the FBI intend, (paralleling what the hardware and software industries want from federal buyers of security products). This will provide the infrastructural regime for the gov to monitor and store domestic traffic as NSA does for the global, using the same technology (NSA may provide service to domestic LEA as it now does for other gov customers for intel). Other access will come through hardware and software for computers, paralleling technology developed for telecomm tapping, tracking and monitoring. Most probably through overt/covert features of microprocessors and OS's, as reported recently of Wintel and others, but also probably with special chips for DSP and software for modular design -- why build from scratch when these handy kits are available. As noted here, the features will appear first as optional, in response to demand from commerce, from parents, from responsible institutions, to meet public calls for protection, for privacy, for combating threats to the American people. Like wiretap law, use of the features for preventative snooping will initially require a court order, as provided in several of the crypto legislative proposals. Like the wiretap orders, gradually there will be no secret court refusals for requests to use the technology in the national interest. A publicity campain will proclaims that citizens with nothing to hide will have nothing to fear. Assurance of safety will be transparent, no clicks on the line. In a digital world, home-office devices will send lifestyle data to the device manufacturers over the always monitoring transparental Net. Personal privacy will evaporate almost unnoticeably, as with the tv remote control, cp/defcon/bar brag, telephone, fax and forever-lovers pillowtalk. From jimg at mentat.com Mon Sep 7 05:40:37 1998 From: jimg at mentat.com (Jim Gillogly) Date: Mon, 7 Sep 1998 20:40:37 +0800 Subject: IP: Encryption Expert Says U.S. Laws Led to Renouncing of Citizenship Message-ID: <199809071236.FAA05486@zendia.mentat.com> M-K Shen wrote: > > Robert Hettinga wrote: > > > > Sameer Parekh, the president of the Web server company C2 Net, said: > > "I think it's essential if you want business that you're doing your > > development overseas. It's pretty clear to anyone internationally that > > anything exportable [from the United States] is a joke." > > Let's wait and see whether AES will be genuinely exportable. Why wait? None of the AES candidates is currently exportable without a license, and the much weaker DES algorithm that one of them will replace is not exportable without a license. In fact, according to the instructions posted at NIST the algorithm designers from outside the US and Canada were required to fill out export license applications in order to get a copy of their own algorithms back from NIST. Without a change in the regulations AES will be no more exportable than DES is now. Jim Gillogly From jya at pipeline.com Mon Sep 7 05:55:29 1998 From: jya at pipeline.com (John Young) Date: Mon, 7 Sep 1998 20:55:29 +0800 Subject: What we are Fighting In-Reply-To: <199809071201.IAA01590@panix7.panix.com> Message-ID: <199809071245.IAA26339@camel7.mindspring.com> Guy wrote: >I still think someone (without a job ;-) should test the export law >by pulling in PGP from outside the US and then immediately putting >it back at the same site. The Ft. Bragg Net-offering of PGP (since withdrawn) has been available on our site without restrictions since April 1998 in the public interest: http://jya.com/pgp262-mil.zip (includes the Ft. Bragg page; 274K) From guy at panix.com Mon Sep 7 05:55:55 1998 From: guy at panix.com (Information Security) Date: Mon, 7 Sep 1998 20:55:55 +0800 Subject: KRAP is at it in the IETF Message-ID: <199809071253.IAA01912@panix7.panix.com> > From: "William H. Geiger III" > > -----BEGIN PGP SIGNED MESSAGE----- > > Hello, > > It has come to my attention that the KRAP (key recovery alliance program) > has submitted an I-D (internet draft) to the IETF for adding GAK > (government access to keys) to the IPSEC protocols: > > ftp://ftp.ietf.org/internet-drafts/draft-rfced-exp-markham-00.txt > > I consider this a perversion of the standards process of the IETF to > advance a political agenda which must be stopped at all cost. > > Below are the e-mail addresses of some people that you should write > (politely) expressing your objections to any such additions to the > protocols: Dear Sirs, # o Government Requirements: Governments must be able to intercept the # CKRB at the time of key establishment or periodically while the # security association remains active. This requires that the key # recovery enabled entity transmit the CKRB during the key establishment # protocol and every N hours during the security association. Speaking as someone who monitors company Internet traffic (email) for compliance and security purposes, I would like to ask why the IETF is working on a key recovery standard. If a company chooses to deploy, say, PGP with key recovery internally, then any messages sent with it encrypted in the receiving party's public key are available to the sending company's Information Security personnel. If a company wishes to make the key recovery information available to the government, they can individually choose to do that. The IETF should not be helping to put such an infrastructure in place. Governments are our adversaries with respect to encryption and privacy. The US government, represented by the FBI/NSA, used to state that they weren't pushing for mandatory domestic encryption. (requiring people use curtains on their homes that the government can see through) Eventually we found out they lied, and were pushing for exactly that behind the scenes: * http://epic.org/crypto/ban/fbi_dox/impact_text.gif * * SECRET FBI report * * NEED FOR A NATIONAL POLICY * * A national policy embodied in legislation is needed which insures * that cryptography use in the United States should be forced to be * crackable by law enforcement, so such communications can be monitored * with real-time decryption. * * All cryptography that cannot meet this standard should be prohibited. Feel free to cite this manipulation when discarding key recovery proposals. If you put a key recovery proposal in place, it makes it that much easier for them to require its use. Plus my basic complaint: this proposal is of no use to business or Internet users. None. Its only purpose is to allow interception and decoding over the Internet. And if you think this would happen only with a court order, check out this "anytime, anywhere" wording by the US government... ---guy Don't be another cog in the ECHELON monitoring machine. The U.S. asked the OECD to agree to internationally required Key Recovery. * What Is The OECD * * The Organization for Economic Co-operation and Development, based in * Paris, France, is a unique forum permitting governments of the * industrialized democracies to study and formulate the best policies * possible in all economic and social spheres. : From owner-firewalls-outgoing at GreatCircle.COM Wed May 14 18:54:15 1997 : Received: from osiris (osiris.nso.org [207.30.58.40]) by ra.nso.org : (post.office MTA v1.9.3 ID# 0-13592) with SMTP id AAA322 : for ; Wed, 14 May 1997 12:56:13 -0400 : Date: Wed, 14 May 1997 12:58:46 -0400 : To: firewalls at GreatCircle.COM : From: research at isr.net (Research Unit I) : Subject: Re: Encryption Outside US : : : I was part of that OECD Expert Group, and believe I may shine at least : some light on what exactly was said and happened at the meetings. : : The main conflict during all sessions was the demand of the US to be : able to decrypt anything, anywhere at any time versus the European : focus: we want to have the choice - with an open end - to maintain : own surveillance. The US demand would have caused an immediate : ability to tap into what the European intelligence community believes to : be its sole and exclusive territory. In fact the Europeans were not at all : pleased with the US view points of controlling ALL crypto. Germany and : France vigorously refused to work with the US on this issue. : : The Clipper initiative (at the time not readily developed) was completely : banned, except for the Australian and UK views that felt some obligation : from the 1947 UKUSA treaty (dealing with interchange of intelligence). : : With a vast majority the US was cornered completely, and had to accept : the international views. And actually adopted those as well. EFF, EPIC and : other US organizations were delighted to see the formal US views barred, : but expressed their concern on the development of alternate political : pressure that would cause the same effects. : : As time went by that was indeed what the US did, and up to now with minor : success. : : Bertil Fortrie : Internet Security Review : == From stevem at tightrope.demon.co.uk Mon Sep 7 06:07:13 1998 From: stevem at tightrope.demon.co.uk (Steve Mynott) Date: Mon, 7 Sep 1998 21:07:13 +0800 Subject: any relation? Message-ID: <19980907140142.A6010@tightrope.demon.co.uk> http://www.kiva.net/~tmay/ -- pgp 1024/D9C69DF9 1997/10/14 steve mynott From guy at panix.com Mon Sep 7 06:47:53 1998 From: guy at panix.com (Information Security) Date: Mon, 7 Sep 1998 21:47:53 +0800 Subject: What we are Fighting Message-ID: <199809071345.JAA02136@panix7.panix.com> [Cryptography Manifesto excerpts used for replies] > From: John Young > > Tim asks: > > >Freeh and Company continue to mumble about "meeting > >the legitmate needs of law enforcement." What can they > >be speaking of? > ... > >Obviously his side is contemplating domestic crypto restrictions. > > Threat of terrorism will be the impetus for applying national security > restrictions domestically, for relaxing cold war limitations on spying > on Americans, for dissolving barriers between law enforcement > and military/intelligence agencies. Funny how the NSA's ECHELON monitoring machine keeps growing endlessly... : The Washington Post Magazine, June 23 1996 : "Government surveillance, terrorism and the U.S. Constitution" : from Main Justice, by Jim McGee and Brian Duffy, 1996, ISBN 0-684-81135-9 : : The FBI is growing in tandem with the NSA. With the help of the National : Security Agency, the U.S. eavesdropping bureaucracy that spans the globe, : the FBI operates a super-secret facility in New York code-named Megahut : that is linked to the other FBI listening posts. : : After the OKC bombing, Janet Reno and Louis Freeh asked Congress to raise : to 3,000 the number of FBI agents working counter-intelligence and counter- : terrorism. : : With the new legislation, the funding for just the FBI's counter-intelli- : gence/terror goals is now ONE BILLION DOLLARS a year, and their activities : will rise to a LEVEL HIGHER THAN AT ANY TIME DURING THE COLD WAR. 1984 means a constant State of War. Here's a new war: "cyberwar". # "Head of CIA Plans Center To Protect Federal Computers" # By Tim Weiner, The New York Times, 6/26/96 # # John Deutch, Director of the CIA, is building a "cyberwar" center in the NSA. # # Mr. Deutch said cyberwar could become a 21st-century national security threat # second only to nuclear, biological and chemical weapons. # # "The electron," Mr. Deutch warned, "is the ultimate precision-guided weapon." Haven't I heard bad dialogue like this on Mystery Science Theater 3000? ---- > From: John Young > > Technical means for access to encrypted data will probably > come first in communications, then to stored material. There > will be an agreement for increased CALEA wiretap funding, which > is what the two cellular and wired suits against the FBI intend, > (paralleling what the hardware and software industries want from > federal buyers of security products). > > This will provide the infrastructural regime for the gov to monitor > and store domestic traffic as NSA does for the global, using the > same technology (NSA may provide service to domestic > LEA as it now does for other gov customers for intel). Question: How can the FBI use computers to monitor thousands and thousands and thousands and thousands of phone calls simultaneously, as they said they would do with CALEA, when we Americans speak so many different accents and languages? Answer: Thirty years of fine tuning by the NSA, y'all. ---- > From: John Young > > As noted here, the features will appear first as optional, in response > to demand from commerce, from parents, from responsible > institutions, to meet public calls for protection, for privacy, for > combating threats to the American people. * "Project L.U.C.I.D.", by Texe Marrs, 1996, ISBN 1-884302-02-5 * * These changes are necessary, we are reminded each day by our mind control * jailers in the media, to solve the immigration crises, to institute gun * control, to counter domestic terrorism, to fight pornography, to find * deadbeat dads who don't pay child support, to "Save Mother Earth", * to war against drug kingpins, to stop crime in the streets, to watch and * monitor the militias, to put an end to hate crimes and bigotry, * to extend universal healthcare benefits, to guarantee welfare reform, to * improve public education...the list of crises and problems to be fixed * seems to be never-ending. * * Implement National ID Cards, they promise, and a bright, secure future * can be ours. [snip] ---- > From: John Young > > Like wiretap law, use of the features for preventative snooping will > initially require a court order, as provided in several of the crypto > legislative proposals. > > Like the wiretap orders, gradually there will be no secret court refusals > for requests to use the technology in the national interest. > > Personal privacy will evaporate almost unnoticeably... * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *** *** *** *** *** *** *** *** *** *** * * * * * * * * * * : The Puzzle Palace : Inside the National Security Agency, : America's most secret intelligence organization : Author James Bamford, 1983 revision, ISBN 0-14-00.6748-5 P468-469: Within the United States, FISA still leaves the NSA free to pull into its massive vacuum cleaner every telephone call and message entering, leaving, OR TRANSITING the country. By carefully inserting the words "by the National Security Agency" into the FISA legislation, the NSA has skillfully excluded from the coverage of the FISA statute as well as the surveillance court all interceptions received from the British GCHQ or any other non-NSA source. Thus it is possible for GCHQ to monitor the necessary domestic circuits and pass them on to the NSA through the UKUSA Agreement, giving them impunity to target and watch-list Americans. P475-477: Like an ever-widening sinkhole, the NSA's surveillance technology will continue to expand, quietly pulling in more and more communications and gradually eliminating more and more privacy. If there are defenses to such technotyranny, it would appear, at least from past experience, that they will not come from Congress. Rather, they will most likely come from academe and industry in the form of secure cryptographic applications to private and commercial telecommunications equipment. The same technology that is used against free speech can be used to protect it, for without protection the future may be grim. Senator Frank Church, chairman of the Senate Intelligence committee, referring to the NSA's SIGINT technology, ciirca 1975: At the same time, that capability at any time could be turned around on the American people and no American would have any privacy left, such is the capability to monitor everything: telephone conversations, telegrams, it doesn't matter. There would be no place to hide. If the government ever became a tyranny, if a dictator ever took charge in this country, the technological capacity that the intelligence commun- ity has given the government could enable it to impose total tyranny, and there would be no way to fight back, because the most careful effort to combine together in resistance to the government, no matter how privately it was done, is within the reach of the government to know. Such is the capability of this technology... I don't want to see this country ever go across the bridge. I know the capacity that is there to make tyranny total in America, and we must see to it that this agency and all agencies that possess this technology operate within the law and under proper supervision, so that we never cross over that abyss. That is the abyss from which there is no return. * * * * * * * * * * *** *** *** *** *** *** *** *** *** *** * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * "Data Show Federal Agents Seldom Employ Surveillance Authority Against * Terrorists", By Stephen Labaton, The New York Times, 5/1/95 * * An item in President Clinton's five-year, $1.5 billion plan to combat * terrorist acts: * * o It would ease restrictions on the use in American courts of * information from surveillance conducted by foreign governments. # "Moynihan Says U.S. Killed His Anti-Spy Measure" # By Irvin Molotsky, The New York Times, September 11, 1985 # # Senator Daniel Patrick Moynihan charged that the CIA and State Department # had killed a measure he had introduced aimed at protecting American # citizens from having their telephone conversations intercepted by foreign # agents in this country. # # The Senator's bill would have made telephone call interception by foreign # agents illegal and would have provided for their expulsion. # # The Chairman of the Select Committee on Intelligence opposed the measure # as unnecessary and could lead to disclosing "sensitive intelligence # sources." British wiretappers at the helm of the NSA's domestic spy-fest. ---guy http://www.newsguy.com/~mayday/crypto/crypto0.html From guy at panix.com Mon Sep 7 06:53:29 1998 From: guy at panix.com (Information Security) Date: Mon, 7 Sep 1998 21:53:29 +0800 Subject: KRAP is at it in the IETF Message-ID: <199809071350.JAA02165@panix7.panix.com> A reply already. ---guy > From rgm at icsa.net Mon Sep 7 09:32:47 1998 > Received: from homebase.htt-consult.com (homebase.htt-consult.com [208.235.169.130]) > by mail2.panix.com (8.8.8/8.8.8/PanixM1.3) with ESMTP id JAA04870 > for ; Mon, 7 Sep 1998 09:32:45 -0400 (EDT) > Received: from rgm ([208.235.169.131]) by homebase.htt-consult.com > (Netscape Mail Server v2.02) with SMTP id AAA340 > for ; Mon, 7 Sep 1998 09:32:50 -0400 > Message-Id: <3.0.5.32.19980907092146.00a108c0 at homebase.htt-consult.com> > X-Sender: rgm-icsa at homebase.htt-consult.com > X-Mailer: QUALCOMM Windows Eudora Pro Version 3.0.5 (32) > Date: Mon, 07 Sep 1998 09:21:46 -0400 > To: Information Security > From: Robert Moskowitz > Subject: Re: KRAP is at it in the IETF > In-Reply-To: <199809071253.IAA01912 at panix7.panix.com> > Mime-Version: 1.0 > Content-Type: text/plain; charset="us-ascii" > Status: R > > Note that this is an individual submission. It is not the product of any > IETF workgroup. Anyone can submit an Internet Draft. The IETF maintains > an open process. However, the IESG has to approve all IDs before they can > become RFCs. There will be a period of last call on this draft on the IETF > list where appropriate comments will be taken. > > > Robert Moskowitz > International Computer Security Association > (248) 968-9809 > Fax: (248) 968-2824 > rgm at icsa.net > From declan at well.com Mon Sep 7 06:56:34 1998 From: declan at well.com (Declan McCullagh) Date: Mon, 7 Sep 1998 21:56:34 +0800 Subject: What we are Fighting In-Reply-To: Message-ID: On Sun, 6 Sep 1998, Tim May wrote: > > There are, officially, no proposals on the table to limit speech within the > U.S. by limiting the types and forms of language may use. There is the SAFE > bill, which stands zero chance of passing, but this involves relaxing > export requirements (though I expect compromises added, such as the > felonization of crypto use in a crime, are an unwelcome step toward > domestic restrictions). Every version of SAFE includes crypto-in-a-crime as a key component. The thinking of its drafters and backers like Reps. Goodlatte, Eschoo, Lofgren, CDT, and some corporate lobbyists is that it would be too politically controversial to pass Congress without it. There is, offically, a proposal on the table to limit speech within the U.S. by restricting sale, manufacture, distribution, import of non-GAK'd crypto. A House committee approved that one year ago. -Declan PS: Note to DC cypherpunks. There's a meet/party 9-19 in Adams Morgan. From guy at panix.com Mon Sep 7 07:00:12 1998 From: guy at panix.com (Information Security) Date: Mon, 7 Sep 1998 22:00:12 +0800 Subject: any relation? Message-ID: <199809071357.JAA02175@panix7.panix.com> > From: Steve Mynott > X-Echelon: no-archive Heh. > > http://www.kiva.net/~tmay/ No, Cypherpunk Tim May's picture was shown in Wired... But now he's gonna hafta get a gun at least that big, or suffer major penis envy. ---guy ;-) From noldcosts at usa.net Mon Sep 7 22:10:30 1998 From: noldcosts at usa.net (noldcosts at usa.net) Date: Mon, 7 Sep 1998 22:10:30 -0700 (PDT) Subject: You Can Now Have A Free Cellular Phone! Message-ID: <199809080511.HAA09289@mailhost.axime.com> When you enter our fantastic lead program (only $99 plus $35 setup fee onetime) and complete a 2 x 2 forced matrix you will recieve $100 plus as a bonus a Nokia 6160 digital cellular phone with 600 minutes of service on the #1 cellular carrier in the United States (THIS OFFER IS GOOD IN ALL 50 STATES OF THE UNITED STATES OF AMERICA) When all 6 sales within your matrix have been completed, you will earn $400 in commissions, ($200 will be deducted for a re-entry purchase of 300 phone leads) and start over again in the highest available position of your sponsor's current matrix. Bonuses include a FREE Nokia 6160 digital PCS phone with your first check, and 600 minutes of FREE airtime utilizing the AT&T wireless network ($100 additional deducted from 1st check). Thereafter, with every check, you will qualify to receive an additional 600 minutes of airtime. ALL COMMISSION CHECKS ARE CALCULATED DAILY AND SENT WEEKLY VIA OVERNIGHT DELIVERY! DOUBLE MATCHING BONUS! On every cycle after the 1st, you will be in position to qualify for a double matching bonus on all your personally sponsored, and their personally sponsored, as they complete their second and third and so on, cycles. This will provide an extra incentive for you to work beyond your current 2 x 2 matrix. FAST FACTS ON THE NOKIA PHONE AND THE AT&T ONE RATE PLAN. ***** The phone: Nokia 6160 Dual Band phone that works in both analog (cellular) and digital areas. Features include slim design (6oz.) and a minute minder to keep track of your minutes used. Free battery and charger included. For more information hit REPLY and type _________ in the subject box From rdl at MIT.EDU Mon Sep 7 08:43:42 1998 From: rdl at MIT.EDU (Ryan Lackey) Date: Mon, 7 Sep 1998 23:43:42 +0800 Subject: Cypherpunks HyperArchive Message-ID: > There is another archive at http://sof.mit.edu/cypherpunks, ironically > the machine that hosts it is not up at the moment The machine suffered either disk controller or HDD problems as I was logged into it. It is located in Boston, MA. I do not currently have a way of getting to the machine to repair it, and this will likely continue to be true, so until I can get one of the people I know at the site where the machine is located to fix it, the archives will be offline. If the machine cannot be fixed, I will put the archive up elsewhere. I believe hugh at toad.com copied the entire archive at some point, so that might be helpful. Sorry about this -- replicated servers are always a good idea. -- Ryan Lackey rdl at mit.edu http://sof.mit.edu/rdl/ From jya at pipeline.com Mon Sep 7 08:47:28 1998 From: jya at pipeline.com (John Young) Date: Mon, 7 Sep 1998 23:47:28 +0800 Subject: What we are Fighting In-Reply-To: Message-ID: <199809071546.LAA21825@camel7.mindspring.com> It would be fitting for this list to be distinguished as the place where crypto-in-a-crime was first committed. What might that be? A match of the crime committed to prevent widespread strong crypto? Crypto-criminal anonymity in the national interest (governmental secrecy) fighting to prevent crypto-criminal anonymity in the public interest (private secrecy). This is not a troll, but query on what could be done to to tip the hand and identify those unnamed who are most fearful of strong cryptography, not their public rougers in the 3 divs of gov. From ravage at EINSTEIN.ssz.com Mon Sep 7 08:49:23 1998 From: ravage at EINSTEIN.ssz.com (Jim Choate) Date: Mon, 7 Sep 1998 23:49:23 +0800 Subject: Cypherpunks HyperArchive (fwd) Message-ID: <199809071608.LAA03505@einstein.ssz.com> Forwarded message: > Subject: Re: Cypherpunks HyperArchive > From: Ryan Lackey > Date: 07 Sep 1998 11:41:54 -0400 > The machine suffered either disk controller or HDD problems as I was > logged into it. It is located in Boston, MA. I do not currently have The L0pht folks are there and Wel Pond used to be a subscriber. Perhaps you could contact them and they could provide the support? ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From rdl at MIT.EDU Mon Sep 7 08:50:27 1998 From: rdl at MIT.EDU (Ryan Lackey) Date: Mon, 7 Sep 1998 23:50:27 +0800 Subject: Archives? What archives? Message-ID: Tim May writes: > > At 1:44 AM -0700 9/4/98, Sparkes, Ian, ZFRD AC wrote: > > >---- Facetious comment begin ----- > >At least now we know why people aren't following Tim's > >advice to 'check the archives' before putting their feet in > >their mouths. > >---- Facetious comment end ----- > > Try http://www.inet-one.com/cypherpunks/ > > If the archives at some sites are going down, this could be for various > reasons. > > Being an assembly of mostly-anarchist-leaning folks, with no leadership, no > organization, no hierarchy, and no procedures, there are no officially > maintained archives. > > What we have are what people choose to put up. > > Someone was talking in the last half year about burning a CD-ROM with a big > chunk of the archives on it. I haven't heard if this ever happened and if > it was made available for sale. (It seems that about every year someone > launches a project to generate such a CD-ROM, but I haven't seen the > followthrough.) > > --Tim May I had an archive on sof.mit.edu, but shortly after I left Boston, MA, US where the machine is located, the HDD on the machine (or the controller) died, and I'm still trying to get one of my former housemates to repair it. I'm currently in the wrong country to fix the drive, and don't expect to be back. I prepared the CD-ROMs for sale (I had a CD-R on the machine), and posted several times offering to sell them, but no one ever actually sent me the money. Actually, a small number of people did, and I sold them, but I don't remember who they were. I also don't have particularly good backups of that machine. I think someone mirrored it at toad.com before it died, so they're probably not lost forever. I don't have a machine with free bandwidth from which to host it, though, until sof.mit.edu is back on the net. I may be sending the HDD out to a drive recovery company anyway for the other data on the drive. This was an amateurish hobby server of mine, and not a production-grade service, so people shouldn't complain too much that I didn't invest the money in quality replication. -- Ryan Lackey rdl at mit.edu http://sof.mit.edu/rdl/ From tcmay at got.net Mon Sep 7 08:54:31 1998 From: tcmay at got.net (Tim May) Date: Mon, 7 Sep 1998 23:54:31 +0800 Subject: What we are Fighting In-Reply-To: Message-ID: At 6:53 AM -0700 9/7/98, Declan McCullagh wrote: >There is, offically, a proposal on the table to limit speech within the >U.S. by restricting sale, manufacture, distribution, import of non-GAK'd >crypto. A House committee approved that one year ago. > I'd forgotten about that little one. Of course, it has not gone anywhere (no Senate version or committee markup, right?), so I'm not yet ready to say there's official action on its way. And, fortunately, the session is over but for the shouting about Clinton and his cigars. --Tim May "The tree of liberty must be watered periodically with the blood of tyrants...." ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Licensed Ontologist | black markets, collapse of governments. From tcmay at got.net Mon Sep 7 09:14:10 1998 From: tcmay at got.net (Tim May) Date: Tue, 8 Sep 1998 00:14:10 +0800 Subject: IP: Encryption Expert Says U.S. Laws Led to Renouncing of Citizenship In-Reply-To: Message-ID: At 3:01 AM -0700 9/7/98, Mok-Kong Shen wrote: >Robert Hettinga wrote: >> >> Sameer Parekh, the president of the Web server company C2 Net, said: >> "I think it's essential if you want business that you're doing your >> development overseas. It's pretty clear to anyone internationally that >> anything exportable [from the United States] is a joke." > >Let's wait and see whether AES will be genuinely exportable. > If it's as strong as it is supposed to be, e.g, much stronger than 3DES for example, then OF COURSE it will not be exportable. However, the neat thing about such a standard, with the algorithm carefully described and published, is that many can implement it. There should be no particular need to "export" implmentations out of the U.S. when so many European and Asian and Carribbean folks will be implementing it and embedding it in other applications. (I don't follow AES stuff, so I may be missing some details, such as how licensing (barf) will work. Maybe, like IDEA, implementors will be supposed to seek a license. If so, then maybe implementors will have to go to whomever controls the process, such as NIST, and request a license. Probably NIST will deny a license to Hezbollah Cryptography Company. And so it goes.) I can't get too excited about AES. Plenty of ciphers out there. Which cipher handles the high-speed stuff inside an app like PGP is not of great concern to me. Especially since the speed of ciphers is less important for the kind of political messages which interest me. (I'm not belittling work on AES. It's both important for various network uses, and interesting in its own right. Just not to me.) --Tim May "The tree of liberty must be watered periodically with the blood of tyrants...." ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Licensed Ontologist | black markets, collapse of governments. From tcmay at got.net Mon Sep 7 09:18:54 1998 From: tcmay at got.net (Tim May) Date: Tue, 8 Sep 1998 00:18:54 +0800 Subject: Cypherpunks HyperArchive In-Reply-To: Message-ID: At 8:41 AM -0700 9/7/98, Ryan Lackey wrote: >The machine suffered either disk controller or HDD problems as I was >logged into it. It is located in Boston, MA. I do not currently have >a way of getting to the machine to repair it, and this will likely >continue to be true, so until I can get one of the people I know at >the site where the machine is located to fix it, the archives will be >offline. If the machine cannot be fixed, I will put the archive up >elsewhere. I believe hugh at toad.com copied the entire archive at some >point, so that might be helpful. > >Sorry about this -- replicated servers are always a good idea. Indeed, weren't you developing some kind of distributed eternity server? So much for eternity, I guess. Ryan, could you tell us what you are working on, and what has taken you out of the country? --Tim May "The tree of liberty must be watered periodically with the blood of tyrants...." ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Licensed Ontologist | black markets, collapse of governments. From ravage at EINSTEIN.ssz.com Mon Sep 7 09:26:50 1998 From: ravage at EINSTEIN.ssz.com (Jim Choate) Date: Tue, 8 Sep 1998 00:26:50 +0800 Subject: Seed to clone himself, one way or another [CNN] Message-ID: <199809071643.LAA03831@einstein.ssz.com> Hi, It seems that scientist in general may soon be forced to roam from country to country to practice their work. Shades of Neuromancer. I am more and more convinced that Gibson's book, and it's social commentary, is right on the mark. Forwarded message: > X-within-URL: http://www.cnn.com/TECH/science/9809/07/clone.seed.ap/ > CHICAGO PHYSICIST SAYS HE'LL CLONE HIMSELF WITH WIFE'S HELP > > Dr. Richard Seed Richard Seed September 7, 1998 > Web posted at: 3:50 a.m. EDT (0750 GMT) > > BOSTON (AP) -- A physicist with three Harvard degrees but no medical > license said he is ready to begin the first step toward immortality: > he will clone himself. [text deleted] > Seed said his wife, Gloria, has agreed to carry an embryo that would > be created by combining the nucleus of one of his cells with a donor > egg, the newspaper said. [text deleted] > The Chicago scientist has three Harvard degrees, including a Ph.D., > but no medical degree, no money and no institutional backing. He has > vowed to produce a pregnancy with a human clone within 2 1/2 years. [text deleted] > Two states, California and Michigan, have outlawed human cloning and > dozens of other states are considering bans. > > A five-year moratorium on cloning is apparently being observed by > mainstream scientists, but Congress has failed to act on legislation > to outlaw the procedure. > > Seed has said that if Congress bans cloning, he will move his > operation to Tijuana, Mexico. [text deleted] ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From tcmay at got.net Mon Sep 7 09:31:30 1998 From: tcmay at got.net (Tim May) Date: Tue, 8 Sep 1998 00:31:30 +0800 Subject: What we are Fighting In-Reply-To: Message-ID: At 8:39 AM -0700 9/7/98, John Young wrote: >It would be fitting for this list to be distinguished as >the place where crypto-in-a-crime was first committed. > >What might that be? A match of the crime committed >to prevent widespread strong crypto? > >Crypto-criminal anonymity in the national interest (governmental >secrecy) fighting to prevent crypto-criminal anonymity in the >public interest (private secrecy). > >This is not a troll, but query on what could be done to to tip the >hand and identify those unnamed who are most fearful of strong >cryptography, not their public rougers in the 3 divs of gov. Well, there are just so many things that are now called "crimes" in these Beknighted States, that it's really a matter of what the Authorities decide to prosecute. For example, do they prosecute J. Random Cypherpunk for his support of the freedom fighters of Hezbollah, which is on the State Department's list of "terror"-supporting organizations? (Meaning that citizen-unit sheeple are breaking the law if they provide any financial or technical support to Hezbollah.) If they prosecute J. Random Cypherpunk, and can show he used PGP to send messages to the freedom fighters, or even supplied them with a copy of PGP.... Or how about the religious organization known as Aum Shinretsu. Apparently I am breaking a U.S. law by tithing to the Aum religion, as it is also on this list. And then there are those RICO laws. Arranging cutout organizations to let foreign nationals consult and write code is probably a violation of various laws. I can think of lots of "crimes" in the eyes of the burrowcrats that many of us are committing constantly. However, "crypto in a crime" has not become law yet. And if we can keep those pesky "civil rights" lobbyists in D.C. neutralized, maybe it never will be. With any luck, these curriers of favor are inside the fallout pattern from Bin Laden's nuke. --Tim May "The tree of liberty must be watered periodically with the blood of tyrants...." ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Licensed Ontologist | black markets, collapse of governments. From ravage at EINSTEIN.ssz.com Mon Sep 7 09:52:58 1998 From: ravage at EINSTEIN.ssz.com (Jim Choate) Date: Tue, 8 Sep 1998 00:52:58 +0800 Subject: Government Regulation & Scienctific Research Message-ID: <199809071711.MAA04033@einstein.ssz.com> Hi, Because of the changes in national governments and their increasing desire to regulate their citizenry and their economies according to flawed economic and social dogma we will see the following: - primary research will still occur in the 1st world countries where the interest, money, and infrastructure can support it. - practical applications of this technology will be developed in the 3rd world countries where the destabalizing impact of technology won't hurt as much because the central government infrastructure doesn't exist. - it will become harder and harder for individuals with intellectual capital to express their rights within these 1st world enclaves. In particular, leaving the country. Perhaps it will get so bad that we'll see a return to the Soviet style of sports competition (ie KGB stoolies following all the athletes around). What will be the end result? We'll see bastions of 1st world culture surrounded by a sea of balkan areas that are 'governed' by economic and cultural ethos alone. As this process proceeds it will erode the stability of the 1st world countries and cause their break-up into small independant balkans. The results of this will be: - there will be a slow down in basic research in about 50 years because there won't be any large infrastructures that can support basic research. Hopefuly the balkans will find a way to cooperate in an economic and technological manner. If so the roll of technology will resume, albeit potentialy at a slower rate. - small balkans will band together for periods of time to explore research and develop the base understanding. it'll end up being sort of like a MCC or Sematech at the political level. One aspect that does worry me is that as technology speads the cultures around the world homogenize. This could have a negative impact on the balkanization because the motive to go from here to there won't be relevant because there will be here. It may turn out that xenophobic cultures like the Talibans and Chinese may actualy help in the long run because of their unwillingness to compromise their world views. ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From jya at pipeline.com Mon Sep 7 10:48:09 1998 From: jya at pipeline.com (John Young) Date: Tue, 8 Sep 1998 01:48:09 +0800 Subject: What we are Fighting In-Reply-To: <199809071546.LAA21825@camel7.mindspring.com> Message-ID: <199809071745.NAA09547@camel7.mindspring.com> True that governmental dietary laws are immensely flexible when the dogs are hungry. Given that moral and financial and political betrayal and treachery do not qualify for grave natsec threat, and only those acts which aim at snatching the very best technology for political control, it's the NBC toys that attract most of the serious searchers for terrorists under the global bed. For crypto-in-a-crime that might mean sending here an encrypted message with an explanatory note that it contains, say: How to tell the difference between decoys and the real tranporters of nuclear components among the national labs and/or to Pantex for disassembly. Or where the recovered Pu and triggers are stored in the TX panhandle, helpfully describing what's fake and what's not, what the security plan is, not disinfo, what tools are needed to pick up emanations, how to weed the spoofs. Or what and where BW or CW armaments are being refreshed, repaired, deactivated, or invented in top secrecy just in case some rogue violates a treaty, what tools are needed to sniff precursors, how to weed the spoofs, and how to avoid seeded soil in your backyard. Or where key targeters of foreign terrorists live, their childrens' school, their favorite places to get away from the terrible responsibility for USG assassination politics. Or, could one encrypt a message to oneself claiming to contain such information, post it here, see who wants your heart and mind. Or, create a PK pair, encrypt such a message, then post it, both keys and PW here. Would the pacesetter be traced? Would anyone notice, though? Would waiting for the disaster be better strategy? Thousands of threats pour in, State says, Secret Service says, IC says, way too many to fully investigate, until one proves blessedly true, ah yes, the likely suspect, then marshal the targeters to cruise congress whispering look at this, to OK cleansweeping CDR, according to immensely flexible menus long set. From alan at clueserver.org Mon Sep 7 11:55:52 1998 From: alan at clueserver.org (Alan Olsen) Date: Tue, 8 Sep 1998 02:55:52 +0800 Subject: Government Regulation & Scienctific Research In-Reply-To: <199809071711.MAA04033@einstein.ssz.com> Message-ID: On Mon, 7 Sep 1998, Jim Choate wrote: > Because of the changes in national governments and their increasing desire > to regulate their citizenry and their economies according to flawed economic > and social dogma we will see the following: I have a little bit of a different take on things... I expect the first world to start to take after the East German model. -- Those who are precieved as being a possible threat will be marginalized, jailed, forced to flee, or co-opted. -- A large portion of the population will be devoted towards control of the population. (Either in law enforcement, paid snitches, propaganda, or similar activities.) -- Much of the Government's budget will be devoted to citizen control. (More will be spent on fighting internal threats than defending from external threats.) And since "The imposition of order = the escalation of disorder", it will only spiral downwards. In 50 years I expect that the creative citizenry will either be underground, fled, or no longer participating in the active discorse of the society. All of the life will be sucked out of the population in order to fight the "Scapegoats of the Week/Month/Year/Century". It will only fall apart when we reach a level where no one wants to live here any more and it falls apart from internal system failure and hemoraging. alan at ctrl-alt-del.com | Note to AOL users: for a quick shortcut to reply Alan Olsen | to my mail, just hit the ctrl, alt and del keys. From jya at pipeline.com Mon Sep 7 11:58:55 1998 From: jya at pipeline.com (John Young) Date: Tue, 8 Sep 1998 02:58:55 +0800 Subject: Tesla's Secrets Message-ID: <199809071857.OAA27475@camel7.mindspring.com> DoD's latest standard for protection against electromagnetic effects, MIL-STD-464, "Electromagnetic Environmental Effects -- Requirements for Systems," provides a bare 17 pages of dry prescriptions for the official standard, then 90 astonishing pages of ways the standard is to be applied in addressing unexpected EM misfortunes, like ordance spontaneously exploding, planes crashing, ships out of control, radar meltdown, personnel fried, and so on. http://jya.com/mil-std-464.htm (346K plus images) What comes out of this critical "anecdotal" material, not yet subject to precise standardization, is what Tesla learned early this century: the dreadful power of accumulated, boosted EM caused by unexpected interaction of human electronic inventions and natural EM forces. Such as some speculate brought down TWA 800. What also comes out is that each unit of every major weapons system, theirs and ours (and civilian devices) can be identified by its unique EM "fingerprint" -- nuclear sub, B1B, F117, AF One, your family Sports-ute, your chattering computer, cellphone and pager. As if anyone except the NSA can siphon and sort through them all, the compromising emanations are Out There awaiting receivers of secret messages unintentionally sent. A loud and clear message is that electronification of culture is causing a build-up of powerful latent lightning looking for a ground to blast, a sub to sink, a bomber to shatter. Be prepared for a technological attack, to be blamed on terrorists, but really caused by the expected EM effects Tesla warned about. From ryan at arianrhod.systemics.ai Mon Sep 7 12:30:48 1998 From: ryan at arianrhod.systemics.ai (Ryan Lackey) Date: Tue, 8 Sep 1998 03:30:48 +0800 Subject: Cypherpunks HyperArchive In-Reply-To: Message-ID: > Indeed, weren't you developing some kind of distributed eternity server? So > much for eternity, I guess. I believe Eternity depends upon a viable electronic cash system. I put Eternity DDS on hold until one existed, and switched to working on HINDE, a project with Ian Goldberg, to create a workable electronic cash system. Creating a workable electronic cash system became...complicated (e.g. given that I was recently at Bob Hettinga's electronic cash conference in Boston giving a technical presentation, and it turns out the new CEO of DigiCash was i the audience as "an interested investor"...perhaps it was impolitic of me to continually bash DigiCash and David Chaum in a group of people who I did not all definitely know to not be DigiCash employees...) Ian's gone on to do Zero-Knowledge Systems, and I'm now working on what follows in this email, so HINDE, the defined as the cypherpunkish protest against DigiCash, is probably quiescent. Don't read anything into that, though. For backing up the Cypherpunks Archives, I could have done just as well by setting up two identical machines with rsync mirroring the drives. I do this kind of thing with real data, but didn't feel the 1gb of archive data was high enough importance to mirror. It appears the machine will be up in a week or so, and if the drive is broken, I will send it off to a drive recovery place for recovery, so the archives will be up, minus the most recent month or two, in a month, at the outside. > > Ryan, could you tell us what you are working on, and what has taken you out > of the country? The two answers are related, but distinct. I am working on an interesting project with an interesting organization to develop interesting applications for interesting clients. I would provide more detail here now if I could, and will in the future. I have left the US for many reasons. One, because I can, at least now. I left about a month ago. I'm increasingly concerned about y2k issues, and my situation in Boston (living about 0.25 miles from the exact center of Boston) was not at all compatible with the kind of preparation I believe in. I am concerned not so much with the primary/prompt effects of y2k as I am of societal panic and the government's response, perhaps proactive, to that panic. I left because the crypto policies of the US were getting increasingly obnoxious, although I am a US citizen, and am not violating any EAR restrictions. (I'm actually probably obeying US law even more totally here than I did when I lived in the US -- in Cambridge, MA, it is a crime to "interdigitate", that is, to hold hands with someone of the opposite sex. I think I was actually a potential felon before I left too, as I had an unpaid library fine at the Boston Public Library which I paid the day before I left, and I believe having outstanding fines for greater than a year is a felony in MA, a holdover from colonial times.) I left because I wanted to be doing more, and plotting/scheming about what I could be doing if I were not in the US less. I left because the US is just not the best place for me to live at the current time, given that my primary goal right now is to accomplish the "interesting projects". I left because in a time of uncertainty about the future, it is nice to be far away from both soft targets and fundamentally self-serving organizations with large amounts of power and no constraints upon their use of such. Given that I haven't actually broken any laws in coming here, and am being scrupulous to avoid breaking any while I'm here, it wasn't really that big a change. I sold my stereo and long-term-loaned my larger computers and monitors to one of my former housemates, but if things didn't work out, I could very easily move back to the US. However, I can't imagine any situations where this is a worthwhile choice. I was thinking about the things in the US I could conceivably miss -- some heavy industrial things, the Grand Canyon, and MAE-East, and all of them can be substituted with other things elsewhere. So, leaving was somewhat supported by what I'm working on, but neither really required the other -- they were independent choices which made sense independently and made even more sense together. I'd encourage anyone interested in leaving the US for a few years to seriously consider doing so ASAP, before 1 January 1999 if at all possible. It takes some time to get set up in a new place, and you want this all sorted out before any potential uncertainty becomes reality. If I had the money and time to set myself up in the US with a reasonable plot of land far away from any nearby targets or attackers, I would have considered it more than I did, but I don't yet have investment income to live from, so I needed a place where I could make a reasonable amount of money, and Montana wasn't quite it. For those who can, or who were lucky enough to find themselves in that position before the y2k uncertainty became a pressing issue, staying in place may easily make more sense. Anguilla is actually a pretty reasonable choice as far as a place to spend a few years away from the US -- 7 000 people, many with a strong libertarian bent because they've always owned their own land, reasonable comms, no taxes, accessible through a neighboring island's jet airport but not really a place with a lot of through-traffic itself, etc. If you stockpile a bit of food and supplies, you're probably all set -- security is nowhere near as big an issue here as it would be in most of the US. I was objectively evaluating my situation in Boston, and it would have required more than a reinforced brigade to provide any reasonable security there. The cost of that buys an awful lot of canned/nitrogen-packed food... I'm sure there are other places in the world which are reasonable, but I've only really looked at Anguilla, due to fc99, and I knew people here already. From rah at shipwright.com Mon Sep 7 13:01:27 1998 From: rah at shipwright.com (Robert Hettinga) Date: Tue, 8 Sep 1998 04:01:27 +0800 Subject: Archives? What archives? In-Reply-To: Message-ID: At 11:49 AM -0400 on 9/7/98, Ryan Lackey wrote: > I'm currently in the wrong country to fix the drive, and don't expect to > be back. Here comes another American-African... Cheers, Bob Hettinga ----------------- Robert A. Hettinga Philodox Financial Technology Evangelism 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From rah at shipwright.com Mon Sep 7 13:01:35 1998 From: rah at shipwright.com (Robert Hettinga) Date: Tue, 8 Sep 1998 04:01:35 +0800 Subject: Cypherpunks HyperArchive In-Reply-To: Message-ID: At 12:17 PM -0400 on 9/7/98, Tim May trolled: > Ryan, could you tell us what you are working on, and what has taken you out > of the country? If I told you, I would have to kill you? Seriously, Ryan and Ian were both moderators the Philodox Symposium on Digital Bearer Transaction Settlement, held this July at the Harvard Club in Boston. During the Symposium, they had several dinner conversations with a couple of Symposium participants from a company which will remain nameless, and they're currently putting together a digital bearer transaction settlement system for those folks. Somewhere. :-). Also there at the Symposium was Scott Loftesness, who's now the new president of DigiCash, though the rest of us didn't know that at the time. I was hoping someone from DigiCash would show up. I just didn't know exactly how successful I was going to be in that until about two weeks ago. Of course, a good time was had by all, including the likes of Dan Geer, John Muller, some fairly serious financial people from Citicorp and VISA and EGold, and several other interesting folks from various walks of crypto, finance, and law. Had a great time, wish you were there, and all that. Yup, that financial technology evangelism stuff's just a waste of time. Never gonna amount to much. :-). For my next trick (besides some road-show DBTS seminars I'd like to do, some speeches at upcoming electronic commerce/trading conferences in places like Boston and London, the DBTS series I'm doing for Duncan Goldie-Scott's online edition of the Financial Times, a white paper I'm doing for a credit card company, some other fee-and-referral-commission consulting contracts, and a few threatend projects from book editors :-)) is a chinese-wall, peer-reviewed legal conference on digital bearer settlement, hopefully next summer. I'm recruiting the program chair now, and have several people you've probably heard of in mind for the program committee, though ultimately that's the committee chairman's decision. Having some fun, *now*, as those SNL wild and crazy guys used to say... Cheers, Bob Hettinga ----------------- Robert A. Hettinga Philodox Financial Technology Evangelism 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From rah at shipwright.com Mon Sep 7 13:01:38 1998 From: rah at shipwright.com (Robert Hettinga) Date: Tue, 8 Sep 1998 04:01:38 +0800 Subject: IP: ISPI Clips 4.21:New Up-Scale Home Designs Reflect PrivacyConcerns Message-ID: --- begin forwarded text Delivered-To: ignition-point at majordomo.pobox.com From: "ama-gi ISPI" To: Subject: IP: ISPI Clips 4.21:New Up-Scale Home Designs Reflect Privacy Concerns Date: Mon, 7 Sep 1998 00:35:26 -0700 MIME-Version: 1.0 X-Priority: 3 X-MSMail-Priority: Normal X-MimeOLE: Produced By Microsoft MimeOLE V4.72.3110.3 Sender: owner-ignition-point at majordomo.pobox.com Precedence: list Reply-To: "ama-gi ISPI" ISPI Clips 4.21: New Up-Scale Home Designs Reflect Privacy Concerns News & Info from the Institute for the Study of Privacy Issues (ISPI) Monday September 7, 1998 ISPI4Privacy at ama-gi.com ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ This From: The Washington Post, Saturday, September 5, 1998; Page E03 http://www.washingtonpost.com The Neo-Fortress Home: Can the Concept Be Defended? http://www.washingtonpost.com/wp-srv/WPlate/1998-09/05/070l-090598-idx.html By Roger K. Lewis "A House for the New Millennium" was the headline on a recent Wall Street Journal article about residential design trends. It should have read, "A House for the New Millionaires," or perhaps, "A House for Fearful Millionaires." With a full-color, bird's-eye view illustration and a tabulation of what's in and what's out, writer June Fletcher predicts that homes of the future will "look more like medieval fortresses than futuristic bubbles." Picture what Fletcher calls the Neo-Fortress Movement: towers and turrets; walled yards; locked gates; and tall, narrow windows. And most of the examples she cites have fortress-like price tags. At the low end were subdivision houses in Arizona ranging from $382,000 to $639,000. More typical were $950,000 homes in California; $1 million homes in Kentucky and Pennsylvania; a 10,000-square-foot, $3.3 million spec home in New Jersey; and a 14,000-square-foot, $8 million home in Florida. "The neo-fortress style reflects end-of-the-century anxieties about privacy and security," according to the article, along with diminishing home owner interest in the "showy houses of the '80s, with their soaring ceilings, open floor plans and huge windows that invite passersby to peer in and check out the furniture." On the article's "out" list: Palladian windows, Greek columns, grand entries, two-story plans, big lawns, common areas, great rooms and computer nooks in kitchens. On the "in" list: motor courts, walled courtyards, single-story plans, numerous defined rooms, 10-foot ceilings, two home offices and turrets. Turrets, California architect Barry Berkus told the Journal, "connote fortification and strength." Indeed, Berkus suggests that people are attracted to turrets because they evoke lonely, romantic symbols such as lighthouses and silos. By the time I reached the end of the article, I was wondering what the average American homeowner or home buyer might make of all this, not to mention architects and builders who create houses that buck or ignore this fortification trend. In 2001, would those of us whose homes sport large windows, vaulted ceilings and lack medievally inspired towers feel vulnerable and defenseless as well as out of fashion? There is nothing intrinsically wrong, either aesthetically or functionally, with most of the trendy features mentioned in the article. Walled-in courtyards, towers and narrow windows have been around for thousands of years. Constructing homes with discrete, functionally differentiated rooms is an established tradition. In most cultures, visually separating spaces for private, domestic use from public spaces is a standard and desirable practice. But these design elements and strategies for shaping a house should be employed when they fit the circumstances and context pertaining to the house, its location and site, its occupants and its occupants' budget. Thus the courtyard house, which evolved as the dominant residential building type in ancient Mediterranean, African, southern European and Asian cultures, is well suited for mild climates where inhabitants can spend much of the year outdoors in the courtyard, and where they don't have to cope with snow and ice -- places such as Florida, Texas, New Mexico, Arizona and California. But courtyard houses usually make little sense in New England, upstate New York, Appalachia, the upper Midwest or the foothills of the Rockies. One-level courtyard homes fit poorly on sites that aren't reasonably flat or on tight, awkwardly shaped lots. Given their introverted nature, they are rarely the logical choice for lots with dramatic views. Generally, the one-level courtyard house configuration is among the more expensive ways to build a home. It is much less compact than other building types, especially the two- or three-story, cubicly shaped house with basement and attic. It entails more roof area and perimeter wall surface to enclose a given amount of interior space, resulting in not only increased construction costs but also increased heating, cooling and maintenance costs. Some could read the Wall Street Journal article and mistakenly infer that the neo-fortress style may be perfectly okay for anyone, anywhere. Clearly it is not. But there's something more disturbing than the potential for readers to draw incorrect inferences about architectural styling. The report implies that Americans' perceptions, attitudes and behavior are increasingly shaped by security concerns. Segregation and isolation, not integration and connection, seem to preoccupy more and more citizens who want to live not only in gated communities, but also in gated homes. Referring to the $8 million home in Florida with a pair of turrets, Fletcher reports that the turret near the garage houses a platform accessed by a circular stair and a fireman's pole. "The client," noted the builder, "thought it would be great for his grandchildren to be able to shoot their BB guns out the window, then slide down the pole." Before arriving at this Florida bastion, perhaps visitors should know more about the prospective BB gun targets as well as the rest of the home arsenal -- what about crossbows and boiling oil? The $1 million builder's house in Kentucky encompasses 10,000 square feet and has a three-story, outdoor media room, according to Fletcher, including a shower, hot tub, fireplace, gazebo with built-in television and kitchenette, bar, small pool and waterfall. The owners boast that, when fireworks are flying in distant Cincinnati, they can sit in their outdoor media room and watch the fireworks live and on television at the same time, experiencing the real and the virtual simultaneously. Could this be the ultimate suburban house, a house connected only electronically to the rest of the world, a house you never would have to leave? Courtyard homes can be wonderful in their place, their virtues being spatial amenity, not defendability. They should be built not to escape the communal world outside, but rather to heighten enjoyment of the familial world inside. As for turrets, man's home may be his castle, but it doesn't have to look like one. � Copyright 1998 The Washington Post Company --------------------------------NOTICE:------------------------------ ISPI Clips are news & opinion articles on privacy issues from all points of view; they are clipped from local, national and international newspapers, journals and magazines, etc. Inclusion as an ISPI Clip does not necessarily reflect an endorsement of the content or opinion by ISPI. In compliance with Title 17 U.S.C. section 107, this material is distributed free without profit or payment for non-profit research and educational purposes only. --------------------------------------------------------------------------- ISPI Clips is a FREE e-mail service from the "Institute for the Study of Privacy Issues" (ISPI). To receive "ISPI Clips" on a daily bases (approx. 4 - 8 clips per day) send the following message "Please enter [Your Name] into the ISPI Clips list: [Your e-mail address]" to: ISPIClips at ama-gi.com . The Institute for the Study of Privacy Issues (ISPI) is a small contributor-funded organization based in Victoria, British Columbia (Canada). ISPI operates on a not-for-profit basis, accepts no government funding and takes a global perspective. ISPI's mandate is to conduct & promote interdisciplinary research into electronic, personal and financial privacy with a view toward helping ordinary people understand the degree of privacy they have with respect to government, industry and each other and to likewise inform them about techniques to enhance their privacy. But, none of this can be accomplished without your kind and generous financial support. If you value in the ISPI Clips service or if you are concerned about the erosion of your privacy in general, won't you please help us continue this important work by becoming an "ISPI Clips Supporter" or by taking out an institute Membership? We gratefully accept all contributions: Less than $60 ISPI Clips Supporter $60 - $99 Primary ISPI Membership (1 year) $100 - $300 Senior ISPI Membership (2 years) More than $300 Executive Council Membership (life) Your ISPI "membership" contribution entitles you to receive "The ISPI Privacy Reporter" (our bi-monthly 12 page hard-copy newsletter in multi-contributor format) for the duration of your membership. For a contribution form with postal instructions please send the following message "ISPI Contribution Form" to ISPI4Privacy at ama-gi.com . We maintain a strict privacy policy. Any information you divulge to ISPI is kept in strict confidence. It will not be sold, lent or given away to any third party. ********************************************** To subscribe or unsubscribe, email: majordomo at majordomo.pobox.com with the message: (un)subscribe ignition-point email at address ********************************************** www.telepath.com/believer ********************************************** --- end forwarded text ----------------- Robert A. Hettinga Philodox Financial Technology Evangelism 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From stuffed at stuffed.net Tue Sep 8 04:33:40 1998 From: stuffed at stuffed.net (STUFFED NEWS DAILY) Date: Tue, 8 Sep 1998 04:33:40 -0700 (PDT) Subject: Man arrested while screwing Pumpkin/Couple caught screwing in monkey cage Message-ID: <19980908071001.16643.qmail@eureka.abc-web.com> PLUS YOU GET 30+ FREE HI-RES JPEGS - AND... + PAGE 2 'SPREAD' - GORGEOUS GAL + WILD THUMBS - 10 JPEGS + THUMBNAIL HEAVEN - 10 MORE JPEGS + SEXY STORY: "HOME FOR BREAKFAST" + SEXY SURPRISE THUMBS - ANOTHER 10 JPEGS + STRIP CLUB SAFETY MANUAL - FASCINATING FEATURE + THE VERY BEST OF EUREKA! - HOT SITES + ULTRA HI-RES POSTER PIC - SAVE IT, PRINT IT + LOADS AND LOADS MORE STUFF - CHECK IT OUT! - Have fun! ----> http://stuffed.net/98/9/8/ <---- Welcome to today's issue of Stuffed. To read it you should click on the URL above. If it is not made clickable by your email program you will need to use your mouse to highlight the URL, copy it and then paste it into your browser (then press Return). This email is never sent unsolicited. Stuffed is the supplement for the Eureka newsletter you subscribed to. Full instructions on unsubscribing are in every issue of Eureka! ----> http://stuffed.net/98/9/8/ <---- From vznuri at netcom.com Mon Sep 7 14:34:09 1998 From: vznuri at netcom.com (Vladimir Z. Nuri) Date: Tue, 8 Sep 1998 05:34:09 +0800 Subject: clinton digital signing Message-ID: <199809072131.OAA29302@netcom13.netcom.com> ------- Forwarded Message Date: Sun, 6 Sep 1998 01:04:12 +1200 To: snetnews at world.std.com From: "ScanThisNews" (by way of jeremy.compton at stonebow.otago.ac.nz (Jeremy Compton)) Subject: SNET: [FP] FW: Clinton "Useless" w/o Pen: Uses SmartCard Encrption - -> SNETNEWS Mailing List [Forwarded message] Clinton "Useless" w/o Pen: Uses SmartCard Encrption Source: Fox News - AP http://www.foxnews.com/js_index.sml?content=/news/wires2/ WHITE HOUSE NOTEBOOK: Clinton feels 'utterly useless' without his pen 6.33 p.m. ET (2233 GMT) September 4, 1998 By Shawn Pogatchnik, Associated Press DUBLIN, Ireland (AP) � What's the point of being president if you can't use your pen? Seated at matching laptops, President Clinton and Irish Prime Minister Bertie Ahern used "smart cards,'' personalized codes and digital readers Friday to electronically affix their signatures to an electronic commerce agreement. Clinton joked that he missed the old-fashioned way of approving deals. "Do you have any idea how much time I spend every day signing my name? I'm going to feel utterly useless if I can't do that anymore,'' he said. He also offered this insight on being president: "You know, by the time you become the leader of a country, someone else makes all the decisions. You just sign your name. "You may find you can get away with virtual presidents, virtual prime ministers, virtual everything. You know, just stick a little card in and get the predictable response.'' � 1998 Associated Press. All rights reserved. - ----------------------- NOTE: In accordance with Title 17 U.S.C. section 107, this material is distributed without profit or payment to those who have expressed a prior interest in receiving this information for non-profit research and educational purposes only. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml - ----------------------- - -----Original Message----- From: believer at telepath.com [mailto:believer at telepath.com] Sent: Saturday, September 05, 1998 6:09 PM To: believer at telepath.com Subject: Clinton "Useless" w/o Pen: Uses SmartCard Encrption - -> Send "subscribe snetnews " to majordomo at world.std.com - -> Posted by: "ScanThisNews" (by way of jeremy.compton at stonebow.otago.ac.nz (Jeremy Compton)) ------- End of Forwarded Message From info at aardvaak.co.uk Mon Sep 7 14:34:23 1998 From: info at aardvaak.co.uk (Aardvaak Connect Free) Date: Tue, 8 Sep 1998 05:34:23 +0800 Subject: Your subscription request :cypherpunks@toad.com Message-ID: <001ff2318210798WEB@www.telinco.net> Congratulations. Your request has been processed succesfully. However, please allow up to 2 hours before trying to connect. Login = FREE256974 Password = cypherpunk -- Connect Free Information To connect FREE to 33.6Kbps access or 28.8Kbps please use 0845 662 1009 To connect FREE to K56Flex access please use 0845 662 1109 To connect FREE to 56K X2 access please use 0845 662 1209 To connect FREE to 64K ISDN access please use 0845 662 1309 Why not return to http://www.aardvaak.co.uk/ww37.htm and see how to create a stunning web site online and for free! From rah at shipwright.com Mon Sep 7 14:34:41 1998 From: rah at shipwright.com (Robert Hettinga) Date: Tue, 8 Sep 1998 05:34:41 +0800 Subject: e$: crypto-expatriatism In-Reply-To: Message-ID: -----BEGIN PGP SIGNED MESSAGE----- At 3:38 PM -0400 on 9/7/98, Robert Hettinga wrote about Ryan Lackey's whereabouts, on cypherpunks: > If I told you, I would have to kill you? Whew. Glad Ryan has now said something publically now about his and Ian's bit of extraterritorial subtrifuge (though Ian doesn't qualify, of course). I mean, I just *hate* keeping secrets... ;-). Frankly, I *really* have a hard time with all this man-without-a-first-world-country, crypto-expat stuff. I think making the technology not eonomically optional is the way to change things, and no amount of romantic, jurisdiction-shopping "regulatory arbitrage" is going to alter reality all that much. But, I guess, Anguilla's as nice a place to have this affliction as any I can think of. And, I wish Vince -- and now, apparently, Ryan -- good luck, whatever happens. Yet, for some reason, memories of Vietnam-era draft-dodgers keep coming to mind. For what it cost them all personally, not much good came of it, I'd say, for them or anyone else. The people who protested the war and "fought the good fight" to end it stayed here to do it, after all. The most potent anti-war activists were Vietnam vets themselves, for that matter. And, of course, Ridgeway told Eisenhower at the outset that Vietnam was a multi-million-man war, and Eisenhower stayed out accordingly, throwing a few marginal people on the ground to shut Lodge up. It took Testosterone Jack to get a Special-Forces hard-on. Eventually he and Desktop Lyndon ended up screwing a pooch instead of the commies. Do people out there really think somebody like Gore's going to do a crypto-amnesty someday? I didn't think so. Ashcroft, maybe, but don't hold your breath, there, either. It'll be decades, I bet, and our "boys over there" will have grey hair long before they do come back home on this one. Political inertia is probably going to keep a few people we know outside the fence, looking in, for an awful long time after the issue's utterly dead. I expect people who do this crypto-expat stuff are going to get their new passports refused at the U.S. border when they visit, and I think that things are going to get worse for them for a long time before they get better. Of course, there's a fair argument to be made that if they do get refused, it's probably time to leave, anyway, but I'll let someone else gnaw that bone. And, frankly, I *do* expect that the FBI will attempt domestic crypto controls, just like they've been been trying to do for some time now. But, unlike a lot of people, I think that the marketplace will steamroller all such silliness into yet another roadtop attraction, before or after its legislation. Anyway, as the old "excrable" e$yllogism goes, Digital commerce is financial cryptography. Financial cryptography is strong cryptography. Therefore, if there's no strong cryptography, there's no digital commerce. So, call me an optimist. Like I've said before, I've heard the end of life and liberty as we know it predicted over and over again -- hell, I've even believed so myself, once or twice -- but, like the Gibbon quote in my .sig goes, "however it may deserve respect for its usefulness and antiquity", I ain't seen it happen yet. Cheers, Bob Hettinga -----BEGIN PGP SIGNATURE----- Version: PGP for Personal Privacy 5.5.5 iQEVAwUBNfRQJMUCGwxmWcHhAQHb7gf+ImnoGG28coDgde4cDgnwHyQatO78nY4B 9bMfB9bE1FCqAIZNKfrPzqhJpZzCbYEDYQexXe8bRsl32M7FnIye7w4r7kxeXxns LbLWY83juOAJNgMhPxPhFVcXb8NqwOQzCnYjLdfKSuJ6/lZuNGvsVohHwYuhNxc9 WlOW1WsqeSl3KyzpdDyZU1jAUvNEJQU9JoeeEvlwFNM7zMW3ZoIQB5SSVLf2HYzX vtpnZiRsOeSXt0sWmlXHiZ+DeB+79z1z157cg/AOn/qAGBLBgZuDp+dbRH7B4ynR ngB6XS+irSzNnMWQrVdNYPuRPRRQ+h/eV+US2Cmjc3uuFcnR/+tnNg== =0UKh -----END PGP SIGNATURE----- ----------------- Robert A. Hettinga Philodox Financial Technology Evangelism 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From SupportOnlineStaff_001921 at news.newswire.microsoft.com Mon Sep 7 14:36:43 1998 From: SupportOnlineStaff_001921 at news.newswire.microsoft.com (Support Online Staff) Date: Tue, 8 Sep 1998 05:36:43 +0800 Subject: Microsoft Office Support News Watch - September 7, 1998 Message-ID: <199809072128.OAA10646@toad.com> Microsoft Office Support News Watch =================================== As a subscriber to the Microsoft Office Support News Watch, you receive e- mail twice each month that highlights some of the new articles recently published on Support Online, Microsoft's award-winning technical support web site. Contents -------- - Office Update Web Site - Outlook Security Patch - Office 2000 - Kernel32.dll Error During Office Setup - "No License" Error When Running Microsoft Access 97 on Windows 98 - Get Support Online Articles by E-mail Office Update Web Site ====================== The Office Update Web site was recently modified to make it easier for you to find up-to-date information about Office Products. Office Update is a free online extension of Microsoft Office that is accessible to all users. You can access the site from the link placed prominently at the top of each of the Office products by clicking Help, selecting Microsoft On The Web, and then clicking Free Stuff. You can find the Office Update site at the following address on the World Wide Web: http://officeupdate.microsoft.com/ The Office Update site provides the latest Office service releases, security patches, product add-ins, new Office assistants, clip art, templates, and custom business solutions. Outlook Security Patch ====================== Now available is an updated security patch for Microsoft Outlook 98 that protects you against a potential problem involving file attachments with extremely long names as well as a variant found during continued testing. The new location of this patch is on the Office Update site at: http://officeupdate.microsoft.com/updates/updOutlook.htm Office 2000 =========== For information about features in the next version of Office, go to the Microsoft Office 2000 site on the Internet: http://www.microsoft.com/office/2000/ Kernel32.dll Error During Office Setup ====================================== When installing Office 97 on Microsoft Windows 98, you may receive the following error message: This program has performed an illegal operation and will be shut down. If the problem persists, contact the program vendor. If you click Details, you receive an error message similar to the following: ACMSETUP caused an invalid page fault in module KERNEL32.DLL at 0177:bff7be97. This problem may occur when you have your CD-ROM drive configured to use Direct Memory Access (DMA) in the Windows 98 Device Manager. For information about this problem see Knowledge Base article Q190630. This article is available on the Web at the following address: http://support.microsoft.com/support/kb/articles/Q190/6/30.asp "No License" Error When Running Microsoft Access 97 on Windows 98 ================================================================= When you start Microsoft Access 97, you may receive the following error message Microsoft Access can't start because there is no license for it on this machine. even though you have a fully licensed copy of Microsoft Access. You may receive this error message on a Windows 98 computer if the following conditions are met: - You have installed Microsoft Publisher - You have installed Access from the Office 97 Professional CD Certain fonts that are installed by Microsoft Publisher can result in the incorrect registration of Microsoft Access 97, but only when Access is being installed from the Office 97 Professional CD. You can correct the registration error by using either of the following methods: - Rename one of the problem fonts, and then reinstall Microsoft Access from the Setup Maintenance Mode. -or- - Download a tool that Microsoft has on its Downloads Web site that corrects this problem. Renaming the Font and Reinstalling Microsoft Access --------------------------------------------------- Reinstalling Microsoft Access 97 using the Setup Maintenance Mode does not require you to uninstall Microsoft Access first; it simply returns the computer to the install state that it was in the last time Setup was run. Follow these steps to correct the registry error: 1. On the Start menu, point to Find, and then click Files Or Folders. 2. In the Named box, type "hatten.ttf" (without the quotation marks). 3. In the Look In box, type "C:\Windows\Fonts" (without the quotation marks) or the path to the Fonts folder on your computer. 4. Click the Find Now button to start the search. 5. Under Name, right-click the hatten.ttf file, and click Rename on the menu that appears. 6. Change the name of the file to "hatten.xxx" (without the quotation marks). 7. Minimize (but do not close) the Find dialog box. 8. On the Start Menu, point to Settings, and click Control Panel. 9. In Control Panel, double-click Add/Remove Programs. 10. In the Add/Remove Program Properties dialog box, select the Install/Uninstall tab and select Microsoft Office 97, Professional Edition from the program list. 11. Click the Add/Remove button to run Office Setup in Maintenance Mode. 12. In the Microsoft Office 97 Setup dialog box, click Reinstall. 13. Once the reinstallation is finished, click the Find dialog box on the Windows taskbar to maximize it. 14. Under Name, right-click the hatten.xxx file, and click Rename on the menu that appears. 15. Change the name of the file to "hatten.ttf" (without the quotation marks). Microsoft Access should now be properly registered. Using the Downloadable Tool --------------------------- The AcLicn97.exe file contains a tool that corrects the problem discussed in this article so that you can run Microsoft Access 97 successfully. You can download AcLicn97.exe from the following Microsoft Web site: http://support.microsoft.com/download/support/mslfiles/ACLICN97.EXE AcLicn97.exe is a self-expanding archive. Run the file to expand its contents, and then run the expanded file, AcLicens.exe, to properly register Microsoft Access 97 on your computer. Please note that this download will only work if the conditions stated above are met. For solutions to other causes of the same error message, please see the following article in the Microsoft Knowledge Base: ARTICLE-ID: Q141373 TITLE : ACC: "There is no license" Error Starting Microsoft Access http://support.microsoft.com/support/kb/articles/Q141/3/73.asp Get Support Online Articles by E-mail ===================================== You can receive these articles (and others) in e-mail by sending a message to mshelp at microsoft.com. In the Subject line of your message, enter the Article-ID number (Qnnnnnn). For example to receive Q162721, your Subject line should resemble the following example: Subject: Q162721 You can have multiple articles sent to you in e-mail by typing multiple Article-ID numbers separated by a comma. For example: Subject: Q178049, Q174914, Q174062 To receive an index of articles, enter "Index" (without quotation marks) in the Subject line. For example: Subject: Index The MSHelp Index is updated monthly. For more information about MSHelp, see http://support.microsoft.com/support/kb/articles/q183/1/21.asp. Sincerely, The Support Online Team ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Microsoft-sponsored events: ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ For information on all Microsoft-sponsored events, please visit: http://events.microsoft.com ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ How to use this mailing list: ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ You received this e-mail newsletter as a result of your registration on the Microsoft.com Personal Information Center. To unsubscribe, please send a reply to this e-mail with the word "unsubscribe" as the first line in the body of the message. To further define your communication preferences with Microsoft, please visit: http://www.microsoft.com/misc/unsubscribe.htm ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ THIS DOCUMENT IS PROVIDED FOR INFORMATIONAL PURPOSES ONLY. The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication. Because Microsoft must respond to change in market conditions, it should not be interpreted to be a commitment on the part of Microsoft and Microsoft cannot guarantee the accuracy of any information presented after the date of publication. INFORMATION PROVIDED IN THIS DOCUMENT IS PROVIDED 'AS IS' WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND FREEDOM FROM INFRINGEMENT. The user assumes the entire risk as to the accuracy and the use of this document. This document may be copied and distributed subject to the following conditions: 1. All text must be copied without modification and all pages must be included 2. All copies must contain Microsoft's copyright notice and any other notices provided therein 3. This document may not be distributed for profit From mctaylor at privacy.nb.ca Mon Sep 7 14:41:45 1998 From: mctaylor at privacy.nb.ca (M Taylor) Date: Tue, 8 Sep 1998 05:41:45 +0800 Subject: request for [cdn] export laws. In-Reply-To: <3.0.3.32.19980905160024.0070f7c0@dowco.com> Message-ID: On Sat, 5 Sep 1998, jkthomson wrote: > I have been looking for the export restrictions (if any) that regulate > canadian encryption products. I have tried searching the net for a little > while, and although I have found a few (contradictory) blurbs on it, I have > found no 'official' documents or links to them. does this information > exist on the web, and if not, who would be the best department to ask so > that I get the least red-tape or 'runaround'? > > james 'keith' thomson www.bigfoot.com/~ceildh Yes Canada has export restrictions, which are handled by the Department of Foreign Affairs and International Trade (DFAIT). The particular act you should be interested in is the "Export and Import Control Act of Canada." The DFAIT freely distributes "A Guide to Canada's Export Controls" which was updated in 1996, and is available from the International Trade Centers of the Gov't of Canada, see the blue pages in your phone book. Excerpts from the Export Control List of Canada outline the regulations relating to 'Information Security' which includes encryption. Encryption software may fall under the "General Software Note": ------------ This List does not embargo "software" which is either: a.Generally available to the public by being: 1.Sold from stock at retail selling points, without restriction, by means of: a.Over-the-Counter transactions; b.Mail order transactions; or c.Telephone call transactions; and 2.Designed for installation by the user without further substantial support by the supplier; or b.In the public domain". >From the definitions of pp 49-55 "In the public domain" As it applies to the International Lists, means "technology" or "software" which has been made available without restrictions upon its further dissemination. N.B. Copyright restrictions do not remove "technology" or "software" from being "in the public domain". ------------ Further references: Canadian Cryptography Page http://fractal.mta.ca/crypto/ Canada's export controls by Marc Plumb http://www.efc.ca/pages/doc/crypto-export.html Excerpts from the Export Control List of Canada by W. G. Unruh http://axion.physics.ubc.ca/ECL.html Department of Foreign Affairs and International Trade http://www.dfait-maeci.gc.ca/ (I have yet to find anything of use from the DFAIT site) Cryptography / Cryptographie Industry Canada http://strategis.ic.gc.ca/crypto (talk about the idea of changes to current policy) International Crypto Law Survey, by Bert-Jaap Koops http://cwis.kub.nl/~frw/people/koops/lawsurvy.htm Canadian Export Controls on Encryption Products and Technology by Stewart A. Baker and Michael D. Hintze http://www.steptoe.com/encryp.htm -- M Taylor mctaylor@ / glyphmetrics.ca | privacy.nb.ca From declan at well.com Mon Sep 7 14:43:48 1998 From: declan at well.com (Declan McCullagh) Date: Tue, 8 Sep 1998 05:43:48 +0800 Subject: What we are Fighting In-Reply-To: Message-ID: We even make an illusion to Monica's Cigar in a story in this week's Time. A Microsoft story I was working on died at the last moment, unfortunately. As for the crypto bills, there is no comparable Senate bill. Certainly this is not for lack of sponsors: Kyl and Feinstein would be glad to introduce it, and Kyl chairs a relevant subcommittee. But they wanted to see how far they'd get with McCain's bill, and now it's too late to do much, as Tim said. -Declan On Mon, 7 Sep 1998, Tim May wrote: > At 6:53 AM -0700 9/7/98, Declan McCullagh wrote: > > >There is, offically, a proposal on the table to limit speech within the > >U.S. by restricting sale, manufacture, distribution, import of non-GAK'd > >crypto. A House committee approved that one year ago. > > > > I'd forgotten about that little one. Of course, it has not gone anywhere > (no Senate version or committee markup, right?), so I'm not yet ready to > say there's official action on its way. And, fortunately, the session is > over but for the shouting about Clinton and his cigars. > > --Tim May > > "The tree of liberty must be watered periodically with the blood of > tyrants...." > ---------:---------:---------:---------:---------:---------:---------:---- > Timothy C. May | Crypto Anarchy: encryption, digital money, > ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero > W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, > Licensed Ontologist | black markets, collapse of governments. > > > > > From ravage at einstein.ssz.com Mon Sep 7 14:46:45 1998 From: ravage at einstein.ssz.com (Jim Choate) Date: Tue, 8 Sep 1998 05:46:45 +0800 Subject: Government Regulation & Scienctific Research (fwd) Message-ID: <199809072204.RAA05499@einstein.ssz.com> Forwarded message: > Date: Tue, 8 Sep 1998 02:52:06 -0700 (PDT) > From: Alan Olsen > Subject: Re: Government Regulation & Scienctific Research > I expect the first world to start to take after the East German model. You mean the one that failed after only 40 years?... > -- Those who are precieved as being a possible threat will be > marginalized, jailed, forced to flee, or co-opted. > > -- A large portion of the population will be devoted towards control of > the population. (Either in law enforcement, paid snitches, propaganda, or > similar activities.) There is a problem with these two conclusions. In short, the impact on American business would be devastating. It won't happen to this degree for the simple reason that there wouldn't be anyone to actualy pay for it and the American citizen is a LOT less likely to stand their post after 3 months of not getting paid then a Stasi proll ever did. If you think about it a moment there are really only TWO issues driving this entire situation in this country: - increased technology and its run-away consequences are completely beyond the keen of politico's because they can't spend the number of hours per day playing with it to understand it AND still run a campaign. They feeled threatened and as a consequence their national model (in their heads) is threatened. Politicians hate to hear: "Oh, I don't need any help. Thanks." With the ease that technology jumps ANY boundary it's a futile task they've handed themselves. - the drug war. With the movement currently gaining strength in this country for medical marijuana and the knock-down-drag-out that's coming between the states and the feds over it, the cost will be prohibitive. We are currently at something like 1/150 people in this country in jail, the majority for minor drug offences. The impact of this (this is 1 person in jail out of every 2 blocks of homes) on the citizen-government relationship is souring fast. When the police in San Francisco say on national news they won't prosecute pot houses because they "have more important things to deal with like murder and burglary" something big is coming... And it ain't a bunch of nazi stormtroopers on every corner. > -- Much of the Government's budget will be devoted to citizen control. No it won't, it will be dedicated to spin-control and legerdemain. Government toadies like their air conditioned desks entirely too much. > In 50 years I expect that the creative citizenry will either be > underground, fled, or no longer participating in the active discorse of > the society. All of the life will be sucked out of the population in > order to fight the "Scapegoats of the Week/Month/Year/Century". I doubt it. What's going to happen is that the reach of government is going to weaken because it's going to become harder (not easier) to track individuals. Why do you think these folks are so hot and heavy on this now? They know something is coming that will make their world-view irrelevant and it scares the hell out of them. History shows that any country that does what you describe lasts no more than a couple of generations (the 20 yr. kind). Even if you go back to the Romans you will find that there is a definite pattern to the way the laws swing from restrictive to permissive. > It will only fall apart when we reach a level where no one wants to live > here any more and it falls apart from internal system failure and > hemoraging. It will fall apart because much of the discussion will become irrelevant. It's interesting that doom-sayers like yourself never mention that the number of opposition camps to the fed's is growing, not lessening. They are finding it harder, not easier, to figure out what people are doing and why. The one negative aspect to this movement is that it tends to attrack very indipendant individuals who don't know how to cooperate, cooperation is the only advantage the feds have on their side. ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From ravage at einstein.ssz.com Mon Sep 7 14:50:42 1998 From: ravage at einstein.ssz.com (Jim Choate) Date: Tue, 8 Sep 1998 05:50:42 +0800 Subject: e$: crypto-expatriatism (fwd) Message-ID: <199809072208.RAA05578@einstein.ssz.com> Forwarded message: > Date: Mon, 7 Sep 1998 17:29:12 -0400 > From: Robert Hettinga > Subject: e$: crypto-expatriatism > Ridgeway told Eisenhower at the outset that Vietnam was a multi-million-man > war, and Eisenhower stayed out accordingly, throwing a few marginal people on > the ground to shut Lodge up. It took Testosterone Jack to get a Special-Forces > hard-on. Eventually he and Desktop Lyndon ended up screwing a pooch > instead of the commies. Balonely, do your research somewhere beside a bar. JFK had no intention of sending more troops in and every intention of withdrawing the troops that were there. There are two sources you can look at to verify this. The first is the troop count over time and the internal presidential memos to the Chiefs of Staff. Had JFK not been shot there would have been NO US troops in Vietnam by the end of '64. LBJ is the nit-wit who crewed the proverbial pooch. ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From declan at well.com Mon Sep 7 14:57:24 1998 From: declan at well.com (Declan McCullagh) Date: Tue, 8 Sep 1998 05:57:24 +0800 Subject: Cypherpunks HyperArchive In-Reply-To: Message-ID: I have ~100 MB from 4/97 to present archived in mbox form. I can FTP it or make it available to anyone who might need it to restore the archive. -Declan On 7 Sep 1998, Ryan Lackey wrote: > > There is another archive at http://sof.mit.edu/cypherpunks, ironically > > the machine that hosts it is not up at the moment > > The machine suffered either disk controller or HDD problems as I was > logged into it. It is located in Boston, MA. I do not currently have > a way of getting to the machine to repair it, and this will likely > continue to be true, so until I can get one of the people I know at > the site where the machine is located to fix it, the archives will be > offline. If the machine cannot be fixed, I will put the archive up > elsewhere. I believe hugh at toad.com copied the entire archive at some > point, so that might be helpful. > > Sorry about this -- replicated servers are always a good idea. > -- > Ryan Lackey > rdl at mit.edu > http://sof.mit.edu/rdl/ > > > > From declan at well.com Mon Sep 7 14:57:50 1998 From: declan at well.com (Declan McCullagh) Date: Tue, 8 Sep 1998 05:57:50 +0800 Subject: What we are Fighting In-Reply-To: <199809071546.LAA21825@camel7.mindspring.com> Message-ID: If anyone does it with an eye to civil disobedience, let me know. But the bill isn't law yet, and one might reasonably hope that it won't be. The details vary. First it was crypto in the commission of a felony. Now it's been narrowed considerably, though not all bills have the "better" version. -Declan On Mon, 7 Sep 1998, John Young wrote: > It would be fitting for this list to be distinguished as > the place where crypto-in-a-crime was first committed. > > What might that be? A match of the crime committed > to prevent widespread strong crypto? > > Crypto-criminal anonymity in the national interest (governmental > secrecy) fighting to prevent crypto-criminal anonymity in the > public interest (private secrecy). > > This is not a troll, but query on what could be done to to tip the > hand and identify those unnamed who are most fearful of strong > cryptography, not their public rougers in the 3 divs of gov. > > > > > > From declan at well.com Mon Sep 7 14:59:32 1998 From: declan at well.com (Declan McCullagh) Date: Tue, 8 Sep 1998 05:59:32 +0800 Subject: What we are Fighting In-Reply-To: Message-ID: On Mon, 7 Sep 1998, Tim May wrote: > > However, "crypto in a crime" has not become law yet. And if we can keep > those pesky "civil rights" lobbyists in D.C. neutralized, maybe it never > will be. With any luck, these curriers of favor are inside the fallout > pattern from Bin Laden's nuke. Taking no position on "public interest" groups for this post, I'd still note that such lobbyists don't really drive legislation in this area. It's business groups, especially the Americans For Computer Privacy alliance, that are drafting the bills and twisting the arms. And their E-PRIVACY bill has crypto-in-a-crime in it. -Declan From ryan at systemics.ai Mon Sep 7 15:27:11 1998 From: ryan at systemics.ai (Ryan Lackey) Date: Tue, 8 Sep 1998 06:27:11 +0800 Subject: e$: crypto-expatriatism In-Reply-To: Message-ID: (Note: my original message was posted to Cypherpunks, which I consider to be substantially different than DBS: had I been posting to DBS, I would have included different details...list differentiation is kin of useful, it's why the different lists were created in the first place) > > At 3:38 PM -0400 on 9/7/98, Robert Hettinga wrote about Ryan Lackey's > whereabouts, on cypherpunks: > > > If I told you, I would have to kill you? I never said this. If you'd like to fabricate/summarize/editorialize, please make it clear that that's what you're doing, by using the traditionally accepted editorial convention of square brackets, or some other convention. I prefer Chicago Manual of Style, but I'm sure the AP Stylebook is acceptable. > > Whew. Glad Ryan has now said something publically now about his and Ian's bit > of extraterritorial subtrifuge (though Ian doesn't qualify, of course). I > mean, I just *hate* keeping secrets... ;-). > Ian Goldberg isn't involved -- he's working on Zero Knowledge Systems, AFAIK, and I wish him luck, but I haven't really spoken to him in months. He's a Canadian, anyway. I haven't mentioned working with anyone else anywhere, other than that I'm working for "interesting" clients. If you know otherwise, it isn't particularly public knowledge at this point. > Frankly, I *really* have a hard time with all this > man-without-a-first-world-country, crypto-expat stuff. I think making the > technology not eonomically optional is the way to change things, and no > amount of romantic, jurisdiction-shopping "regulatory arbitrage" is going > to alter reality all that much. I'm not breaking US law. I'm a US citizen. I pay my taxes, respect US law, etc. It's just that I'm choosing to work on something somewhere other than the US, for a variety of reasons. > And, I wish Vince -- and now, apparently, Ryan -- good luck, whatever happens. Vince formally renounced his citizenship, becoming a citizen of a small african country, and intends to remain in Anguilla. I left the US for a while to work on stuff, and to get away from a major US city for a while. I think there's a huge difference here. What I have done is fundamentally no different than going to Montana to write code for a while, other than that it was cheaper and more convenient for me to come to Anguilla. (Of course, Vince seems to be doing quite well...) I just happen to not want to go back to the US right now, it's not that I can't if I decide I want to at some point. Thanks, Ryan (who generally does not provide confidential information to people who do not like keeping secrets, out of kindness for them) From blancw at cnw.com Mon Sep 7 15:33:10 1998 From: blancw at cnw.com (Blanc) Date: Tue, 8 Sep 1998 06:33:10 +0800 Subject: crypto-expatriatism In-Reply-To: Message-ID: <000501bddaaf$fd1844c0$5f8195cf@blanc> Bob Hettinga wrote: : Anyway, as the old "excrable" e$yllogism goes, : : Digital commerce is financial cryptography. : Financial cryptography is strong cryptography. : Therefore, if there's no strong cryptography, there's no : digital commerce. ................................................................ It could justify becoming an exile, to develop the strong crypto needed for digital commerce. The conditions are right for it. .. Blanc From CRBREW9802 at aol.com Mon Sep 7 15:40:23 1998 From: CRBREW9802 at aol.com (CRBREW9802 at aol.com) Date: Tue, 8 Sep 1998 06:40:23 +0800 Subject: h Message-ID: how did u do it From iang at systemics.com Mon Sep 7 15:41:35 1998 From: iang at systemics.com (Ian Grigg) Date: Tue, 8 Sep 1998 06:41:35 +0800 Subject: e$: crypto-expatriatism In-Reply-To: Message-ID: <199809072239.SAA02421@systemics.com> > At 3:38 PM -0400 on 9/7/98, Robert Hettinga wrote about Ryan Lackey's > whereabouts, on cypherpunks: > > > If I told you, I would have to kill you? > > Whew. Glad Ryan has now said something publically now about his and Ian's bit > of extraterritorial subtrifuge (though Ian doesn't qualify, of course). I > mean, I just *hate* keeping secrets... ;-). As secrets go, this was not a big one... The main thing that is meant to be confidential was the nature and names of our clients, and under normal business practice, they hold the option(s) on PR. I don't think anyone should need to die to protect that, as even then, their main issue is (probably) not revealing a relationship with a product until it did what they wanted. > Frankly, I *really* have a hard time with all this > man-without-a-first-world-country, crypto-expat stuff. Well, it's not *quite* like that. The US was seriously considered, but Ryan's offer of a fraternity bedroom/office, T1 or no T1, was not as attractive as some time in the sun. After all, FC came to Anguilla for good reasons. Also, there are other sites under long term consideration, not in the US, but in other cool places. The main reason for considering these sites is that they make business sense; and they are definately cool. Maybe we'll keep the details to ourselves until they are vapour-compliant. It should be mentioned that the contagion properties of renouncement are somewhat less than epidemic. Vince decided to "do the deed," but others are not exactly leaping for their passports and Lonely Planet guides. In fact, most of the at-risk group here are still swearing by the bible and running up the flag every morning, just in case anybody gets the wrong idea. Or at least that's what it seems like to those of us immunised at birth. iang From fsigs at relay.lg.co.kr Mon Sep 7 16:02:32 1998 From: fsigs at relay.lg.co.kr (fsigs at relay.lg.co.kr) Date: Tue, 8 Sep 1998 07:02:32 +0800 Subject: FutureSignals Message-ID: This message is being sent to you in compliance with the proposed Federal legislation for commercial email (S.1618 - SECTION 301). http://www.senate.gov/~murkowski/commercialemail/EMailAmendText.html "Pursuant to Section 301, Paragraph (a)(2)(C) of S. 1618, further transmissions to you by the sender of this email may be stopped at no cost to you by sending a reply to this email by following the directions below this message. ======================================================== Attention Futures Traders Receive Real-time INSTANT FutureSignals over the internet by Noted CTA. Futures traders, our service sends INSTANT FutureSignals via the internet as they are generated for the following markets: S&P 500, Nasdaq 100, E-Mini, Unique Futures Trading Opportunities. Our FutureSignals come with Profit objectives for Scalpers, Daytraders and Postion Traders. We also issue trailing stops and important info we hear in the pits throughout the day. Our service has been featured in Futures Magazine. For a FREE 3 DAY TRIAL go to : http://www.bulkmate.com/futuresignals/ http://www.bulkmate.com/futuresignals/ Futures trading involves risk. Only use risk capital. Please read CFTC disclaimer on our website. To be removed from this list, simply send a blank email to: fsremove at do-it-now.net NOTE: It is not our intention to infiltrate or advertise to any investing/trading-related discussion groups. If this has been the case, our apologies and please follow the removal instructions above. Sent from: FutureSignals Email : fs at do-it-now.net Address: PO Box 351, Verplanck, NY, 10596 Telephone: 212-501-4281 From aba at dcs.ex.ac.uk Mon Sep 7 16:05:47 1998 From: aba at dcs.ex.ac.uk (Adam Back) Date: Tue, 8 Sep 1998 07:05:47 +0800 Subject: (fwd) Re: KRAP is at it in the IETF Message-ID: <199809072253.XAA08953@server.eternity.org> A GAKker breaks cover on dbs list as a result of William Geigers heads up on the issue... The GAK apologists are very thin on the ground in public discussion forums generally, so it is nice to see the odd one speak up. Seems like they are too busy taking government handouts to implement KRAP to actually own up to their misdeeds in public, generally. Adam ====================================================================== From: "Todd S. Glassey" To: "William H. Geiger III" , Cc: , "JeffreySchiller" , "MarcusLeech" , "Robert G. Moskowitz" , Subject: RE: KRAP is at it in the IETF Date: Mon, 7 Sep 1998 13:38:50 -0700 William, Let me start with the disclaimer since I am going to vehemently disagree with you - These are my own opinions and in no way reflect my companies or our clients Opinions, etc. etc. etc. - So William - IMHO, you are missing the point totally. The IETF is an A-Political Organization investing in the development of technical standards to accomplish various networking services. As to the issue of Politic vs. Technology, by its actions alone, KRAP's demonstrated agenda with the IETF is purely technical and whether it is in furtherance of its external political agenda is really irrelevant to the IETF as and its established process as a whole. >From my vantage point, the real issue herein is your personal/moral standing with the dissolving of anonymity through Key Recovery and Government's ability to look at data that flows over a network. Remember also that it was the Government that was the primary subsidizer of said same network and everything that evolved the old 56k ARPANET into what the Public Internet is today. As another side issue, the other potentially-viable argument is that ISAKMP/IKE is so far along in its process of becoming a standard, that adding a late draft impedes the value of the work already done - Essentially that these folks (KRAP) have essentially slipped a whammy onto the stack. Is it your view that this implies that because of this later posting that the material will be exempt from the general scrutiny that the previous components of ISAKMP/IKE have been through - I don't think so... This crowd loves to do the Pit-Bull thang and shred the submitted concepts to glean the technical truth therein. If this is the issue then the answer is to work within the existing framework and to submit a public motion to the WG to freeze the ISAKMP last call efforts so that they exclude the new draft until such time as it (the GAK extensions) can undergo further scrutiny. As to the issue of the addition itself being out of line because of its late entrance into the standards arena relative to the last call and all that- Again, I disagree as to what and how - There are numerous "standard processes" in place that allow for this as well and that here in the real world, use of this ability is a very common practice. Look for instance at what happened to the last TAX REFORM effort with the addition of Senator Moyniham's SS1706 Rider, or as another example look at what congress as a whole did with the HIPAA legislation (http://www.hcfa.gov/regs/hipaacer.htm) and its embedded "legal penalties" for unauthorized disclosure of health data. Since this case is specific to the bulk distribution of data, it really applies directly to IT Directors and their staff. heck, imagine that your insurance Co.'s or hospital's IT folks could actually go to jail by the statute set here. Again here we are at the bottom line and if this is the thing you are objecting too then you need to object to the process not the event itself. As to the perversion commentary specifically... perversion is a moral issue and is not addressed by the IETF rules (RFC2026 in particular). My suggestion is that if you feel this is a problem that you address it at the POISSON WG level rather than in IPSEC or PKIX since it is a process problem, and that under the currently in-place operating rules, this thing, the filing of a new proposed component of the ISAKMP protocol is OK to do. - --- Don't get me wrong, as it happens I too believe that Key Recovery is futile effort for the government, not because it doesn't have a need for this type of capability, but because they didn't act fast enough and the "cat is already out of the bag". So any efforts to pull this one off will most likely be futile and will definitely not be cost effective for normal ECommerce operations let alone personal communications. BTW - The reality in the Intelligence Community World is that for the surveillance of the big-league terrorists, dope dealers, and the like, key recovery is useless since because they are so well funded and their access to technologies is such that they (the bad guys) can and will employ advanced technologies to get around whatever the NSA/DSIA/DoC/DoJ put in place to thwart them. As an example of this the Leopard's (sort of the Bolivian Govt.'s DEA Field Agents, et al.) found that when they attacked the labs of the Median Cartel they were out gunned and technologically overpowered to the point that without the US Military intervention they would have no possibility of thwarting these activities. Draw your own conclusions. As a point of social commentary, I understand and hear your point, but if this kind of process "invasion" as you have put it was such an issue then how come there was so little push back was done against the "Communications Assistance for Law Enforcement Act" (CALEA). I think that as a whole the people against the KRAP initiatives are there because of the cost and overhead issues, not the personal freedom ones. Thus it becomes a business issue and not a human one. The world is changing into a global society and the rules about personal freedom are evolving with it... Not everyone is going to like them but the facts are what they are and IMHO - personally I wonder more how some local constituency would respond to the invasion of their personal privacy when some "pervert terrorist" parks a recently acquired nuke or Bio-toxic Weapon from the now defunct Russian Arsenal in their backyard and pushes the #$%^&* button. If losing absolute anonymity is the cost of better safeguarding oneself and family from threats like these, what the heck. Its a very small cost to pay. My personal feeling is that since I have made the decision to live in and work with modern society as a whole, that I must follow the edicts that evolving technologies and social values/morals put in place by and for us as a whole. Otherwise our choice is real simple - If you don't like the rules, then don't play the game. Move out to the backwoods and stay out of society as a whole. I don't mean to be a putz by this, but come on... "a perversion". This isn't the place for that kind of morality issue!. Todd > -----Original Message----- > From: dbs at philodox.com [mailto:dbs at philodox.com]On Behalf Of William H. > Geiger III > Sent: Monday, September 07, 1998 1:24 AM > To: dbs at philodox.com > Subject: KRAP is at it in the IETF > > > -----BEGIN PGP SIGNED MESSAGE----- > > Hello, > > It has come to my attention that the KRAP (key recovery alliance program) > has submitted an I-D (internet draft) to the IETF for adding GAK > (government access to keys) to the IPSEC protocols: > > ftp://ftp.ietf.org/internet-drafts/draft-rfced-exp-markham-00.txt > > ISAKMP Key Recovery Extensions > > > 7. AUTHOR INFORMATION > > Tom Markham > Secure Computing Corp > 2675 Long Lake Road > Roseville, MN 55113 USA > > Phone: 651.628.2754, Fax: 651.628.2701 > EMail: tom_markham at securecomputing.com > > > I consider this a perversion of the standards process of the IETF to > advance a political agenda which must be stopped at all cost. > > Below are the e-mail addresses of some people that you should write > (politely) expressing your objections to any such additions to the > protocols: > > IPSEC Chairs: > > Theodore Ts'o > Robert Moskowitz > > Security Area Directors: > > Jeffrey Schiller > Marcus Leech > > As I mentioned before, be polite. These people are not the ones proposing > GAK be added to the IPSEC protocols. They have put a lot of time and > effort in forwarding the cause for strong encryption. They should be made > aware of the communities objections to these attempts by KRAP. > > Thanks, > > - -- > - --------------------------------------------------------------- > William H. Geiger III http://www.openpgp.net > Geiger Consulting Cooking With Warp 4.0 > > Author of E-Secure - PGP Front End for MR/2 Ice > PGP & MR/2 the only way for secure e-mail. > OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html > - --------------------------------------------------------------- > > Tag-O-Matic: It's OS/2, Jim, but not OS/2 as we know it. > > -----BEGIN PGP SIGNATURE----- > Version: 2.6.3a-sha1 > Charset: cp850 > Comment: Registered_User_E-Secure_v1.1b1_ES000000 > > iQCVAwUBNfOVk49Co1n+aLhhAQFJwwP+O4vrZVKFpOG8vCHFwbDuPIv/99AhBnKF > RK/Ikc5y2gGKq9hfxkTb4o77YUrDaEGkYUPHk+ZC57Oag0Lu1v6W1EAbQ5T4RpzH > JWYXOonQmbqw5rH0h6brzqrH3ep9Ej9DR0gv4mGgIfSNlJSUu6TWO5ZHXKWiE4yy > 5flH0Ngg/TI= > =EzNL > -----END PGP SIGNATURE----- > > Tag-O-Matic: Speed Kills - Use Windows! > > > ------- End of forwarded message ------- From aba at dcs.ex.ac.uk Mon Sep 7 16:06:41 1998 From: aba at dcs.ex.ac.uk (Adam Back) Date: Tue, 8 Sep 1998 07:06:41 +0800 Subject: KRAP is at it in the IETF In-Reply-To: <002701bdda9f$84ec8430$89bffad0@tsg-laptop> Message-ID: <199809072248.XAA08942@server.eternity.org> Todd S. Glassey writes on dbs at philodox.com (digital bearer settlement) list: > Let me start with the disclaimer since I am going to vehemently disagree > with you - These are my own opinions and in no way reflect my companies or > our clients Opinions, etc. etc. etc. - [What company do you work for? You disclaim about your "company" and "clients" without mention of who they are? (I like to know who the GAKkers are, are you with securecomptuing.com also?)] > So William - IMHO, you are missing the point totally. The IETF is an > A-Political Organization investing in the development of technical standards > to accomplish various networking services. As to the issue of Politic vs. > Technology, by its actions alone, KRAP's demonstrated agenda with the IETF > is purely technical and whether it is in furtherance of its external > political agenda is really irrelevant to the IETF as and its established > process as a whole. I understood it this way: that IETF policy is not allow political considerations to weaken or otherwise damage security functions in IETF standards. eg. No weak key lengths for to satisfy local government politics etc. Read RFC 1984. I quote: : KEYS SHOULD NOT BE REVEALABLE : : The security of a modern cryptosystem rests entirely on the secrecy : of the keys. Accordingly, it is a major principle of system design : that to the extent possible, secret keys should never leave their : user's secure environment. Key escrow implies that keys must be : disclosed in some fashion, a flat-out contradiction of this : principle. Any such disclosure weakens the total security of the : system. : : DATA RECOVERY : : Sometimes escrow systems are touted as being good for the customer : because they allow data recovery in the case of lost keys. However, : it should be up to the customer to decide whether they would prefer : the more secure system in which lost keys mean lost data, or one in : which keys are escrowed to be recovered when necessary. Similarly, : keys used only for conversations (as opposed to file storage) need : never be escrowed. And a system in which the secret key is stored by : a government and not by the data owner is certainly not practical for : data recovery. This quoted point is kind of relevant here: "keys used only for conversations (as opposed to file storage) need never be escrowed" Now we move on to your GAK apologist arguments... > Remember also that it was the Government that was the primary > subsidizer of said same network and everything that evolved the old > 56k ARPANET into what the Public Internet is today. "Government" is composed of public servants. This citizen-unit doesn't want to fund spooks to spy on himself. > The world is changing into a global society and the rules about > personal freedom are evolving with it... Not everyone is going to > like them but the facts are what they are and IMHO - personally I > wonder more how some local constituency would respond to the > invasion of their personal privacy when some "pervert terrorist" > parks a recently acquired nuke or Bio-toxic Weapon from the now Oh give us a break! You already admitted that terrorists are going to use whatever crypto they want whether or not governments succeed in ramming GAK down our throats. > defunct Russian Arsenal in their backyard and pushes the #$%^&* > button. If losing absolute anonymity is the cost of better > safeguarding oneself and family from threats like these, what the > heck. Its a very small cost to pay. Perhaps you would think that video cams in all the rooms in your house (with feeds back to NSA) would be a good idea also,... well you install them, at your cost, and leave us out of your eavesdropping plans, ta very much. Adam From aba at dcs.ex.ac.uk Mon Sep 7 16:32:13 1998 From: aba at dcs.ex.ac.uk (Adam Back) Date: Tue, 8 Sep 1998 07:32:13 +0800 Subject: free anonymous dial up in the UK In-Reply-To: <001ff2318210798WEB@www.telinco.net> Message-ID: <199809072328.AAA09363@server.eternity.org> If any of you are in the UK anytime, you can get free dialup using the following recently posted details: > Login = FREE256974 > Password = cypherpunk > > To connect FREE to 33.6Kbps access or 28.8Kbps please use 0845 662 1009 > To connect FREE to K56Flex access please use 0845 662 1109 > To connect FREE to 56K X2 access please use 0845 662 1209 > To connect FREE to 64K ISDN access please use 0845 662 1309 In the UK local calls are not free (about 1p/min offpeak). The ISP for the above service (www.aardvaak.co.uk) gets it's income via a commission on the phone calls to their dialup numbers. (Most ISPs in the UK charge 10 UKP/month, and you have to pay the local call on top). Anyway the interesting part is the degree of anonymity it gives, as they don't need payment from you, they don't need to know who you are. Also there is www.freenet.co.uk, they offer pop3 mail accounts, and usenet access, but if you already have an ISP you probably don't want all that. Adam From Jaggedrock at aol.com Mon Sep 7 17:02:39 1998 From: Jaggedrock at aol.com (Jaggedrock at aol.com) Date: Tue, 8 Sep 1998 08:02:39 +0800 Subject: [MilCom] MRE's, KCMO, VA Hospitals Message-ID: <1e5a5e2b.35f42dd5@aol.com> Fellow radio enthusiasts of all the above nets, In the past week I have learned of MRE stackpiling in a natural limestone cave in the Kansas City Missouri area. A 4 month government (don't know the specific agency) contract it would appear, that will result in excess of 35,000,000 MRE's having been stored in the cave. That's enough to feed 500,000 for 22 days roughly. Further, I have learned that, apparently, 23 VA hospitals that are closed (don't know where and don't know the names) are being converted into food storage facilities with all of the equipment having been removed and a special coating being applied to the interior surfaces to enhance storage life. Having said that, any fecom, milcom activity that would shed light on this activity? Any KCMO monitors hearing anything? Anyone in KCMO area that would like to try to find out more and advise the rest of us accordingly? Thanks, jaggedrock at aol.com (Sangean ATS803A, Uniden 100XLT, Uniden Bearcat 895XLT Trunktracker, 48 foot roof mount dipole, roof mount Scantenna 25 feet aloft, all low loss cable feeds - plus good human eyes and ears). --- Submissions milcom at qth.net From mgering at ecosystems.net Mon Sep 7 17:03:31 1998 From: mgering at ecosystems.net (Matthew James Gering) Date: Tue, 8 Sep 1998 08:03:31 +0800 Subject: cryptographically secure mailing list software Message-ID: <33CCFE438B9DD01192E800A024C84A19284612@mossbay.chaffeyhomes.com> I've been curious as to whether anyone has developed and/or whether it is technically feasible to develop a cryptographically secure listserver. e.g. User would submit their PGP public key to the listserver upon subscription, submitted messages would be encrypted with the listserver's public key, the listserver would decrypt the message and re-encrypt it with the key of all members and distribute it. This way the users don't need to manage all the keys or even know the list membership. Most listservers already have the ability to moderate subscription messages, the list would not be snoopable. What sort of overhead would exist on a list of a few hundred members? If there is not something existing that will do this, what is the best mailing list codebase to start from? Majodomo I imagine might not be up to the task being written in Perl, LSoft ListSERV I love but it is commercial (no sourcecode). Matt From ravage at einstein.ssz.com Mon Sep 7 17:13:45 1998 From: ravage at einstein.ssz.com (Jim Choate) Date: Tue, 8 Sep 1998 08:13:45 +0800 Subject: cryptographically secure mailing list software (fwd) Message-ID: <199809080031.TAA06618@einstein.ssz.com> Forwarded message: > From: Matthew James Gering > Subject: cryptographically secure mailing list software > Date: Mon, 7 Sep 1998 16:59:56 -0700 > I've been curious as to whether anyone has developed and/or whether it > is technically feasible to develop a cryptographically secure > listserver. > User would submit their PGP public key to the listserver upon > subscription, submitted messages would be encrypted with the > listserver's public key, Actualy to be secure the subscriber would need to use one of the remailers public key to encrypt their key prior to submission to the remailer. Of course this doesn't prevent a MIT attack and key substitution. Otherwise you'd be sending your key in the clear, generaly a bad thing. This touches on the main problem with distribution and use of PKE, in that no secure key management protocal suitable for internet sort of architectures has ever been developed that doesn't require some trusted 3rd party or an existing secure channel. ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From jkthomson at bigfoot.com Mon Sep 7 17:48:15 1998 From: jkthomson at bigfoot.com (jkthomson) Date: Tue, 8 Sep 1998 08:48:15 +0800 Subject: In-Reply-To: Message-ID: <3.0.3.32.19980907174032.006c2e74@dowco.com> At 06:28 PM 9/7/98 EDT, CRBREW9802 at aol.com wrote: >how did u do it i tink i smarter 'dan you, 'dats how. ----------------------------------------------------------------------- james 'keith' thomson www.bigfoot.com/~ceildh jkthomson:C181 991A 405C EAFB 2C46 79B5 B1DC DB78 8196 122D [06.07.98] ceildh :1D79 59AF ED75 5945 6003 8240 DA34 ACCA 9DE4 6BC9 [05.14.98] ICQ:746241 at pgp.mit.edu ...and former sysop of tnbnog BBS ----------------------------------------------------------------------- Knocked; you weren't in. - Opportunity ======================================================================= From ravage at einstein.ssz.com Mon Sep 7 17:52:02 1998 From: ravage at einstein.ssz.com (Jim Choate) Date: Tue, 8 Sep 1998 08:52:02 +0800 Subject: A question about gas warfare in San Fran in '66... Message-ID: <199809080109.UAA06813@einstein.ssz.com> Hi, Here in Austin we have a local radio dj who does a public access show on various issue localy and nationaly, Alex Jones, who has put a piece on some sort of bio-weapon test that occurred in '66 in San Francisco. He is claiming that deaths resulted. Anyone have a clue what he's talking about? ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From ericm at lne.com Mon Sep 7 17:55:35 1998 From: ericm at lne.com (Eric Murray) Date: Tue, 8 Sep 1998 08:55:35 +0800 Subject: cryptographically secure mailing list software In-Reply-To: <33CCFE438B9DD01192E800A024C84A19284612@mossbay.chaffeyhomes.com> Message-ID: <199809080053.RAA07220@slack.lne.com> Matthew James Gering writes: > > > I've been curious as to whether anyone has developed and/or whether it > is technically feasible to develop a cryptographically secure > listserver. > > e.g. > > User would submit their PGP public key to the listserver upon > subscription, submitted messages would be encrypted with the > listserver's public key, the listserver would decrypt the message and > re-encrypt it with the key of all members and distribute it. This way > the users don't need to manage all the keys or even know the list > membership. Most listservers already have the ability to moderate > subscription messages, the list would not be snoopable. > > What sort of overhead would exist on a list of a few hundred members? At ~1sec/ encryption (varies greatly depending on your list hardware, should be less on a newer PC) adding an extra 200 seconds of CPU time for each mail message to the list is probably acceptable. > If there is not something existing that will do this Check out PGPdomo. I found a copy at: ftp://hawww.ha.osd.mil/pgpdomo/pgpdomo.tar.Z -- Eric Murray N*Able Technologies www.nabletech.com (email: ericm at the sites lne.com or nabletech.com) PGP keyid:E03F65E5 From ravage at einstein.ssz.com Mon Sep 7 18:13:44 1998 From: ravage at einstein.ssz.com (Jim Choate) Date: Tue, 8 Sep 1998 09:13:44 +0800 Subject: Emergency G-7 meeting in England on Sat.... Message-ID: <199809080131.UAA06954@einstein.ssz.com> Forwarded message: > X-within-URL: http://cnnfn.com/hotstories/economy/9809/07/g7_pkg/ > Britain calls deputies to London to discuss Russia's economic turmoil > Special Report: Eyes on the Market - Sept. 7, 1998 > > International Monetary Fund LONDON (CNNfn) - An emergency meeting of > mid-level G-7 officials will take place in London on Saturday to > discuss the Russian economic crisis and try to hammer out ways to help > countries facing economic meltdown > [INLINE] The special meeting of senior finance and foreign-ministry > officials from the world's industrialized nations was scheduled after > the Duma, Russia's lower house, Monday rejected for a second time the > nomination of Victor Chernomyrdin as prime minister, leaving Russia > without a government. > [INLINE] The G-7 officials are also expected to discuss how to protect > their own economies. ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From KDAGUIO at aba.com Mon Sep 7 18:31:26 1998 From: KDAGUIO at aba.com (Kawika Daguio) Date: Tue, 8 Sep 1998 09:31:26 +0800 Subject: e$: crypto-expatriatism Message-ID: Bob, The syllogism at the end of your post is exactly why I have spent the last more than 5 years negotiating and lobbying and why we (FI's) and you (everyone else) shouldn't worry about the impact of government policy on the security of financial communications. Market (macro and microeconomics plays a bigger role than the government. I wouldn't give up my citizenship, neither would I join those guys at the Fort and give up my rights to move about the world without asking permission to travel or publish. I like the balance where I am, but respect those who wish to protest peacefully. I would prefer that folks kept us out of their fields of fire in the various skirmishes occuring during the cryptocrusades and left us to manage the policy for and the security of our space for ourselves and our customers. just my personal views...kawika... <<< Robert Hettinga 9/ 7 5:29p >>> -----BEGIN PGP SIGNED MESSAGE----- At 3:38 PM -0400 on 9/7/98, Robert Hettinga wrote about Ryan Lackey's whereabouts, on cypherpunks: > If I told you, I would have to kill you? Whew. Glad Ryan has now said something publically now about his and Ian's bit of extraterritorial subtrifuge (though Ian doesn't qualify, of course). I mean, I just *hate* keeping secrets... ;-). Frankly, I *really* have a hard time with all this man-without-a-first-world-country, crypto-expat stuff. I think making the technology not eonomically optional is the way to change things, and no amount of romantic, jurisdiction-shopping "regulatory arbitrage" is going to alter reality all that much. But, I guess, Anguilla's as nice a place to have this affliction as any I can think of. And, I wish Vince -- and now, apparently, Ryan -- good luck, whatever happens. Yet, for some reason, memories of Vietnam-era draft-dodgers keep coming to mind. For what it cost them all personally, not much good came of it, I'd say, for them or anyone else. The people who protested the war and "fought the good fight" to end it stayed here to do it, after all. The most potent anti-war activists were Vietnam vets themselves, for that matter. And, of course, Ridgeway told Eisenhower at the outset that Vietnam was a multi-million-man war, and Eisenhower stayed out accordingly, throwing a few marginal people on the ground to shut Lodge up. It took Testosterone Jack to get a Special-Forces hard-on. Eventually he and Desktop Lyndon ended up screwing a pooch instead of the commies. Do people out there really think somebody like Gore's going to do a crypto-amnesty someday? I didn't think so. Ashcroft, maybe, but don't hold your breath, there, either. It'll be decades, I bet, and our "boys over there" will have grey hair long before they do come back home on this one. Political inertia is probably going to keep a few people we know outside the fence, looking in, for an awful long time after the issue's utterly dead. I expect people who do this crypto-expat stuff are going to get their new passports refused at the U.S. border when they visit, and I think that things are going to get worse for them for a long time before they get better. Of course, there's a fair argument to be made that if they do get refused, it's probably time to leave, anyway, but I'll let someone else gnaw that bone. And, frankly, I *do* expect that the FBI will attempt domestic crypto controls, just like they've been been trying to do for some time now. But, unlike a lot of people, I think that the marketplace will steamroller all such silliness into yet another roadtop attraction, before or after its legislation. Anyway, as the old "excrable" e$yllogism goes, Digital commerce is financial cryptography. Financial cryptography is strong cryptography. Therefore, if there's no strong cryptography, there's no digital commerce. So, call me an optimist. Like I've said before, I've heard the end of life and liberty as we know it predicted over and over again -- hell, I've even believed so myself, once or twice -- but, like the Gibbon quote in my .sig goes, "however it may deserve respect for its usefulness and antiquity", I ain't seen it happen yet. Cheers, Bob Hettinga -----BEGIN PGP SIGNATURE----- Version: PGP for Personal Privacy 5.5.5 iQEVAwUBNfRQJMUCGwxmWcHhAQHb7gf ImnoGG28coDgde4cDgnwHyQatO78nY4B 9bMfB9bE1FCqAIZNKfrPzqhJpZzCbYEDYQexXe8bRsl32M7FnIye7w4r7kxeXxns LbLWY83juOAJNgMhPxPhFVcXb8NqwOQzCnYjLdfKSuJ6/lZuNGvsVohHwYuhNxc9 WlOW1WsqeSl3KyzpdDyZU1jAUvNEJQU9JoeeEvlwFNM7zMW3ZoIQB5SSVLf2HYzX vtpnZiRsOeSXt0sWmlXHiZ DeB 79z1z157cg/AOn/qAGBLBgZuDp dbRH7B4ynR ngB6XS irSzNnMWQrVdNYPuRPRRQ h/eV US2Cmjc3uuFcnR/ tnNg== =0UKh -----END PGP SIGNATURE----- ----------------- Robert A. Hettinga Philodox Financial Technology Evangelism 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' For help on using this list (especially unsubscribing), send a message to "dcsb-request at ai.mit.edu" with one line of text: "help". From rah at shipwright.com Mon Sep 7 18:51:12 1998 From: rah at shipwright.com (Robert Hettinga) Date: Tue, 8 Sep 1998 09:51:12 +0800 Subject: e$: crypto-expatriatism In-Reply-To: Message-ID: Time for a little air clearing, here... At 6:22 PM -0400 on 9/7/98, Ryan Lackey wrote: > (Note: my original message was posted to Cypherpunks, which I consider > to be substantially different than DBS: had I been posting to DBS, I would > have included different details...list differentiation is kin of useful, > it's why the different lists were created in the first place) Perils of the internet, Ryan, everything is everywhere forever. :-). That's okay, you didn't sound that much different than you do anywhere else. That was not perjorative, by the way... > I never said this. If you'd like to fabricate/summarize/editorialize, > please make it clear that that's what you're doing, by using the >traditionally > accepted editorial convention of square brackets, or some other convention. > I prefer Chicago Manual of Style, but I'm sure the AP Stylebook is >acceptable. Actually, I was quoting *myself*, talking about something you discussed later, and which crossed paths with the post in question. It might help to go back and reread the original, in the thread about the cypherpunk hyperarchive, but, you're excused in the meantime. :-). > Ian Goldberg isn't involved -- he's working on Zero Knowledge Systems, > AFAIK, and I wish him luck, but I haven't really spoken to him in months. >He's > a Canadian, anyway. I wasn't talking about *that* Ian. :-). As it is, Ian Grigg has outed himself on another list already, but he's not the one making expatriate noise, seeing as he's Australian, and all... > I haven't mentioned working with anyone else anywhere, > other than that I'm working for "interesting" clients. If you know >otherwise, > it isn't particularly public knowledge at this point. Um, yes. And I haven't said anything besides what's publically known. Certainly *who* you're working for hasn't been revealed yet, and I haven't done that. Even as much as I hate secrets. :-). > I'm not breaking US law. I'm a US citizen. I pay my taxes, respect US > law, etc. It's just that I'm choosing to work on something somewhere other > than the US, for a variety of reasons. That's nice to know. Good to hear. See ya when you get back. At least you haven't made that trip to Antigua or Barbados, or wherever, yet. That, in my opinion, would be rather silly. > > And, I wish Vince -- and now, apparently, Ryan -- good luck, whatever >happens. > > Vince formally renounced his citizenship, becoming a citizen of a small > african country, and intends to remain in Anguilla. I left the US > for a while to work on stuff, and to get away from a major US city for > a while. I think there's a huge difference here. Again, marvellous. > What I have > done is fundamentally no different than going to Montana to write code > for a while, other than that it was cheaper and more convenient for me to > come to Anguilla. Splendid. At the moment, I'd just barely prefer Anguilla to the North Fork of the Flathead River myself, but my opinion on the subject is changing... > (Of course, Vince seems to be doing quite well...) I just happen to not want > to go back to the US right now, it's not that I can't if I decide I want > to at some point. Again, marvellous. I would just be careful you don't fall in with the wrong element while you're down there in the World's Best Place for Financial Cryptography (tm). ;-). > (who generally does not provide confidential information to people > who do not like keeping secrets, out of kindness for them) And, I might add, *you* didn't. :-). Any information I've revealed on this is public. However, I'm in an agressively public business, these days, yes? You don't put "Evangelism" in your business name and expect to hide your light under a bushel basket... Frankly, I'm only *really* obligated to keep secrets I'm paid to keep, anymore. Word to the wise, for anyone else out there who wants call me up and spill the beans. Past obligations will still be honored, of course, but the rent's gotta be paid, same as it ever was. This includes "keep this quiet, but..." in email, encrypted or otherwise, followed by This Week's Business Plan. Frankly, I don't want to hear that stuff anymore unless there's some remuneration behind it. Game over. Cheers, Bob Hettinga ----------------- Robert A. Hettinga Philodox Financial Technology Evangelism 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From rah at shipwright.com Mon Sep 7 18:52:35 1998 From: rah at shipwright.com (Robert Hettinga) Date: Tue, 8 Sep 1998 09:52:35 +0800 Subject: IP: Wired: "The Y2K Solution: Run for Your Life!!" Message-ID: --- begin forwarded text Delivered-To: ignition-point at majordomo.pobox.com X-Sender: believer at telepath.com Date: Tue, 08 Sep 1998 18:38:07 -0500 To: believer at telepath.com From: believer at telepath.com Subject: IP: Wired: "The Y2K Solution: Run for Your Life!!" Mime-Version: 1.0 Sender: owner-ignition-point at majordomo.pobox.com Precedence: list Reply-To: believer at telepath.com Source: Wired http://www.wired.com/wired/6.08/y2k.html F E A T U R E|Issue 6.08 - August 1998 The Y2K Solution: Run for Your Life!! By Kevin Poulsen Scott Olmsted is dressed to do some serious debugging: comfortable khaki shorts, a T-shirt from a Visual Basic conference, and a visor from one of his Silicon Valley employers. But we're a long way from the land of cubicles and industrial parks. In fact, we're a long way from just about everything. Scott is debugging with a hammer, trying to remove a stubborn two-by-four from the wall of a mobile home plunked down in the high desert of Southern California. After banging away for a few minutes, he finally yanks the stud off the wall in a flurry of sawdust and splintered wood. It's a small victory, but it brings him one step closer to his own solution to the greatest computer glitch in history - the Year 2000 Bug. With more than 20 years of computer programming experience under his belt, Scott has decided that the only real fix for the Y2K problem may be to pack up and move to this patch of land 75 miles from his San Diego home. "In the next year or so," he predicts, "the most common cocktail party chatter will be, 'What are you doing to prepare for Y2K?' But by then, it will be too late." This is sagebrush country, the kind of place where you can hear your footsteps crunching in the gravel. But even here, 30 miles from the nearest interstate, a line of telephone poles runs along the dirt road and PacBell terminal boxes sprout from the ground alongside the cacti. While carpet installers work in the next room, Scott is planning for the day when it may all be useless. The property came with a freshwater well, and he'll soon have a solar panel for power. For protection against looters, he's about to purchase his first gun. "I've seen how fragile so many software systems are - how one bug can bring them down," he worries. The idea of hundreds, thousands, millions of bugs cascading all at once keeps him awake at night. His Y2K retreat is easy to spot. In an area where high security means a few strands of barbed wire clinging to a rusty pole, Scott's chain-link fence is shiny and new. The alarm-company sign that hangs from the fence would be more at home in Brentwood, and on the roof there's a DirecTV satellite dish pointed toward the sky. The shed outside his back door will hold nonperishable food. But with a programmer's methodical logic, Scott didn't rush out to buy a year's worth of dehydrated grub. First he sampled the fare from several distributors. One company sold a textured vegetable protein that was a bit more expensive, but it came in a variety of flavors: chicken, beef, and taco. "It was pretty good," Scott says, in the halting measured tones of someone who doesn't want come across as a wacko. "We were pleasantly surprised." So he splurged. What the hell, doomsday comes along only once in a lifetime. Throughout history, prophets and visionaries have spent their lives preparing for the end of the world. But this time veteran software programmers are blazing the millennial trail. The geeks have read the future, not in the Book of Revelation, but in a few million lines of computer code. By now, the source of their anxiety is well known. In the 1950s and 1960s, when the computer world was young and memory was expensive, programmers developed a convention for marking the passage of time. It's the same system most people use to date their checks: two digits for the day, two for the month, and two for the year. Dropping the "19" from the year was convenient, and it saved two bytes of precious RAM every time it was used. Those were days of innocence and optimism. Everyone knew what would happen if this little shortcut was still in use in AD 2000 - the two-digit year would roll over like the odometer on an old Chevy, and the computers would think they'd jumped 100 years into the past. Programmers knew it, and they warned their managers. Not to worry, was the usual reply. When the millennium finally rolls around, all this code will be ancient history. But the code stuck around. The old software worked fine in the postmainframe world, so nobody felt compelled to replace it. Instead, like Roman architects, they just built on top of it. The two-digit year became a standard, wired right into the heart of Cobol - the Common Business Oriented Language that still serves as the digital workhorse of commerce and industry. It also crept into the embedded microchips found in everything from VCRs to nuclear power plants. For years the Y2K bug sat quietly, remembered largely as an amusing textbook example of poor software design. But as 2000 drew near, the screwup became less amusing. In November 1996, the comp.software.year-2000 newsgroup was launched, creating a forum that would soon become ground zero for the Y2K survivalist movement. But at first, the charter was clear: Discussions would be limited to Y2K bug fixes, remediation strategies, and reports. Over the course of the next year, information poured into the newsgroup, and most of it was bad: The FAA was hopelessly behind schedule in patching air-traffic-control systems; Edward Yardeni, chief economist for Deutsche Morgan Grenfell Bank, laid odds that Y2K upheaval would trigger a recession; Ed Yourdon, a respected software guru and author of 25 computer books, predicted the collapse of the US government - not long after he packed up and moved to New Mexico. Optimism became a scarce commodity. Philosophical questions were raised: Do programmers have a moral duty to remain at their keyboards until the last moments of 1999, like captains on a sinking ship? Debates raged over social Darwinism and the ownership of wheat in grain elevators. The conversation moved on to the viability of dry dog food as emergency rations. Plans were made to begin converting equities into gold and buying land in remote parts of California, Arizona, and Oklahoma. January 1998 saw 250 cross-posts to misc.survivalism - up from an average of 30 a month in late 1997. Gradually, a new acronym entered the Internet lexicon: TEOTWAWKI, pronounced "tee-OH-tawa-kee." The End of the World as We Know It. The Internet's very own survival movement was born. Scott Olmsted has known about the Y2K bug since the 1980s, but he never gave it much thought until early 1997, when he received a snail-mail flyer from Gary North, a historian and early leader in the Y2K preparedness movement. After reading it, Scott remembers feeling a vague sense of dread. But as a rational guy and student of decision analysis - the science of logical decision making in the face of chronic uncertainty - he didn't jump to any conclusions. Instead, he went online to do some research. As he pored over Web sites and news clippings, Scott felt himself moving through the same psychological stages endured by people confronted with fatal illness: denial, fading into anger, leading to a deep depression that culminates in a sense of acceptance. "I'm still not 100 percent sure that the world's coming to an end," he admits. "But the idea that I may want to get out of town for a while is not such a long shot. It's enough to make me want to prepare." With the exception of his wife, most of the non-geeks closest to Scott think he's a little nuts. His half-brother, Clark Freeman, thought he was going overboard. But since then, Clark has come around a bit - he, too, is planning to stockpile some food in case things get rough. If his brother is taking Y2K so seriously, he figures there might well be something to it. "Scott has always been the level-headed one," Clark remembers. "The classic straightlaced nerd." "I've spoken with friends and relatives about this, and I've gotten nowhere," Scott sighs. Worse, some of the more intense Y2K survivalists also think he's crazy - or at least a bit na�ve. After all, Scott plans to celebrate New Year's Eve at his home in the suburbs; the place in the desert will be there just in case things get rough. Then there's his fence - it has no perimeter alarms, and he isn't even trying to camouflage his location. But worst of all, his hideaway is only a half tank of gas away from Los Angeles - close enough to the big city that he could wake up one postapocalyptic morning to find hordes of Los Angelinos parked outside his desert redoubt. The hardcores believe it will happen like this: On January 1 (or shortly thereafter), the electricity grid will go dead. Groceries in America's refrigerators will go bad. Food distribution systems will crash and store shelves will go bare within days. Businesses will fail, either because they aren't Y2K compliant or because they are dependent on noncompliant customers and suppliers. As losses mount and companies go under, the stock market will plummet. Banks will calculate interest for negative 100 years. The government will stop issuing entitlement checks to gray-haired senior citizens when their age suddenly clicks back to -35. Panic will set in. Police dispatch systems will be crippled, and the only law will be the law of the jungle. Desperate citizens will abandon the cities to hunt for resources in rural areas. They'll come looking for the mad prophets - the Y2K survivalists - ready to plunder their food, their heat, and their communications links. They'll zero in on Scott and his conspicuous retreat like a pack of wolves on the scent of a kill. But they'd better stay away from Steve Watson's place. Steve Watson, a 45-year-old systems analyst, is still kicking himself for not preparing sooner. He didn't get going until early this year, and he worries that he still has a lot of adjusting to do. As he puts it, "I didn't even know how to tan a hide until a couple of months ago." If all goes according to plan, Steve will ring in the new year at a secure compound somewhere in southern Oklahoma. While the Pollyannas of the world watch Times Square on the tube, he'll be listening to the radio for early news of Y2K disaster. When the power goes black - perhaps at the stroke of midnight - he'll be ready with a small arsenal of guns. A generator will power his bunker indefinitely, but no light will escape to the outside - none of Steve's neighbors will even know that there is a survivalist in their midst. Eight months ago, if you'd told Steve that Y2K survivalism would become his obsession, he would have laughed in your face. Last year, he was a happy-go-lucky Y2K project analysis manager for DMR Consulting, a Canada-based computer consulting firm, just finishing up a big remediation project for a major American phone company. The effort was grueling - 10 writers, programmers, and analysts cleaning up 10 million of lines of Cobol code. But in the end it all worked out, and the phone company's billing system was declared ready for 2000. In that heady moment of self-congratulation, Bill Finch, one of Steve's coworkers, approached him with a thought. "Steve," he said, "don't you realize that everything stops if the power grid goes down?" Anxiety set in. The telephone company had poured substantial resources into its Y2K effort. Even then, Steve's project had been an odyssey plagued with countless unexpected glitches and snags. If the power utilities - with their Byzantine grid of thousands of generators and substations around the continent - weren't already well along in their efforts, then all the systems he'd dragged into Y2K compliance would be dead as doornails when the lights went out. That afternoon, Steve hit the Net, where he learned that the situation is far worse than he had imagined. The power grid relies on a sophisticated feedback mechanism: Remote terminal units report their power needs up the communications chain that controls the output of electricity generators. The entire network is riddled with embedded chips. Nuclear plants supply nearly 20 percent of the power in the grid, and none of them have been certified as Y2K compliant. Charles Siebenthal, head of the Year 2000 embedded systems project at the Electric Power Research Institute, says the industry is just beginning to look for potential Y2K failure points. Anecdotes from industry consultants suggest that if the year 2000 came today, every utility in the country would crash. "No electric plant or facility of any kind has been Y2K tested without some kind of impact," says David Hall, a senior consultant with the Cara Corporation. "There isn't enough time to fix everything. There will be some disruption. How long? How deep? We just don't know." Then there are ripple effects to consider. "There's not a single railroad switch in the country that's manual anymore," Steve says. "They're all computer controlled, and railroads deliver coal and fuel to power plants." Exit Steve Watson, bright-eyed optimist; enter the new Steve Watson, Y2K survivalist, rugged pioneer, and Renaissance man in training. Steve began spending six hours a day on the Internet, studying alternative power, construction techniques, and emergency medical procedures. Anything he couldn't find online, he ordered from local bookstores or Amazon.com. He'd never kept a gun in the house, but soon he had three: a 30-30 for deer hunting, a .22 for small game, and a 9-mm handgun for personal protection. Of course, the 9-mm is practically a popgun against looting mobs, so four M-16 assault rifles are also on the way. Finally, he pooled his money with Bill Finch, his DMR coworker, to buy 500 remote acres in Oklahoma. (Bill holds the public deed to the property, so his name has been changed in this article to keep the location secret.) In choosing the hideaway site and its size, Steve overengineered to account for family and friends - few of whom subscribe to his Y2K scenario. "Most people think I'm nuts. Even my kids think, Dad's going off the deep end." Steve's wife, Teresa, has been more supportive. She's no computer expert, but her Baptist faith tells her that the Four Horsemen of the Apocalypse could ride in with a global computer crash. Meanwhile, Steve is making plans for everyone else: close friends, family members, sisters-in-law, brothers-in-law - and their children, mothers, and fathers. Forty people in all. In 2000, they'll work together to till the soil and patrol the fence line. Steve's doomsday vision is the same as that of most Y2K radicals, but radicals can pop up in some pretty mainstream places - like the US Central Intelligence Agency, which is advising its agents abroad to keep cash on hand and stockpile extra blankets in preparation for New Year's Day 2000. The agency worries that bugs in the power networks and communications backbones of developing nations could cause outages that would jeopardize the safety and well-being of its agents. Millions of Americans have already gotten a small taste of critical system failure. When the onboard control system of the Galaxy IV communications satellite failed on Tuesday, May 19, 1998, the outage temporarily crippled US pager networks, several broadcast news operations, and even credit card verifications systems. Most of the disruptions were brief - technicians were able to switch to backup communications paths - but doctors who use pagers as a lifeline with patients and colleagues were forced to set up camp in hospitals and offices. The failure of one satellite threw a wrench into the mechanisms of modern life, perhaps providing a peek at what life may be like at the dawn of the new millennium. Or sooner. While the full brunt of the Y2K bug is reserved for AD 2000, some early problems are already developing. In 1996, Visa and MasterCard temporarily stopped issuing credit cards with an expiration date of 2000 after credit card verification terminals began choking on the "00." The gaffe led to customer complaints and a lawsuit filed by a suburban Detroit grocery store against its computer supplier, TEC America Inc. Since then, most verification systems have been upgraded, but Y2K is making its presence known in other areas. The Information Technology Association of America released a survey last March showing 44 percent of the US companies they polled have already experienced Y2K failures. Ninety-four percent of the respondents termed Y2K a "crisis." The GartnerGroup estimates that 180 billion lines of code need to be examined and that 20 to 30 percent of all firms worldwide have not yet started preparing for Y2K. Many of these are expected to suffer significant failures. In a series of studies issued over the last year, Gartner surveyed 15,000 companies in 87 countries to assess their Y2K readiness. The results weren't encouraging. Small companies rated lowest - for most, winning over new customers has taken priority over the Y2K problem. But midsize and large companies are lagging, too. Gartner then rated the overall Y2K efforts of industrialized nations on a scale of zero to five, where five is total compliance on all systems. The highest scorers on the scale, including the US, Canada, and Australia, rated somewhere between two and three - a score that suggests they have completed an inventory of Y2K vulnerabilities, but not yet developed a comprehensive remediation plan. The US may be at the front of the pack in the Y2K race, but that's small comfort to some legislators. Last March, the House Subcommittee on Government Management, Information, and Technology warned that 37 percent of the critical systems used by federal agencies will not be ready in time. Then in June, California Republican Stephen Horn, who heads the subcommittee, issued a scathing report card on the Clinton administration's Y2K progress. He gave the government an F. John Koskinen, head of the president's Year 2000 Conversion Council, complains that Horn is just a tough grader. "As a government, we're in a C+ to B range," he argues. Koskinen keeps a digital desktop clock that runs backward - on the day we spoke, the clock showed 609 days, 8 hours, 39 minutes, 16 seconds, and counting - but he generally refrains from calling the situation a crisis. Instead, he describes it as a "critical management challenge." He fully expects the federal government's critical systems to be ready on time, or even early. "Many companies, financial institutions, and federal agencies are still working on the problem," he says. "But most major organizations plan to have their solutions in place by the first quarter of next year." If the council is successful, Koskinen believes, Americans will confront little more than a few minor inconveniences when the year 2000 finally rolls around. "There's not enough information right now to indicate that stocking up on Coleman stoves and Sterno is an appropriate response," he says. And in the end, he predicts, "a lot of people won't notice." Koskinen has earned the respect of some Y2Kers by emphasizing the need for high-level planning in the event that some systems fail. But Y2K survivalists feel more comfortable with their own personal contingency plans, and a commercial infrastructure is already forming to support them. Walton Feed, an Idaho food distributor that sells products over the Net, is doing a brisk business in long-term supplies; the company attributes this to Y2K. And in Sully County, South Dakota, developer Russ Voorhees has attracted national publicity and hundreds of potential clients for his "Heritage Farms 2000" project - a Y2K survival community that's been on hold since June, when a local planning commission refused to grant the necessary building permits. For those who want to go it alone, there's a sense of adventurous fun in their preparations - the pride of self-sufficiency and an excuse to get away from the keyboard to earn some merit badges. But Y2K preparedness is not just a Boy Scout fetish, and it isn't always about getting away from it all. "If everybody moves to rural areas, they'll just take their problems with them," explains Paloma O'Riley, a red-haired, forty-something mother, wife, and computer expert. Paloma lives in the small town of Louisville, Colorado, just east of Boulder, and when she looks around her community she doesn't see potential looters - she sees neighbors. Her suburban hamlet has become a major landmark on the Y2K map as the world headquarters of The Cassandra Project, a grassroots Y2K preparedness organization that can perhaps best be described as a kind of Millennial Neighborhood Watch. Until last year, Paloma was a Y2K project manager at the Rover Group, a UK-based auto manufacturer, where her first responsibility was to identify all of the company's vulnerable systems and target them for patching. But her search didn't end with a couple of corporate mainframes. Inadvertently, Paloma opened up the Pandora's Box of Y2K: embedded systems. Embedded systems draw the Y2K bug-fixing task out of cyberspace and into the real world. There are lots of pea-brained microchips out there, nestled in everything from microwave ovens and automobiles, to power plants and oil refineries. Most don't care what the date is, but a small percentage of them do, and that made Paloma nervous. "I became concerned about just how prevalent embedded systems are," she recalls. "Several members of my family have medical problems, so when I started investigating I became very concerned about medical devices like defibrillators, physiological monitoring equipment, and the entire medical services infrastructure." When her contract came up for renewal in 1997, Rover asked Paloma to stay on in London to 2000. She declined - the thought of family and friends surrounded by noncompliant systems that might leave them cold, hungry, and without medical services was too much to ignore. Back in the States she began networking with other people who shared her concerns, and that's when she realized "we needed to put together an organization to address the issues and get information out to the public." Thus The Cassandra Project was born. In Greek mythology, Cassandra was a mortal woman courted by the god Apollo. To win her affections, Apollo gave her the gift of prophecy. Still, Cassandra rejected him, so the frustrated deity decreed that no one would ever believe her predictions. Paloma O'Riley gave a nod to Cassandra's fate when she chose the name for her Y2K preparedness group, but she is precisely the kind of mortal woman you'd want at your next PTA meeting - a firm believer in the notion that some good, old-fashioned community-building may keep the Y2K nightmare at bay. The Cassandra Project has helped spawn a dozen Y2K community preparedness groups around the country. It has a board of directors that includes several computer professionals and a Web site at millennia-bcs.com that lists a menu of articles discussing possible Y2K scenarios, ranging from minor annoyances to outright Y2Kaos. The site attracts more than 100,000 visitors a month. Between speaking engagements, Paloma spends her days organizing biweekly meetings with neighbors to discuss contingency plans, and lobbying the state government. "We've been working with the Cassandra group on a lot of their initiatives," says Steve McNally, staff director of the Colorado Information Management Commission. "They've talked to several legislators and the governor's office and brought some awareness of the issues to the table." For her part, Paloma and her family plan to stockpile a six-month supply of food. Her worst-case scenarios look much the same as those of the most hardcore, self-sufficient Y2K survivalists, but the bomb-shelter aspect is conspicuously missing. Paloma believes that people will pull together in times of turmoil. If calamity strikes and she is forced to draw the line, she's determined to do so in her own backyard. Even if Paloma's neighborly pragmatism sets her apart from the militia types and fundamentalist Christians who regularly contact The Cassandra Project, her efforts have brought her in contact with a thriving premillennial subculture. "People in other millennial movements, including Christian fundamentalism, point to Y2K as a sign of the times," says Philip Lamy, a professor of sociology and anthropology at Castleton College in Vermont. Lamy specializes in the study of secular millennialism, and he sees Y2K survivalism as a prime example of the genre. "Generally, millennial movements appear when a society or culture is going through a period of rapid cultural, economic, or technological change," he says. "The explosion of the Internet and the World Wide Web is fueling a lot of this now." Still, there are a few things that set the Y2Kers apart from the crowd. For one, the Y2K bug is not simply a matter of myth, superstition, or prophesy - it is a tangible problem hardwired into the fabric of our industrial society. In addition, the people who are taking Y2K most seriously are not laypeople or neophytes - they are specialized technicians who approach the situation with a sophisticated understanding of society's hidden machinery. But if heightened technical awareness alone could explain the apocalyptic conclusions drawn by the Y2K survivalists, then every well-informed computer geek would be moving to the desert - and that clearly isn't happening. With so many intertwined variables to consider, logic inevitably takes a back seat to subjective intuition - a personal sense of security that extends from the microcosm of a single computer program to the macrocosm of modern society. Ultimately it all comes down to faith. But this, too, sets the Y2K survivalists apart. True millennialism is rooted in faith - fundamentalist Christians may anticipate an apocalypse, but they optimistically expect it to be followed by 1,000 years of celestial rule. Y2K survivalism, on the other hand, doesn't concern itself with redemption. It is antimillennial - the polar opposite of techno-millennial movements like the Extropians who see technology as the stairway to a higher plane. (See "Meet the Extropians," Wired 2.10, page 102.) "All this suggests that you don't have to be a religious fanatic, a Christian fundamentalist, or a ufologist to believe that our world may be in trouble - that there's something serious afoot in our nation and our world," Lamy adds. "The Y2K problem is overlapping with other survivalist movements, and like them it shares a kind of a fatalistic vision of the future." Three weeks have passed since Scott Olmsted put the carpet installers to work in his retreat. The carpet is in now, and he's turned his attention to other details, like night-vision equipment - his property is on high ground, and with the right hardware he could scan most of the valley from his backyard. He's also thinking of getting laser eye surgery so that he won't be dependent on contact lenses after 2000. It never seems to end. "Once you take the first steps to prepare, you basically admit that this is big enough to do something about. And then you realize you should be doing more." Scott has turned his back on denial - the blind faith that allows people to live normal lives in the face of staggering complexity, risk, and uncertainty. Instead, he's chosen to acknowledge his own vulnerability. As he describes it, "I've always known that the economy is complex and that we live on the end of a long chain of ships, planes, and 18-wheelers." Scott sees how the Y2K bug could disrupt that chain, and like other resolute souls - environmental activists, antiabortion protesters, and corporate whistle-blowers to name a few - he, too, has been driven to act by the clarity and intensity of his vision. The rest of us may be content without quite so much awareness, but embracing the Bug has actually made Scott feel better. "I know one guy who started taking Prozac when his denial fell away," he says. "Taking action - doing something - really gets you out of that." Scott admits there isn't enough evidence to prove he's right. But, he insists, that's not the way to look at it. "There's not nearly enough evidence pointing the other way to make me abandon my preparations," he says. In a way, he's managed to optimize the Y2K problem - even if the new millennium dawns without incident, his efforts will have yielded a supply of inexpensive food, a new collection of practical skills, and a nice vacation home in the country. It's an eminently logical win-win, and Scott has taken comfort in that. "I'm not waiting until the ground is shaking to prepare for the Y2K earthquake," he muses. "I'm going to be ready for an 8.5. I may look foolish if it turns out to be minor, but that's OK. That's the nature of decisionmaking under uncertainty." Kevin Poulsen is a columnist for ZDTV.com . America Offline ( Inside the Great Blackout of '00 ) "Most of the nation's power systems must be compliant, or they all go down, region by region, in one gigantic, rolling blackout," warns Gary North, keeper of the oldest, most notorious Y2K doomsday site on the Web. If the lights go out at the dawn of the 21st century, North believes the failure will be permanent, because the computers that control the grid will be unfixable if there isn't power to run them. Thereafter, he argues, the blackout will trigger the collapse of civilization. The North American grid is vulnerable to simultaneous failures. Generating facilities in the US, Canada, and Mexico jointly move power through high-tension lines that distribute electricity through four regional interconnections. Within each region, if one facility goes offline, the others compensate to pick up the slack. But there's not much spare capacity built into the system; the North American Electric Reliability Council, a group that is drawing up a timetable of Y2K fixes for the Department of Energy, admits that if multiple generating facilities fail in one region, this "may result in stressing the electric system to the point of a cascading outage over a large area." This is how it could happen: A power station is equipped with safety systems that deactivate steam boilers if they aren't maintained frequently. Suppose maintenance was last performed in 1999, which an embedded chip recorded as "99." Now it's the year 2000, so the chip subtracts the old year, 99, from the new year, 00, and finds, amazingly, that maintenance was last performed -99 years ago. Clearly this is an error, so the chip shuts down all the boilers, just to be safe. Meanwhile, at another power station, a temperature sensor attached to a transformer averages its readings over time. On January 1, 2000, the sensor divides temperature by the year - which is expressed as "00" - and comes up with an infinite value, triggering another shutdown signal. If small faults like these knock out a half dozen facilities, the rest will go offline to protect generators from burning out in a hopeless effort to meet the growing demand. The distribution grid also has weak points. "We have at least 800 different types of embedded controls on the wires," explains Gary Steeves, director of a Y2K project at TransAlta Utilities, the largest investor-owned power company in Canada. "Some of the protective devices log dates of faults in activity and can automatically take a component out of service." If the same controller has been installed in thousands of remote locations, and the chips share the same Y2K bug, they'll all fail simultaneously. Most US power utilities refuse to comment on the likelihood of these disasters, fearing litigation if they offer reassurances that turn out to be wrong. Tim Wilson, publisher of Y2k News, worries about the nearly 9,000 small regional companies that pull power off the grid at the local level. "They're clueless as to what to do about Y2K," says Wilson. "They know they have embedded chips, but they don't know where they are. If there's a power shortage, rural areas may not be allowed to take power off the grid, because cities could have a higher priority." This suggests an ironic scenario: Remote areas may remain dark for weeks or months after January 1, 2000, leaving Y2K survivalists waiting in their isolated cabins for the lights to come back on - while complacent urban dwellers enjoy uninterrupted service. - Charles Platt Copyright � 1993-98 The Cond� Nast Publications Inc. All rights reserved. Compilation Copyright � 1994-98 Wired Digital Inc. All rights reserved. ----------------------- NOTE: In accordance with Title 17 U.S.C. section 107, this material is distributed without profit or payment to those who have expressed a prior interest in receiving this information for non-profit research and educational purposes only. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml ----------------------- ********************************************** To subscribe or unsubscribe, email: majordomo at majordomo.pobox.com with the message: (un)subscribe ignition-point email at address ********************************************** www.telepath.com/believer ********************************************** --- end forwarded text ----------------- Robert A. Hettinga Philodox Financial Technology Evangelism 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From rah at shipwright.com Mon Sep 7 19:02:59 1998 From: rah at shipwright.com (Robert Hettinga) Date: Tue, 8 Sep 1998 10:02:59 +0800 Subject: e$: crypto-expatriatism (fwd) In-Reply-To: <199809072208.RAA05578@einstein.ssz.com> Message-ID: At 6:08 PM -0400 on 9/7/98, Jim Choate wrote: > > Ridgeway told Eisenhower at the outset that Vietnam was a multi-million-man > > war, and Eisenhower stayed out accordingly, throwing a few marginal >people on > > the ground to shut Lodge up. It took Testosterone Jack to get a >Special-Forces > > hard-on. Eventually he and Desktop Lyndon ended up screwing a pooch > > instead of the commies. > > Balonely, do your research somewhere beside a bar. JFK had no intention of > sending more troops in and every intention of withdrawing the troops that > were there. There are two sources you can look at to verify this. The first > is the troop count over time and the internal presidential memos to the > Chiefs of Staff. Had JFK not been shot there would have been NO US troops in > Vietnam by the end of '64. > > LBJ is the nit-wit who crewed the proverbial pooch. I've got an idea. Go read Halverstam's "The Best and the Brightest", Jim, and then tell me what bar I did my research in. Cheers :-), Bob Hettinga ----------------- Robert A. Hettinga Philodox Financial Technology Evangelism 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From pooppido at fffff.net Tue Sep 8 10:14:21 1998 From: pooppido at fffff.net (pooppido at fffff.net) Date: Tue, 8 Sep 1998 10:14:21 -0700 (PDT) Subject: Info. Message-ID: <199809081714.KAA13329@toad.com> THAT'S 5 cents per minute!!! SPECIAL PROMOTION - Limited Time Only! Between NOW and September 30th You Can Receive: 5� per minute state to state!! 9� per minute within the state!! 5� per minute to selected International Countries!! 5� per min to these selected international destinations: CANADA, BELGIUM, AUSTRALIA, GERMANY, FRANCE, NETHERLANDS, NEW ZEALAND, SWEDEN, THE UNITED KINGDOM THAT'S 5 cents per minute!!! PLUS A FREE PRE-PAID CALLING CARD AFTER YOU SIGN UP!!!! TO START SAVING IMMEDIATELY AND TAKE ADVANTAGE OF THIS LIMITED TIME PROMOTION RESPOND BY E-MAIL to : rha at s-tuff.com How do You ...SAVE! On your long distance phone bill!!! 11 year-old Telecommunications GIANT Can Help You Save UP TO 30% OVER AT&T & SPRINT! Permanently!!! In fact, NO ONE can beat our International Rates! And now we are taking domestic long distance by storm!! After September 30, 1998 rates are just... 7� per minute State-to-State* 9� per minute Within the state 24 hrs. a day 7 days a week. Unlimited calls! Guaranteed! No minimum usage requirements! No separate Phone Bills! (Charges will be included on the long distance portion of your local phone bill, so that you can pay with a single check. INCREDIBLY LOW INTERNATIONAL RATES! SAMPLE INTERNATIONAL RATES (Our rates are effective August 1, 1998 ) CAN YOU BELIEVE IT! **Only 7 cents per min to and from: Puerto Rico, Guam, Canada, Hawaii and Alaska!! OUR RATE AT&T ONE RATE COUNTRY PER MIN. INTERNATIONAL Brazil . .46 .55 China .63 .80 Cuba .64 .84 France . .14 .33 Germany .14 .33 Hong Kong .24 .61 Italy .23 .35 Japan .26 .35 Philippines .49 .77 South Korea .35 .39 Taiwan, Rep China .35 .46 India .67 .80 UK .09 .12 Mexico City .29 N/A and many, many more! OUR NETWORK Brought to you by a global long distance company with a high-tech fiber optic network that provides the high-quality crystal clear telecommunications you've come to expect. We operate a 35,000 mile fiber optic backbone in the U.S., which interconnects its switches and provides the company access to every LATA in the country. In Canada, We operate a fiber-optic network that interconnects its switches and provides the company access to the provinces of British Columbia, Ontario and Quebec. We maintain switching hubs in major cities throughout North America, including Atlanta, Chicago, Dallas, Honolulu, Los Angeles, Miami, Montreal,New York, Ottawa, San Francisco, Seattle, Toronto, Washington and Vancouver. Our global network uses fiber optics and 100% digital transmission for unsurpassed reliability and superior quality. We are continually extending the network backbone around the world. Our customers enjoy crystal clear connections to virtually every direct dial destination world-wide. OUR CUSTOMER SERVICE We provide multi-lingual customer service and support, including Spanish, French, Chinese (Mandarin & Cantonese), all available 24 hours a day, 7 days a week. SPECIAL PROMOTION - Limited Time Only! Between August 1st and September 30th You Can Receive: 5� per minute state to state!! 9� per minute within the state!! 5� per minute to selected International Countries!! 5� per min to these selected international destinations: CANADA, BELGIUM, AUSTRALIA, GERMANY, FRANCE, NETHERLANDS, NEW ZEALAND, SWEDEN, THE UNITED KINGDOM THAT'S 5 cents per minute!!! TO START SAVING IMMEDIATELY AND TAKE ADVANTAGE OF THIS LIMITED TIME PROMOTION RESPOND BY E-MAIL to : rha at s-tuff.com WE DARE YOU TO COMPARE US TO YOUR PRESENT CARRIER! Get the Facts Now! Contact Us Immediately for more information. email : rha at s-tuff.com Agents needed ...your commissions start at 10% and go as high as 19%. RESPOND BY E-MAIL to : cool5cents at yahoo.com PENBELL COMMUNICATIONS 6001 Skillman Suite 102 Dallas, TX. 75231 214-750-4738 From ryan at systemics.ai Mon Sep 7 19:23:10 1998 From: ryan at systemics.ai (Ryan Lackey) Date: Tue, 8 Sep 1998 10:23:10 +0800 Subject: e$: crypto-expatriatism In-Reply-To: Message-ID: (note trimmed distribution ... cryptography certainly isn't appropriate for any of this, and I doubt if dcsb is...) Kawika Daguio said: > I would prefer that folks kept us out of their fields of fire in the various > skirmishes occuring during the cryptocrusades and left us to manage the > policy for and the security of our space for ourselves and our customers. Banks and other financial intermediaries do not exist in a vacuum. While I agree that the banking/financial applications do drive the policy in this field (I believe both you and Bob believe this), I do not agree that the existing banks and financial intermediaries drive the policy. Fundamentally, there are some changes which make old institutions irrelevant, even if their functions are taken over by new institutions. For a long time, the Church handled intermediation between military powers. Now, it's the UN. Perhaps tomorrow, it will be the mutual fund managers, transnationals, and news agencies. We all seem to agree that the government is irrelevant in the grand scheme of things. While I may be presuming incorrectly, I feel that the ABA represents the accidental existing institutions, not the essence of financial institutions. Thus, when you say you have spent 5 years negotiating and lobbying, I presume you are doing so to allow the existing institutions to fit into the new future. You are not necessarily helping the new future come into being in the essential sense by helping existing institutions come to grips with essential reality. I would argue that the reality of electronic commerce/cryptography, and its effect upon the power relationship of individual vs. group, needs no apologists, and indeed, no apologist can help it. It is a fundamentally new reality. From declan at well.com Mon Sep 7 19:25:39 1998 From: declan at well.com (Declan McCullagh) Date: Tue, 8 Sep 1998 10:25:39 +0800 Subject: What we are Fighting In-Reply-To: Message-ID: I've been politely corrected in email. I meant "allusion" of course. I seem to find myself doing this more often lately... --Declan On Mon, 7 Sep 1998, Declan McCullagh wrote: > We even make an illusion to Monica's Cigar in a story in this week's Time. > A Microsoft story I was working on died at the last moment, unfortunately. From hedges at infonex.com Mon Sep 7 19:32:37 1998 From: hedges at infonex.com (Mark Hedges) Date: Tue, 8 Sep 1998 10:32:37 +0800 Subject: crossposting In-Reply-To: Message-ID: Ya know, I sometimes cross-post across lists when I shouldn't, so I'm guilty of that too, but now that I'm on so many of these lists, I really see the reasons behind one of the biggest complaints. I'm getting about 4 copies of each of the messages in the Vince Cate thread. --mark-- -hedges- From vznuri at netcom.com Mon Sep 7 19:38:20 1998 From: vznuri at netcom.com (Vladimir Z. Nuri) Date: Tue, 8 Sep 1998 10:38:20 +0800 Subject: wired on y2k Message-ID: <199809080235.TAA23415@netcom13.netcom.com> ------- Forwarded Message Date: Tue, 08 Sep 1998 18:38:07 -0500 To: believer at telepath.com From: believer at telepath.com Subject: IP: Wired: "The Y2K Solution: Run for Your Life!!" Source: Wired http://www.wired.com/wired/6.08/y2k.html F E A T U R E|Issue 6.08 - August 1998 The Y2K Solution: Run for Your Life!! By Kevin Poulsen Scott Olmsted is dressed to do some serious debugging: comfortable khaki shorts, a T-shirt from a Visual Basic conference, and a visor from one of his Silicon Valley employers. But we're a long way from the land of cubicles and industrial parks. In fact, we're a long way from just about everything. Scott is debugging with a hammer, trying to remove a stubborn two-by-four from the wall of a mobile home plunked down in the high desert of Southern California. After banging away for a few minutes, he finally yanks the stud off the wall in a flurry of sawdust and splintered wood. It's a small victory, but it brings him one step closer to his own solution to the greatest computer glitch in history - the Year 2000 Bug. With more than 20 years of computer programming experience under his belt, Scott has decided that the only real fix for the Y2K problem may be to pack up and move to this patch of land 75 miles from his San Diego home. "In the next year or so," he predicts, "the most common cocktail party chatter will be, 'What are you doing to prepare for Y2K?' But by then, it will be too late." This is sagebrush country, the kind of place where you can hear your footsteps crunching in the gravel. But even here, 30 miles from the nearest interstate, a line of telephone poles runs along the dirt road and PacBell terminal boxes sprout from the ground alongside the cacti. While carpet installers work in the next room, Scott is planning for the day when it may all be useless. The property came with a freshwater well, and he'll soon have a solar panel for power. For protection against looters, he's about to purchase his first gun. "I've seen how fragile so many software systems are - - how one bug can bring them down," he worries. The idea of hundreds, thousands, millions of bugs cascading all at once keeps him awake at night. His Y2K retreat is easy to spot. In an area where high security means a few strands of barbed wire clinging to a rusty pole, Scott's chain-link fence is shiny and new. The alarm-company sign that hangs from the fence would be more at home in Brentwood, and on the roof there's a DirecTV satellite dish pointed toward the sky. The shed outside his back door will hold nonperishable food. But with a programmer's methodical logic, Scott didn't rush out to buy a year's worth of dehydrated grub. First he sampled the fare from several distributors. One company sold a textured vegetable protein that was a bit more expensive, but it came in a variety of flavors: chicken, beef, and taco. "It was pretty good," Scott says, in the halting measured tones of someone who doesn't want come across as a wacko. "We were pleasantly surprised." So he splurged. What the hell, doomsday comes along only once in a lifetime. Throughout history, prophets and visionaries have spent their lives preparing for the end of the world. But this time veteran software programmers are blazing the millennial trail. The geeks have read the future, not in the Book of Revelation, but in a few million lines of computer code. By now, the source of their anxiety is well known. In the 1950s and 1960s, when the computer world was young and memory was expensive, programmers developed a convention for marking the passage of time. It's the same system most people use to date their checks: two digits for the day, two for the month, and two for the year. Dropping the "19" from the year was convenient, and it saved two bytes of precious RAM every time it was used. Those were days of innocence and optimism. Everyone knew what would happen if this little shortcut was still in use in AD 2000 - the two-digit year would roll over like the odometer on an old Chevy, and the computers would think they'd jumped 100 years into the past. Programmers knew it, and they warned their managers. Not to worry, was the usual reply. When the millennium finally rolls around, all this code will be ancient history. But the code stuck around. The old software worked fine in the postmainframe world, so nobody felt compelled to replace it. Instead, like Roman architects, they just built on top of it. The two-digit year became a standard, wired right into the heart of Cobol - the Common Business Oriented Language that still serves as the digital workhorse of commerce and industry. It also crept into the embedded microchips found in everything from VCRs to nuclear power plants. For years the Y2K bug sat quietly, remembered largely as an amusing textbook example of poor software design. But as 2000 drew near, the screwup became less amusing. In November 1996, the comp.software.year-2000 newsgroup was launched, creating a forum that would soon become ground zero for the Y2K survivalist movement. But at first, the charter was clear: Discussions would be limited to Y2K bug fixes, remediation strategies, and reports. Over the course of the next year, information poured into the newsgroup, and most of it was bad: The FAA was hopelessly behind schedule in patching air-traffic-control systems; Edward Yardeni, chief economist for Deutsche Morgan Grenfell Bank, laid odds that Y2K upheaval would trigger a recession; Ed Yourdon, a respected software guru and author of 25 computer books, predicted the collapse of the US government - not long after he packed up and moved to New Mexico. Optimism became a scarce commodity. Philosophical questions were raised: Do programmers have a moral duty to remain at their keyboards until the last moments of 1999, like captains on a sinking ship? Debates raged over social Darwinism and the ownership of wheat in grain elevators. The conversation moved on to the viability of dry dog food as emergency rations. Plans were made to begin converting equities into gold and buying land in remote parts of California, Arizona, and Oklahoma. January 1998 saw 250 cross-posts to misc.survivalism - up from an average of 30 a month in late 1997. Gradually, a new acronym entered the Internet lexicon: TEOTWAWKI, pronounced "tee-OH-tawa-kee." The End of the World as We Know It. The Internet's very own survival movement was born. Scott Olmsted has known about the Y2K bug since the 1980s, but he never gave it much thought until early 1997, when he received a snail-mail flyer from Gary North, a historian and early leader in the Y2K preparedness movement. After reading it, Scott remembers feeling a vague sense of dread. But as a rational guy and student of decision analysis - the science of logical decision making in the face of chronic uncertainty - he didn't jump to any conclusions. Instead, he went online to do some research. As he pored over Web sites and news clippings, Scott felt himself moving through the same psychological stages endured by people confronted with fatal illness: denial, fading into anger, leading to a deep depression that culminates in a sense of acceptance. "I'm still not 100 percent sure that the world's coming to an end," he admits. "But the idea that I may want to get out of town for a while is not such a long shot. It's enough to make me want to prepare." With the exception of his wife, most of the non-geeks closest to Scott think he's a little nuts. His half-brother, Clark Freeman, thought he was going overboard. But since then, Clark has come around a bit - he, too, is planning to stockpile some food in case things get rough. If his brother is taking Y2K so seriously, he figures there might well be something to it. "Scott has always been the level-headed one," Clark remembers. "The classic straightlaced nerd." "I've spoken with friends and relatives about this, and I've gotten nowhere," Scott sighs. Worse, some of the more intense Y2K survivalists also think he's crazy - or at least a bit na�ve. After all, Scott plans to celebrate New Year's Eve at his home in the suburbs; the place in the desert will be there just in case things get rough. Then there's his fence - - it has no perimeter alarms, and he isn't even trying to camouflage his location. But worst of all, his hideaway is only a half tank of gas away from Los Angeles - close enough to the big city that he could wake up one postapocalyptic morning to find hordes of Los Angelinos parked outside his desert redoubt. The hardcores believe it will happen like this: On January 1 (or shortly thereafter), the electricity grid will go dead. Groceries in America's refrigerators will go bad. Food distribution systems will crash and store shelves will go bare within days. Businesses will fail, either because they aren't Y2K compliant or because they are dependent on noncompliant customers and suppliers. As losses mount and companies go under, the stock market will plummet. Banks will calculate interest for negative 100 years. The government will stop issuing entitlement checks to gray-haired senior citizens when their age suddenly clicks back to -35. Panic will set in. Police dispatch systems will be crippled, and the only law will be the law of the jungle. Desperate citizens will abandon the cities to hunt for resources in rural areas. They'll come looking for the mad prophets - the Y2K survivalists - ready to plunder their food, their heat, and their communications links. They'll zero in on Scott and his conspicuous retreat like a pack of wolves on the scent of a kill. But they'd better stay away from Steve Watson's place. Steve Watson, a 45-year-old systems analyst, is still kicking himself for not preparing sooner. He didn't get going until early this year, and he worries that he still has a lot of adjusting to do. As he puts it, "I didn't even know how to tan a hide until a couple of months ago." If all goes according to plan, Steve will ring in the new year at a secure compound somewhere in southern Oklahoma. While the Pollyannas of the world watch Times Square on the tube, he'll be listening to the radio for early news of Y2K disaster. When the power goes black - perhaps at the stroke of midnight - he'll be ready with a small arsenal of guns. A generator will power his bunker indefinitely, but no light will escape to the outside - none of Steve's neighbors will even know that there is a survivalist in their midst. Eight months ago, if you'd told Steve that Y2K survivalism would become his obsession, he would have laughed in your face. Last year, he was a happy-go-lucky Y2K project analysis manager for DMR Consulting, a Canada-based computer consulting firm, just finishing up a big remediation project for a major American phone company. The effort was grueling - 10 writers, programmers, and analysts cleaning up 10 million of lines of Cobol code. But in the end it all worked out, and the phone company's billing system was declared ready for 2000. In that heady moment of self-congratulation, Bill Finch, one of Steve's coworkers, approached him with a thought. "Steve," he said, "don't you realize that everything stops if the power grid goes down?" Anxiety set in. The telephone company had poured substantial resources into its Y2K effort. Even then, Steve's project had been an odyssey plagued with countless unexpected glitches and snags. If the power utilities - with their Byzantine grid of thousands of generators and substations around the continent - weren't already well along in their efforts, then all the systems he'd dragged into Y2K compliance would be dead as doornails when the lights went out. That afternoon, Steve hit the Net, where he learned that the situation is far worse than he had imagined. The power grid relies on a sophisticated feedback mechanism: Remote terminal units report their power needs up the communications chain that controls the output of electricity generators. The entire network is riddled with embedded chips. Nuclear plants supply nearly 20 percent of the power in the grid, and none of them have been certified as Y2K compliant. Charles Siebenthal, head of the Year 2000 embedded systems project at the Electric Power Research Institute, says the industry is just beginning to look for potential Y2K failure points. Anecdotes from industry consultants suggest that if the year 2000 came today, every utility in the country would crash. "No electric plant or facility of any kind has been Y2K tested without some kind of impact," says David Hall, a senior consultant with the Cara Corporation. "There isn't enough time to fix everything. There will be some disruption. How long? How deep? We just don't know." Then there are ripple effects to consider. "There's not a single railroad switch in the country that's manual anymore," Steve says. "They're all computer controlled, and railroads deliver coal and fuel to power plants." Exit Steve Watson, bright-eyed optimist; enter the new Steve Watson, Y2K survivalist, rugged pioneer, and Renaissance man in training. Steve began spending six hours a day on the Internet, studying alternative power, construction techniques, and emergency medical procedures. Anything he couldn't find online, he ordered from local bookstores or Amazon.com. He'd never kept a gun in the house, but soon he had three: a 30-30 for deer hunting, a .22 for small game, and a 9-mm handgun for personal protection. Of course, the 9-mm is practically a popgun against looting mobs, so four M-16 assault rifles are also on the way. Finally, he pooled his money with Bill Finch, his DMR coworker, to buy 500 remote acres in Oklahoma. (Bill holds the public deed to the property, so his name has been changed in this article to keep the location secret.) In choosing the hideaway site and its size, Steve overengineered to account for family and friends - few of whom subscribe to his Y2K scenario. "Most people think I'm nuts. Even my kids think, Dad's going off the deep end." Steve's wife, Teresa, has been more supportive. She's no computer expert, but her Baptist faith tells her that the Four Horsemen of the Apocalypse could ride in with a global computer crash. Meanwhile, Steve is making plans for everyone else: close friends, family members, sisters-in-law, brothers-in-law - and their children, mothers, and fathers. Forty people in all. In 2000, they'll work together to till the soil and patrol the fence line. Steve's doomsday vision is the same as that of most Y2K radicals, but radicals can pop up in some pretty mainstream places - like the US Central Intelligence Agency, which is advising its agents abroad to keep cash on hand and stockpile extra blankets in preparation for New Year's Day 2000. The agency worries that bugs in the power networks and communications backbones of developing nations could cause outages that would jeopardize the safety and well-being of its agents. Millions of Americans have already gotten a small taste of critical system failure. When the onboard control system of the Galaxy IV communications satellite failed on Tuesday, May 19, 1998, the outage temporarily crippled US pager networks, several broadcast news operations, and even credit card verifications systems. Most of the disruptions were brief - technicians were able to switch to backup communications paths - but doctors who use pagers as a lifeline with patients and colleagues were forced to set up camp in hospitals and offices. The failure of one satellite threw a wrench into the mechanisms of modern life, perhaps providing a peek at what life may be like at the dawn of the new millennium. Or sooner. While the full brunt of the Y2K bug is reserved for AD 2000, some early problems are already developing. In 1996, Visa and MasterCard temporarily stopped issuing credit cards with an expiration date of 2000 after credit card verification terminals began choking on the "00." The gaffe led to customer complaints and a lawsuit filed by a suburban Detroit grocery store against its computer supplier, TEC America Inc. Since then, most verification systems have been upgraded, but Y2K is making its presence known in other areas. The Information Technology Association of America released a survey last March showing 44 percent of the US companies they polled have already experienced Y2K failures. Ninety-four percent of the respondents termed Y2K a "crisis." The GartnerGroup estimates that 180 billion lines of code need to be examined and that 20 to 30 percent of all firms worldwide have not yet started preparing for Y2K. Many of these are expected to suffer significant failures. In a series of studies issued over the last year, Gartner surveyed 15,000 companies in 87 countries to assess their Y2K readiness. The results weren't encouraging. Small companies rated lowest - for most, winning over new customers has taken priority over the Y2K problem. But midsize and large companies are lagging, too. Gartner then rated the overall Y2K efforts of industrialized nations on a scale of zero to five, where five is total compliance on all systems. The highest scorers on the scale, including the US, Canada, and Australia, rated somewhere between two and three - a score that suggests they have completed an inventory of Y2K vulnerabilities, but not yet developed a comprehensive remediation plan. The US may be at the front of the pack in the Y2K race, but that's small comfort to some legislators. Last March, the House Subcommittee on Government Management, Information, and Technology warned that 37 percent of the critical systems used by federal agencies will not be ready in time. Then in June, California Republican Stephen Horn, who heads the subcommittee, issued a scathing report card on the Clinton administration's Y2K progress. He gave the government an F. John Koskinen, head of the president's Year 2000 Conversion Council, complains that Horn is just a tough grader. "As a government, we're in a C+ to B range," he argues. Koskinen keeps a digital desktop clock that runs backward - on the day we spoke, the clock showed 609 days, 8 hours, 39 minutes, 16 seconds, and counting - but he generally refrains from calling the situation a crisis. Instead, he describes it as a "critical management challenge." He fully expects the federal government's critical systems to be ready on time, or even early. "Many companies, financial institutions, and federal agencies are still working on the problem," he says. "But most major organizations plan to have their solutions in place by the first quarter of next year." If the council is successful, Koskinen believes, Americans will confront little more than a few minor inconveniences when the year 2000 finally rolls around. "There's not enough information right now to indicate that stocking up on Coleman stoves and Sterno is an appropriate response," he says. And in the end, he predicts, "a lot of people won't notice." Koskinen has earned the respect of some Y2Kers by emphasizing the need for high-level planning in the event that some systems fail. But Y2K survivalists feel more comfortable with their own personal contingency plans, and a commercial infrastructure is already forming to support them. Walton Feed, an Idaho food distributor that sells products over the Net, is doing a brisk business in long-term supplies; the company attributes this to Y2K. And in Sully County, South Dakota, developer Russ Voorhees has attracted national publicity and hundreds of potential clients for his "Heritage Farms 2000" project - a Y2K survival community that's been on hold since June, when a local planning commission refused to grant the necessary building permits. For those who want to go it alone, there's a sense of adventurous fun in their preparations - the pride of self-sufficiency and an excuse to get away from the keyboard to earn some merit badges. But Y2K preparedness is not just a Boy Scout fetish, and it isn't always about getting away from it all. "If everybody moves to rural areas, they'll just take their problems with them," explains Paloma O'Riley, a red-haired, forty-something mother, wife, and computer expert. Paloma lives in the small town of Louisville, Colorado, just east of Boulder, and when she looks around her community she doesn't see potential looters - she sees neighbors. Her suburban hamlet has become a major landmark on the Y2K map as the world headquarters of The Cassandra Project, a grassroots Y2K preparedness organization that can perhaps best be described as a kind of Millennial Neighborhood Watch. Until last year, Paloma was a Y2K project manager at the Rover Group, a UK-based auto manufacturer, where her first responsibility was to identify all of the company's vulnerable systems and target them for patching. But her search didn't end with a couple of corporate mainframes. Inadvertently, Paloma opened up the Pandora's Box of Y2K: embedded systems. Embedded systems draw the Y2K bug-fixing task out of cyberspace and into the real world. There are lots of pea-brained microchips out there, nestled in everything from microwave ovens and automobiles, to power plants and oil refineries. Most don't care what the date is, but a small percentage of them do, and that made Paloma nervous. "I became concerned about just how prevalent embedded systems are," she recalls. "Several members of my family have medical problems, so when I started investigating I became very concerned about medical devices like defibrillators, physiological monitoring equipment, and the entire medical services infrastructure." When her contract came up for renewal in 1997, Rover asked Paloma to stay on in London to 2000. She declined - the thought of family and friends surrounded by noncompliant systems that might leave them cold, hungry, and without medical services was too much to ignore. Back in the States she began networking with other people who shared her concerns, and that's when she realized "we needed to put together an organization to address the issues and get information out to the public." Thus The Cassandra Project was born. In Greek mythology, Cassandra was a mortal woman courted by the god Apollo. To win her affections, Apollo gave her the gift of prophecy. Still, Cassandra rejected him, so the frustrated deity decreed that no one would ever believe her predictions. Paloma O'Riley gave a nod to Cassandra's fate when she chose the name for her Y2K preparedness group, but she is precisely the kind of mortal woman you'd want at your next PTA meeting - a firm believer in the notion that some good, old-fashioned community-building may keep the Y2K nightmare at bay. The Cassandra Project has helped spawn a dozen Y2K community preparedness groups around the country. It has a board of directors that includes several computer professionals and a Web site at millennia-bcs.com that lists a menu of articles discussing possible Y2K scenarios, ranging from minor annoyances to outright Y2Kaos. The site attracts more than 100,000 visitors a month. Between speaking engagements, Paloma spends her days organizing biweekly meetings with neighbors to discuss contingency plans, and lobbying the state government. "We've been working with the Cassandra group on a lot of their initiatives," says Steve McNally, staff director of the Colorado Information Management Commission. "They've talked to several legislators and the governor's office and brought some awareness of the issues to the table." For her part, Paloma and her family plan to stockpile a six-month supply of food. Her worst-case scenarios look much the same as those of the most hardcore, self-sufficient Y2K survivalists, but the bomb-shelter aspect is conspicuously missing. Paloma believes that people will pull together in times of turmoil. If calamity strikes and she is forced to draw the line, she's determined to do so in her own backyard. Even if Paloma's neighborly pragmatism sets her apart from the militia types and fundamentalist Christians who regularly contact The Cassandra Project, her efforts have brought her in contact with a thriving premillennial subculture. "People in other millennial movements, including Christian fundamentalism, point to Y2K as a sign of the times," says Philip Lamy, a professor of sociology and anthropology at Castleton College in Vermont. Lamy specializes in the study of secular millennialism, and he sees Y2K survivalism as a prime example of the genre. "Generally, millennial movements appear when a society or culture is going through a period of rapid cultural, economic, or technological change," he says. "The explosion of the Internet and the World Wide Web is fueling a lot of this now." Still, there are a few things that set the Y2Kers apart from the crowd. For one, the Y2K bug is not simply a matter of myth, superstition, or prophesy - it is a tangible problem hardwired into the fabric of our industrial society. In addition, the people who are taking Y2K most seriously are not laypeople or neophytes - they are specialized technicians who approach the situation with a sophisticated understanding of society's hidden machinery. But if heightened technical awareness alone could explain the apocalyptic conclusions drawn by the Y2K survivalists, then every well-informed computer geek would be moving to the desert - and that clearly isn't happening. With so many intertwined variables to consider, logic inevitably takes a back seat to subjective intuition - a personal sense of security that extends from the microcosm of a single computer program to the macrocosm of modern society. Ultimately it all comes down to faith. But this, too, sets the Y2K survivalists apart. True millennialism is rooted in faith - fundamentalist Christians may anticipate an apocalypse, but they optimistically expect it to be followed by 1,000 years of celestial rule. Y2K survivalism, on the other hand, doesn't concern itself with redemption. It is antimillennial - the polar opposite of techno-millennial movements like the Extropians who see technology as the stairway to a higher plane. (See "Meet the Extropians," Wired 2.10, page 102.) "All this suggests that you don't have to be a religious fanatic, a Christian fundamentalist, or a ufologist to believe that our world may be in trouble - that there's something serious afoot in our nation and our world," Lamy adds. "The Y2K problem is overlapping with other survivalist movements, and like them it shares a kind of a fatalistic vision of the future." Three weeks have passed since Scott Olmsted put the carpet installers to work in his retreat. The carpet is in now, and he's turned his attention to other details, like night-vision equipment - his property is on high ground, and with the right hardware he could scan most of the valley from his backyard. He's also thinking of getting laser eye surgery so that he won't be dependent on contact lenses after 2000. It never seems to end. "Once you take the first steps to prepare, you basically admit that this is big enough to do something about. And then you realize you should be doing more." Scott has turned his back on denial - the blind faith that allows people to live normal lives in the face of staggering complexity, risk, and uncertainty. Instead, he's chosen to acknowledge his own vulnerability. As he describes it, "I've always known that the economy is complex and that we live on the end of a long chain of ships, planes, and 18-wheelers." Scott sees how the Y2K bug could disrupt that chain, and like other resolute souls - environmental activists, antiabortion protesters, and corporate whistle-blowers to name a few - he, too, has been driven to act by the clarity and intensity of his vision. The rest of us may be content without quite so much awareness, but embracing the Bug has actually made Scott feel better. "I know one guy who started taking Prozac when his denial fell away," he says. "Taking action - doing something - really gets you out of that." Scott admits there isn't enough evidence to prove he's right. But, he insists, that's not the way to look at it. "There's not nearly enough evidence pointing the other way to make me abandon my preparations," he says. In a way, he's managed to optimize the Y2K problem - even if the new millennium dawns without incident, his efforts will have yielded a supply of inexpensive food, a new collection of practical skills, and a nice vacation home in the country. It's an eminently logical win-win, and Scott has taken comfort in that. "I'm not waiting until the ground is shaking to prepare for the Y2K earthquake," he muses. "I'm going to be ready for an 8.5. I may look foolish if it turns out to be minor, but that's OK. That's the nature of decisionmaking under uncertainty." Kevin Poulsen is a columnist for ZDTV.com . America Offline ( Inside the Great Blackout of '00 ) "Most of the nation's power systems must be compliant, or they all go down, region by region, in one gigantic, rolling blackout," warns Gary North, keeper of the oldest, most notorious Y2K doomsday site on the Web. If the lights go out at the dawn of the 21st century, North believes the failure will be permanent, because the computers that control the grid will be unfixable if there isn't power to run them. Thereafter, he argues, the blackout will trigger the collapse of civilization. The North American grid is vulnerable to simultaneous failures. Generating facilities in the US, Canada, and Mexico jointly move power through high-tension lines that distribute electricity through four regional interconnections. Within each region, if one facility goes offline, the others compensate to pick up the slack. But there's not much spare capacity built into the system; the North American Electric Reliability Council, a group that is drawing up a timetable of Y2K fixes for the Department of Energy, admits that if multiple generating facilities fail in one region, this "may result in stressing the electric system to the point of a cascading outage over a large area." This is how it could happen: A power station is equipped with safety systems that deactivate steam boilers if they aren't maintained frequently. Suppose maintenance was last performed in 1999, which an embedded chip recorded as "99." Now it's the year 2000, so the chip subtracts the old year, 99, from the new year, 00, and finds, amazingly, that maintenance was last performed -99 years ago. Clearly this is an error, so the chip shuts down all the boilers, just to be safe. Meanwhile, at another power station, a temperature sensor attached to a transformer averages its readings over time. On January 1, 2000, the sensor divides temperature by the year - which is expressed as "00" - and comes up with an infinite value, triggering another shutdown signal. If small faults like these knock out a half dozen facilities, the rest will go offline to protect generators from burning out in a hopeless effort to meet the growing demand. The distribution grid also has weak points. "We have at least 800 different types of embedded controls on the wires," explains Gary Steeves, director of a Y2K project at TransAlta Utilities, the largest investor-owned power company in Canada. "Some of the protective devices log dates of faults in activity and can automatically take a component out of service." If the same controller has been installed in thousands of remote locations, and the chips share the same Y2K bug, they'll all fail simultaneously. Most US power utilities refuse to comment on the likelihood of these disasters, fearing litigation if they offer reassurances that turn out to be wrong. Tim Wilson, publisher of Y2k News, worries about the nearly 9,000 small regional companies that pull power off the grid at the local level. "They're clueless as to what to do about Y2K," says Wilson. "They know they have embedded chips, but they don't know where they are. If there's a power shortage, rural areas may not be allowed to take power off the grid, because cities could have a higher priority." This suggests an ironic scenario: Remote areas may remain dark for weeks or months after January 1, 2000, leaving Y2K survivalists waiting in their isolated cabins for the lights to come back on - while complacent urban dwellers enjoy uninterrupted service. - Charles Platt Copyright � 1993-98 The Cond� Nast Publications Inc. All rights reserved. Compilation Copyright � 1994-98 Wired Digital Inc. All rights reserved. - ----------------------- NOTE: In accordance with Title 17 U.S.C. section 107, this material is distributed without profit or payment to those who have expressed a prior interest in receiving this information for non-profit research and educational purposes only. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml - ----------------------- ********************************************** To subscribe or unsubscribe, email: majordomo at majordomo.pobox.com with the message: (un)subscribe ignition-point email at address ********************************************** www.telepath.com/believer ********************************************** ------- End of Forwarded Message From jamesd at echeque.com Mon Sep 7 19:52:22 1998 From: jamesd at echeque.com (James A. Donald) Date: Tue, 8 Sep 1998 10:52:22 +0800 Subject: A question about gas warfare in San Fran in '66... In-Reply-To: <199809080109.UAA06813@einstein.ssz.com> Message-ID: <199809080247.TAA09568@proxy4.ba.best.com> At 08:09 PM 9/7/98 -0500, Jim Choate wrote: > Here in Austin we have a local radio dj who does a public > access show on various issue localy and nationaly, Alex > Jones, who has put a piece on some sort of bio-weapon test > that occurred in '66 in San Francisco. He is claiming that > deaths resulted. > > Anyone have a clue what he's talking about? Had a bioweapons test occurred in the people's republic of San Francisco, it seems likely they would have erected billboards spelling out the details in letters visible from the moon. I assume that this is one of these anonymous source things. According to official, yet anonymous sources the US/CIA forces committed every crime of every regime around the world, including the purported crimes of Pol Pot in Cambodia, (I kid you not) and they are actually running a totalitarian state in the USA but the people are too brainwashed to notice. They also sell cocaine. Similarly, according to sources that are not anonymous, but which (strange to report) no one else can find, Nike is actually producing its shoes in something very like slave labor camps. The reason the refutation of the CNN story (US uses nerve gas to kill defectors and exterminate villagers) made such news is that CNN was so careless as to actually name identifiable real people as the source of this story. (They needed faces and it is hard to put the faces of anonymous sources on TV.) Naturally those real people were mighty pissed and denied the story attributed to them. There is a wagon load of similar stories using supposedly official, but anonymous sources, or sources that do not appear to be real people. The print media works much better for such sources than TV. In short, do you think the internet is the net of a million lies? Not so. It is the place where lies get exposed. It is far easier to get away with lying in the old media, because nobody answers you back. --digsig James A. Donald 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG q3LBLR6odNzwIKI1p2zeYnP4Kzv2MSbsmKm0u2M5 4W6++mmQ2e3TnYU5J3oM1+BvPivukgtAcxEWE47MN ----------------------------------------------------- We have the right to defend ourselves and our property, because of the kind of animals that we are. True law derives from this right, not from the arbitrary power of the omnipotent state. http://www.jim.com/jamesd/����� James A. Donald From unicorn at schloss.li Mon Sep 7 19:55:57 1998 From: unicorn at schloss.li (Black Unicorn) Date: Tue, 8 Sep 1998 10:55:57 +0800 Subject: Citizenship silliness. Re: e$: crypto-expatriatism In-Reply-To: Message-ID: <199809080254.TAA05443@cyberpass.net> At 08:24 PM 9/7/98 , Kawika Daguio wrote: >Bob, > >The syllogism at the end of your post is exactly why I have spent the last >more than 5 years negotiating and lobbying and why we (FI's) and you >(everyone else) shouldn't worry about the impact of government policy on the >security of financial communications. Market (macro and microeconomics >plays a bigger role than the government. So that explains why the U.S. price for e.g., sugar, has exceed the world price for sugar by 20-30% to as much as 50% for something like 20 years, right? Because government efforts at manipulating prices and policies are useless? This is, of course, but a single example. Mr. Hettinga comments: >Do people out there really think somebody like Gore's going to do a crypto-amnesty someday? Please. Revoking one's citizenship, particularly for a better option- of which there are many- is hardly the end of the world, and is unlikely to make one a felon. It will, in fact, prevent one from becoming one in this case which is, of course, the point. Using terms like "Crypto-amnesty" is just inflammatory. Mr. Hettinga further comments: >I expect people who do this crypto-expat stuff are going to get their >new passports refused at the U.S. border when they visit, and I think that >things are going to get worse for them for a long time before they get better. Of course, this is nonsense. I know several major U.S. tax offenders who have several million in liens and civil judgements who return to the United States on a regular basis, they just don't maintain assets there. Further, one of them just recently renewed his U.S. passport at the U.S. consulate without incident. Bottom line: People don't become criminals in the United States because they leave it. Consider the ramifications of turning people away at the border because they are engaged in completely legitimate commercial practices abroad which are, none the less, undesirable in the United States? Christ, the U.S. can't even turn away well known but unconvicted French Economic Intelligence experts at the border. I am constantly amused at the attitude of Americans who are convinced that anyone who lives outside of the "end-all-be-all of the civilized world" must live in some third world country. This too is nonsense. If I were jurisdiction shopping I'm not sure I'd pick a small African nation, as some others have, because this state would be extremely unlikely to protect me from the kind of nastiness that nations are expected to protect citizens from. Also, visa-free travel is a pretty big consideration. Picking a country not well established in this regard is folly. Cryptography is the cutting edge of many things, but that situation is quickly wavering. It's not long before being a cryptographer is even less profitable than it is today. If plying your trade is important, waiting around for "market forces" to convince the FBI that they have it all wrong is probably not a good strategy. Incidentally, if anyone needs assistance contacting the best migration consultants around, I'd be happy to give you my views and make referrals. Some of you who want a counterpoint based on something a bit more substantial than provincial fear mongering might ask after Tim May, who I recall considered departing the United States but decided against it for a variety of reasons. From nobody at sind.hyperreal.art.pl Mon Sep 7 20:00:42 1998 From: nobody at sind.hyperreal.art.pl (HyperReal-Anon) Date: Tue, 8 Sep 1998 11:00:42 +0800 Subject: h Message-ID: On Mon, 7 Sep 1998 CRBREW9802 at aol.com wrote: > > how did u do it > > Usually, it is done as follows: 1) Find a willing partner. If you're a Democrat, find a subordinate or an intern. 2) Make sure your partner wears appropriate attire. If you're a Democrat, a blue dress is appropriate. 3) Unzip your pants. 4) Tell your partner to "kiss it." 5) When you ejaculate, make sure your partner does something suitable with the ejaculate. If you're a Democrat, ensure that she dribbles it over the dress. 6) If you're a Democrat, ensure that she saves the dress, doesn't have it cleaned, and then turns it over to the FBI for DNA testing. For our AOL friend, the following has been converted into the Language of the AOLholes: i) find a wiling partner if your a democrat find a subordinate or a intern... 2) make sure your partner wears right clothing if you're a democrat a blue dress is right........ 3... unzipp you pants 4) tell you partner to kiss it... 5-when u cum make sure your bitch does something with the jiz if your a democrat make sure she drops it in the dress man... 6) If you'r a democrat make sure that she saves da dress...and doesn't have it cleaned...and gives it to the FIB for RNA testing... LamenessMonger From ravage at einstein.ssz.com Mon Sep 7 20:08:29 1998 From: ravage at einstein.ssz.com (Jim Choate) Date: Tue, 8 Sep 1998 11:08:29 +0800 Subject: A question about gas warfare in San Fran in '66... (fwd) Message-ID: <199809080324.WAA07929@einstein.ssz.com> Forwarded message: > Date: Mon, 07 Sep 1998 19:34:29 -0700 > From: "James A. Donald" > Subject: Re: A question about gas warfare in San Fran in '66... > I assume that this is one of these anonymous source things. =20 Actualy no, Alex was showing some documents with government seals and such. I haven't had a chance to contact him so far but intend to. The only way I have of getting a hold of him is to call his talk show or his access tv show. His next access show is tomorrow (Tue.) nite. The gist was that some group within the US gov. did a test in some area of San Fran. and several deaths occurred. It wasn't done with the knowledge or permission of the Cali. or San Fran. officials as described by Alex to date. As I find more info I'll pass it along. [bunch of other peripheral drivel deleted] ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From tcmay at got.net Mon Sep 7 20:23:05 1998 From: tcmay at got.net (Tim May) Date: Tue, 8 Sep 1998 11:23:05 +0800 Subject: crossposting In-Reply-To: Message-ID: At 7:30 PM -0700 9/7/98, Mark Hedges wrote: >Ya know, I sometimes cross-post across lists when I shouldn't, so I'm >guilty of that too, but now that I'm on so many of these lists, I really >see the reasons behind one of the biggest complaints. I'm getting about 4 >copies of each of the messages in the Vince Cate thread. > > I stay off of these proliferating lists. The Cypherpunks list was the first one, and despite its many flaws over the years, it's enough for me. I'm not on the Lewispunks list, nor the Perrypunks list, nor any of the many Hettingapunks lists. And when the Cypherpunks list briefly became the Sandypunks list, I left for a while. Works for me. Cypherpunks...the Real Thing (TM). BTW, I dislike getting all these crossposts from Lewispunks, Perrypunks, and Hettingapunks, all the more so when attempting to _reply_ to these messages often generates "You have no permission to post to this list" responses, or the like. Makes me want to get some of Vulis' tools and apply them appropriately. --Tim May "The tree of liberty must be watered periodically with the blood of tyrants...." ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Licensed Ontologist | black markets, collapse of governments. From tcmay at got.net Mon Sep 7 21:20:50 1998 From: tcmay at got.net (Tim May) Date: Tue, 8 Sep 1998 12:20:50 +0800 Subject: Citizenship silliness. Re: e$: crypto-expatriatism In-Reply-To: Message-ID: (As per my last message, I have deleted all of the mailing lists except Cypherpunks.) At 7:51 PM -0700 9/7/98, Black Unicorn wrote: >I am constantly amused at the attitude of Americans who are convinced that >anyone who lives outside of the "end-all-be-all of the civilized world" >must live in some third world country. This too is nonsense. If I were >jurisdiction shopping I'm not sure I'd pick a small African nation, as some >others have, because this state would be extremely unlikely to protect me >from the kind of nastiness that nations are expected to protect citizens >from. Also, visa-free travel is a pretty big consideration. Picking a >country not well established in this regard is folly. I'm not going to criticize Vince for his decision to go with Mozambique...but.... Seems not to too long ago Mozambique was a semi-Communists African dictatorship, involved in various wars with RSA (the original one). And various killings of Westerners, and so on. But I may be misremembering. And Mozambique may have changed (or, rather, the ruler may have changed). But it seems to me that perhaps paying $5000 for Mozambiquan (sp?) citizenship will buy just about that amount of protections. Vince is probably safe enough. But if ever gets into a snit at some border, or if the U.S. seeks an extradition (not that I am predicting this, as crypto is still too obscure for such headline-grabbing efforts), I rather doubt the Mozambiquan consulate or embassy will lift even a little toe to help. Were I to expatriate, I'd pick a more stable country, like Switzerland or the other countries BU often speaks of. Or I'd just travel around and count on their being little nexus of my activities. (Which would be my main strategy: use the very cryptographic technologies we support to virtualize the activities and make the whole issue moot. This would require a fair amount of care in using the tools consistently, without any slip-ups, but it seems doable. With care, one could run a crypto development effort from some pleasant U.S. locale with no means of proving any U.S. laws were being broken. Sameer seems to be doing it even fairly openly, so imagine how much more secure someone who never publicized his role could be?) >Some of you who want a counterpoint based on something a bit more >substantial than provincial fear mongering might ask after Tim May, who I >recall considered departing the United States but decided against it for a >variety of reasons. Well, I'm in a somewhat different position from either Vince, who has renounced, or Ryan, who is merely residing in the sunny Caribbean for some amount of time. * My assets are inextricably known to the IRS, SEC, and suchlike, via the rules about stock ownership, transfer agents, etc. (Even had I wanted to "hide" my assets as long ago as the early 80s, it would have been effectively too late.) * There may be ways I could flee the U.S. and get my assets out. Merely taking my _certificates_ out is of course not nearly enough. Certificates are not bearer instruments. Wiring my assets out may work, but is risky. (Were I more serious about fleeing, I would know more about this. But I am not, so I haven't looked into this in detail.) * Oh, and this kind of flight by me would probably complicate my life in various ways. While BU says he knows of various tax fugitives who still cross back into the U.S., I know of others who don't feel comfortable doing so, even in sneaking back i across border crossings like Tijuana. (And Marc Rich, at the extreme end in wealth, is unable to return to the U.S., due to warrants out for his detention on tax evasion and securities charges.) * What I dislike the most about the U.S. system are things like the gun control laws, the tax rates, the welfare system, and the increasing surveillance. Alas, most of the best havens are worse in some ways than the U.S. (Most Caribbean nations alow no guns. Monaco has surveillance cameras in all public places and does not like having "outspoken" residents...the Prince may revoke citizenship on a whim and if a resident draws too much attention to his little fiefdom. Several major European countries are more thoroughgoingly statist than the U.S.) * Anyway, I also _like_ a lot here in the U.S. I like the Constitution, esp. the earlier, more libertarian parts. I like the scenery. I like the freedom to travel. I like being able to get on my motorcycle and ride for as long as I want with no pesky border crossings, no requirement to present my passport at hotels, no police demanding "papers," and no 70% wealth confiscation tax rates like some countries have. (No doubt not all countries have all or most of these things. Enough do. And as John Walker, founder of Autodesk and expatriate to Switzerland said, moving to Switzerland from California will NOT lower one's tax rate.) * I'm a Californian and I like the pleasant Mediterranean climate. (BTW, I lived for a year on the French Riviera in the 1960s and have visited a couple of times since. Neither France nor Monaco nor Italy is a viable place for me, for various reasons.) I wish Vince, Ryan, and all the others well. --Tim May "The tree of liberty must be watered periodically with the blood of tyrants...." ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Licensed Ontologist | black markets, collapse of governments. From tcmay at got.net Mon Sep 7 22:40:58 1998 From: tcmay at got.net (Tim May) Date: Tue, 8 Sep 1998 13:40:58 +0800 Subject: Tax silliness In-Reply-To: <199809080254.TAA05443@cyberpass.net> Message-ID: Folks, I generally restrain myself from passing on all the various news stories I see or read. But tonight Fox News is reporting that the IRS has said it may seek to assess "gift taxes" if the guy who recovered Mark McGwire's 61st home baseball gives the ball back to Mark McGwire. (The ball is said to have a street value, to museums or collectors, of $250K or so. The 62nd home run ball, the one which breaks Maris' record, will supposedly be worth more than a million bucks.) So, the shmuck who got this ball faces taxes on an unrealized gain if he never sells the ball. And he gets taxed if he hands the ball back to McGwire. He makes no money, but pays 30-40% of some theoretical value in taxes. Those fuckers in D. C. need to be put out of our misery. --Tim May "The tree of liberty must be watered periodically with the blood of tyrants...." ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Licensed Ontologist | black markets, collapse of governments. From whgiii at invweb.net Mon Sep 7 22:52:14 1998 From: whgiii at invweb.net (William H. Geiger III) Date: Tue, 8 Sep 1998 13:52:14 +0800 Subject: Tax silliness In-Reply-To: Message-ID: <199809080548.BAA06556@domains.invweb.net> -----BEGIN PGP SIGNED MESSAGE----- In , on 09/07/98 at 10:39 PM, Tim May said: >Those fuckers in D. C. need to be put out of our misery. I agree 110%. This is something I have though long and hard on and have come to the conclusion that a single strike to take out DC would only lead to the establishment of a military dictatorship (though I must admit that watching those bastards fry would almost be worth it ). Eventually some form of democracy would be restored (but freedoms would be much less than what we have now) as it is simpler to control the sheeple if they think they are running things. - -- - --------------------------------------------------------------- William H. Geiger III http://www.openpgp.net Geiger Consulting Cooking With Warp 4.0 Author of E-Secure - PGP Front End for MR/2 Ice PGP & MR/2 the only way for secure e-mail. OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html - --------------------------------------------------------------- Tag-O-Matic: Speed Kills - Use Windows! -----BEGIN PGP SIGNATURE----- Version: 2.6.3a-sha1 Charset: cp850 Comment: Registered_User_E-Secure_v1.1b1_ES000000 iQCVAwUBNfTHLY9Co1n+aLhhAQE3mQP+NjiXyWzR20LJJu5KzsHIKwcIaDoxWcrj O4bn/N2d2SmUQVMkIC7jFXlLpzGQ6COMTK1fAgYtlOe4dk6B4sC4TYv68D8xSix4 vaTC6z8kaF6ZojY3i9hANQhw7aBH7D5bfco+JBtfpwYWIcMOIvQ/hHAJOooPeyPa w7YHYljne6k= =fBi0 -----END PGP SIGNATURE----- From dietpatches at bigfoot.com Tue Sep 8 14:51:35 1998 From: dietpatches at bigfoot.com (dietpatches at bigfoot.com) Date: Tue, 8 Sep 1998 14:51:35 -0700 (PDT) Subject: New! All Natural Weight Loss "Patch"! Message-ID: Do you know anyone that needs to lose weight? Of course you do! There are over 92 million overweight people in the US alone. The weight-loss industry brings in billions of dollars each year. A recent Harris poll indicated that 74% of Americans are overweight or would like to lose a few pounds. THE ALL NATURAL WEIGHT LOSS PATCH Just introduced in May, 1998, the All Natural TrimPatch is the most significant development in the industry. The patch suppresses appetite, naturally. 100% homeopathic ingredients, with time released nutrients that enter the bloodstream through the skin. Just peel and stick. Four years in development. 87% of people lost weight in clinical studies. 60 Medical Doctors and Pharmacists on advisory board. No shakes or drinks, no pills, no special menus. THE PRODUCT: The transdermal weight loss patch, call "All Natural TrimPatch" is a simple, safe and sensible way to lose and control weight. It is completely homeopathic, with time-released nutrients that enter the bloodstream through the skin. Transdermal is the third most effective way to introduce a substance to the body, after intravenous and sub-lingual. TrimPatch works by suppressing an person's appetite and increasing fat metabolism. It has NO stimulants. Simply Peel, Stick, and Forget! TESTING: The product was tested over 2 years on 2,400 people with an 87% success rate. It was overseen by 60 MD's in consultation with many Homeopaths. There were no side effects in the entire study, other than a slight minor rash from the adhesive on some people, which left in 24 hours. Double blind placebo test methods were used. Over 900 MD's were on the Manufacturer's Advisory Board. There are 60 Medical Doctors and pharmacists who have been active in the clinical studies of the patch. PRODUCT EFFECTIVENESS: The average weight loss was 3 lbs. after 2 weeks, 8 lbs. after 4 weeks, and 13 lbs. after 6 weeks. GURARANTEED RESULTS BY THE COMPANY: All Patches come with a 30 day, 100% money back guarantee. MARKET: Weight loss is a $33 billion dollar a year industry. Think about it. How many people do you know personally who'd like to be trim? With the recent withdrawal of Redux & Phen-Fen from the market, people want a SAFE product to help them balance their weight. More than a third of the American population is overweight. 53 million people are considered "obese." A Harris Poll (February, 1996) reveals that "74% OF AMERICANS ARE OVERWEIGHT." Our society wants something that is easy for them to do. Transdermal application industry is rapidly growing. Nicoderm, Vitamin C, Nitro-Glycerin, Estrogen, Testosterone, Cortisone, Pain, Morphine, Motion Patches, and Local Anesthetic Patches are currently being used. INGREDIENTS: Ingredients of The All Natural Trim Patch, and the role they play in balancing our weight naturally: Abies Canadensis -- Hemlock Spruce - suppresses appetite craving for meat Ammonium Bromatum -- Bromide of ammonia - suppresses appetite and headaches Ammonium Carbonicum -- Carbonate of ammonia - suppresses appetite Ammonium Muriaticum -- (will get the scoop) Antimonium Crudum -- Assists in cleansing the body of fat Argentum Nitricum -- Nitrate of silver - suppresses appetite for sweets Calcarea Carbonica -- Carbonate of lime - suppresses cravings for indigestible food Capsicum Annuum -- cayenne pepper - assists in bowel function, elimination Cinchona Officinalis -- Peruvian bark from China - enhances digestion Fucus Vesiculosus -- Seaweed-based kelp - rejuvenates sluggish thyroid* Graphites -- Plumbago - suppresses feeling of hunger in the stomach Kali Bichromicum -- Bichromate of potash - enhances digestion Kali Carbonicum -- Carbonate of potassium - suppresses desire for sweets Kali Phosphoricum -- suppresses desire for sweets Lycopodium Clavatum -- Club moss - suppresses excessive hunger Natrum Muriaticum -- Chloride of sodium - suppresses appetite Phosphorus -- suppresses appetite soon after you eat Phytolocca Decandra Berry -- Poke root - assists in killing fungi and their spores Pulsatilla -- Wild flower - suppresses appetite for fatty and warm foods Sabadilla -- Cevadilla seed - suppresses appetite for sweets Silicea -- Pure flint - tendency to create balance in the body Spongia Tosta -- Roasted sponge - suppresses excessive hunger Staphysagria -- Stavesacre - tendency to increase feeling of strength Sulphur -- Sublimated sulphur - suppresses excessive appetite Thyroidinum -- suppresses appetite for sweets, rejuvenates sluggish thyroid* tends to eliminate nausea and indigestion, thirst for cold water Veratrum Album -- White hellspore - suppresses voracious appetite Thyroid rejuvenation is crucial for increased metabolism of fat, as the thyroid gland controls metabolism. An increase in thyroid activity lends itself, therefore, to fat metabolism, as you well know. This information has been taken from Materia Medica with Repertory, Ninth Edition, published by Boericke & Tafel Inc., Santa Barbara, California. TO PLACE AN ORDER OR TO SPEAK WITH A CUSTOMER SERVICE REPRESENTATIVE CALL: (732) 536-5734 FOR INFORMATION ON BECOMING A NATURAL BODYLINES DISTRIBUTOR, CALL: (888) 718- 3175 FOR A 5 MINUTE, 24 HOUR RECORDED MESSAGE. Email: dietpatches at bigfoot.com Bonnie Levy Natural Bodylines Official Distributor (732) 536-5734 From hugh at road.toad.com Mon Sep 7 23:54:57 1998 From: hugh at road.toad.com (Hugh Daniel) Date: Tue, 8 Sep 1998 14:54:57 +0800 Subject: Cypherpunks HyperArchive In-Reply-To: Message-ID: <199809080651.XAA00528@road.toad.com> I did not get a chance to download the great archive Ryan did, lets hope it's on the disk there still, otherwise it has to be rebuilt by someone. ||ugh hugh at toad.com From joe at printing.com Tue Sep 8 15:37:21 1998 From: joe at printing.com (joe at printing.com) Date: Tue, 8 Sep 1998 15:37:21 -0700 (PDT) Subject: Auto Reply to your message ... Message-ID: ----- The following text is an automated response to your message ----- Thank you for requesting samples of Web Cards. We will be sending you several samples and a brochure within 24 hours. Web Cards can be used in so many ways that we've prepared a special free report on how 50 businesses have used them. To get your report, simply send an email to ideas at printing.com and it will be sent to you by email immediately. Web Cards are easy to order too. You can use the on-line form at our Web Site www.printing.com or print the form and fax it to 908-757-2604 or call us at 800-352-2333. We're very helpful and will work with you to adapt your site to a postcard at no charge. After setting up your card (which takes about 24 hours), we'll post a "proof" of what it looks like on the Web and send you the address for you to approve. And if you have any changes, don't hesitate, there's no charge for helping you get exactly what you want. In the meantime, if you have any questions or would like sample cards for a specific type of business, please call us at 800-352-2333 or email me at joe at printing.com. Sincerely, Joe Haedrich President From james.lucier at worldnet.att.net Tue Sep 8 00:58:32 1998 From: james.lucier at worldnet.att.net (James Lucier) Date: Tue, 8 Sep 1998 15:58:32 +0800 Subject: What we are Fighting In-Reply-To: Message-ID: <000201bddb17$23206be0$08b24e0c@oemcomputer> Actually, Tim, the way the Men in Black work is that they keep their bans on domestic crypto under wraps until the last moment and then get them adopted with no public hearings in the crisis atmosphere of a heavily lobbied markup session at some critical point in the legislative calendar. They know that the more people actually understand what they are up to, the less they are likely to get what they want. But do not underestimate the power of having useful stooges like Jerry Solomon and the shamefully clueless Jon Kyl in positions where they can do last-minute switcheroo on bills that are being moved to the floor. One of the major reasons why we didn't get the Goodlatte bill on the floor this year is that moving it to the Floor would have resulted in putting Oxley Manton or the House Intelligence Committee bill on the Floor at the same time. -----Original Message----- From: owner-cypherpunks at cyberpass.net [mailto:owner-cypherpunks at cyberpass.net] On Behalf Of Tim May Sent: Monday, September 07, 1998 8:55 AM To: Declan McCullagh Cc: cypherpunks at cyberpass.net Subject: Re: What we are Fighting At 6:53 AM -0700 9/7/98, Declan McCullagh wrote: >There is, offically, a proposal on the table to limit speech within the >U.S. by restricting sale, manufacture, distribution, import of non-GAK'd >crypto. A House committee approved that one year ago. > I'd forgotten about that little one. Of course, it has not gone anywhere (no Senate version or committee markup, right?), so I'm not yet ready to say there's official action on its way. And, fortunately, the session is over but for the shouting about Clinton and his cigars. --Tim May "The tree of liberty must be watered periodically with the blood of tyrants...." ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Licensed Ontologist | black markets, collapse of governments. From vznuri at netcom.com Tue Sep 8 01:06:01 1998 From: vznuri at netcom.com (Vladimir Z. Nuri) Date: Tue, 8 Sep 1998 16:06:01 +0800 Subject: Tax silliness In-Reply-To: Message-ID: <199809080800.BAA17066@netcom13.netcom.com> admittedly I'm not an expert on the subject, but maybe the fan hands it back to mcguire for authentication--for him to sign it, and return it to the fan who then owns it. as far as collectors items, a baseball can't be authenticated otherwise. I presume mcguire would have to write something about "my 62nd home run ball".. but your point is well taken. the IRS is getting out of control. frankly I think they are like a huge crowbar or vice that is slowly pressing down on the population. all the loopholes are being removed from tax laws, slowly, quietly. people who had no problem as independent contractors (such as caddies) now get harassed by the IRS. also, waiters & bartenders, who never made much money, got a lot of flack over tips around the late 80's. eventually perhaps we'll have one world currency, and absolutely no means of exchanging it other than through government tracked mechanisms, all subject to taxes. that does seem to be the direction the world is heading. I've written before on "alternative money systems". no one here understood my points very well, but I still think there is major potential for freedom through them. a sort of 21st century tea party. there are some "barter cards" that are taking off in various localities. these are essentially tax-avoidance barter systems.. I hope they catch on and force a showdown with politicians. eventually the control freaks will be obvious and will not be able to hide their tyranny. hopefully. the thing about the american public though, is that sometimes they stay asleep & give consent even when the tyrants emerge obvious. From promo at printing.com Tue Sep 8 01:52:19 1998 From: promo at printing.com (promo at printing.com) Date: Tue, 8 Sep 1998 16:52:19 +0800 Subject: Auto Reply to your message ... Message-ID: <35F478A400000217@mail.agtinc.net> ----- The following text is an automated response to your message ----- Thank you for requesting samples of Web Cards. We will be sending you several samples and a brochure within 24 hours. Web Cards can be used in so many ways that we've prepared a special free report on how 50 businesses have used them. To get your report, simply send an email to ideas at printing.com and it will be sent to you by email immediately. Web Cards are easy to order too. You can use the on-line form at our Web Site www.printing.com or print the form and fax it to 908-757-2604 or call us at 800-352-2333. We're very helpful and will work with you to adapt your site to a postcard at no charge. After setting up your card (which takes about 24 hours), we'll post a "proof" of what it looks like on the Web and send you the address for you to approve. And if you have any changes, don't hesitate, there's no charge for helping you get exactly what you want. In the meantime, if you have any questions or would like sample cards for a specific type of business, please call us at 800-352-2333 or email me at joe at printing.com. Sincerely, Joe Haedrich President From your.name at pcm.bosch.de Tue Sep 8 02:59:23 1998 From: your.name at pcm.bosch.de (your name) Date: Tue, 8 Sep 1998 17:59:23 +0800 Subject: Child-Molesting Forger's Chilling Confession!!!1! Message-ID: <199809080955.LAA16121@frnext1a.fr.bosch.de> Encrypted_Message=On 4 May 1998 02:57:07 GMT, in article <6ijaq3$bb1 at news1.panix.com>, Information Security (= Guy Polis ) wrote: # Guy Polis (guy at panix.com, eviljay at bway.net) is a pedophile child # molester who was fired from his consulting position at Salomon Brothers # after he was caught masturbating in his cubicle at the child pornography # JPEGs that he downloaded from the Internet. The poster's been awful quiet lately - did the feds arrest him? Browser=Netscape:Mozilla/3.01 [de]C-NSCP (WinNT; I) Remedy=Tell the world From apf2 at apf2.com Tue Sep 8 04:29:01 1998 From: apf2 at apf2.com (Albert P. Franco, II) Date: Tue, 8 Sep 1998 19:29:01 +0800 Subject: Seed to clone himself, one way or another [CNN] Message-ID: <3.0.3.32.19980908212730.0069b90c@apf2.com> >From: Jim Choate > >Hi, > >It seems that scientist in general may soon be forced to roam from country >to country to practice their work. > >Shades of Neuromancer. I am more and more convinced that Gibson's book, and >it's social commentary, is right on the mark. > >Forwarded message: > >> X-within-URL: http://www.cnn.com/TECH/science/9809/07/clone.seed.ap/ > >> CHICAGO PHYSICIST SAYS HE'LL CLONE HIMSELF WITH WIFE'S HELP >> >> Dr. Richard Seed Richard Seed September 7, 1998 >> Web posted at: 3:50 a.m. EDT (0750 GMT) >> >> BOSTON (AP) -- A physicist with three Harvard degrees but no medical >> license said he is ready to begin the first step toward immortality: >> he will clone himself. > >[text deleted] > >> Seed has said that if Congress bans cloning, he will move his >> operation to Tijuana, Mexico. > But if the feds pull similar bullshit as with crypto work he'll have to give up US citizenship to do the work. The regs for crypto appear to make it such that even if I live permanently outside the US I can not work on or produce crypto related products even if they are based on non-US technologies. It seems that being a citizen of the US is less and less attractive every day... Albert P. Franco, II From chargeit6 at usa.net Tue Sep 8 20:29:05 1998 From: chargeit6 at usa.net (Merchant Services) Date: Tue, 8 Sep 1998 20:29:05 -0700 (PDT) Subject: CREDIT CARD PROCESSING Message-ID: <199809081528.LAA11834@compuserve.com> --------------------------------------------------------- We received your email as someone who might be interested in our services. If this was a mistake please email us with "remove in the subject line" --------------------------------------------------------- Dear Friend, How would you like to be able to accept credit cards directly from your website, telephone or fax for your products and services and never need to purchase or lease expensive credit card equipment or pay a monthly fee for online ordering capabilities? **Brand New** Telecharge Credit Card acceptance program allows you to accept VISA or Mastercard any TIME,any WHERE through phone, fax or internet without the need to purchase or lease expensive credit card equipment. This brand new program will allow you to accept credit cards tomorrow. You simply pick up your telephone, dial a special toll free 800# 24 hrs a day 7 days a week, input a passcode and the credit card # and receive an immediate authorization over the phone. Within 2 days the money will be in your bank account. This is an exciting program for all businesses. Before you spend any money on a credit card program LOOK at this new program! To have a representative call you to explain the details of this program please email your Name, Phone Number (Don't forget your area code) and best time to call to: mailto:chargeit6 at usa.net A representative will return your call within 24hrs. A 100 % approval rate. This is a special promotion and for a limited time. Start today and save an additional 36%. Also receive 6 months of online advertising absolutely FREE! for your business. Feel free to call us and leave a message. A representative will return your call within 24hrs. World Tech Inc. 818-718-9429 7210 Jordan Ave. From Jen at evision.nac.net Tue Sep 8 21:34:38 1998 From: Jen at evision.nac.net (Jen at evision.nac.net) Date: Tue, 8 Sep 1998 21:34:38 -0700 (PDT) Subject: PEDIATRIC ADVISE - FREE WEBSITE Message-ID: <199809090432.AAA17439@evision.nac.net> If you are a parent you owe it to yourself to visit this site. It is the greatest relief site for all parents. Dr. Paula is the most non judgemental pediatrician I have ever heard of and her site is incredible. Every parent question gets answered usualy within a day. Check it out and please do not be angry that I send you this e-mail. It is only with good intention as I believe this site will be helpfull to you or someone you know. Visit it at http://www.drpaula.com A New Mother. From qimoo at clinet.fi Tue Sep 8 22:13:31 1998 From: qimoo at clinet.fi (qimoo at clinet.fi) Date: Tue, 8 Sep 1998 22:13:31 -0700 (PDT) Subject: Advertise! Cheap, Quick & Easy! Message-ID: <19980908353GAA9500@post.nrcps.ariadne-t.gr> Let A-1 Internet Marketing introduce you to the world of Cyberspace. Advertise over the Internet Cheap and Quick. It's as easy as 1, 2, 3!! Targeted e-mail is the newest way of advertising. It only takes a phone call to place your message in front thousands or even millions of people at a price you can't afford to pass up. Don't wait any longer. Let's get started now! Special rates avaiable. Give us a call toll free....... ** 1-877-268-8281 ** NOTE: If this message has reached you in error, we sincerely appologize. If you would like to be removed from our mailing list, please call the 800 number listed above and slowly spell and speak your e-mail address so that we may process your request promptly. You will be removed!! Thank you. ex8 From rdl at MIT.EDU Tue Sep 8 07:32:28 1998 From: rdl at MIT.EDU (Ryan Lackey) Date: Tue, 8 Sep 1998 22:32:28 +0800 Subject: Citizenship silliness. Re: e$: crypto-expatriatism Message-ID: > [gun control laws in other countries being even worse than the US] Does anyone know of any countries with more reasonable gun laws than the US? I vaguely think Israel and Switzerland are better, at least for citizens. It is one of the major problems I have with Anguilla -- "guns are bad". I miss my M1A. I mostly have two classes of guns I'd like to have: air pistol, for practice and competition, and military-style semiautomatic rifles, for practice and long-term defense. Self-defense handguns and shotguns are somewhat optional. A country like Switzerland seems ideal, at least as a citizen, given the reserve requirements. Mmmm, a nice Hammerli air pistol and a shiny new HK PSG-1 would make me forget about the M1A I left behind, very quickly. Especially with a good daylight scope and an IR scope... Only $30k or so for the package with 10k rounds of national match ammo. -- Ryan Lackey rdl at mit.edu http://sof.mit.edu/rdl/ <-- down From mah248 at nyu.edu Tue Sep 8 07:39:34 1998 From: mah248 at nyu.edu (Michael Hohensee) Date: Tue, 8 Sep 1998 22:39:34 +0800 Subject: A question about gas warfare in San Fran in '66... In-Reply-To: <199809080109.UAA06813@einstein.ssz.com> Message-ID: <35F5411A.A846BB4C@nyu.edu> Jim Choate wrote: > > Hi, > > Here in Austin we have a local radio dj who does a public access show on > various issue localy and nationaly, Alex Jones, who has put a piece on some > sort of bio-weapon test that occurred in '66 in San Francisco. He is > claiming that deaths resulted. > > Anyone have a clue what he's talking about? As far as I know, the only bio-weapon test that occured in San Francisco was when they scattered some large volume of apparently harmless bacteria over the city in order to find out what effect a bio-attack would have on them, and to get an idea of what countermeasures are useful, and of course, to test their own delivery systems. :) I don't know what kind of bacteria they were, so I've no idea if they were harmless or not. Suffice to say that a bunch of people in San Francisco think they weren't (harmless), and get upset about it frequently. It seems unlikely, however, that the few deaths that people have tried to attribute to the bacteria were actually caused by them. San Francisco is a big city, with lots of people. If the bacteria really were dangerous, *manY* people would have died, rather than the handful (10-15?) that did in fact die, for one reason or another. Michael Hohensee From whgiii at invweb.net Tue Sep 8 08:27:53 1998 From: whgiii at invweb.net (William H. Geiger III) Date: Tue, 8 Sep 1998 23:27:53 +0800 Subject: Citizenship silliness. Re: e$: crypto-expatriatism In-Reply-To: Message-ID: <199809081522.LAA14823@domains.invweb.net> -----BEGIN PGP SIGNED MESSAGE----- In , on 09/08/98 at 10:26 AM, Ryan Lackey said: >Does anyone know of any countries with more reasonable gun laws than the >US? I vaguely think Israel and Switzerland are better, at least for >citizens. It is one of the major problems I have with Anguilla -- "guns >are bad". I miss my M1A. Well back when I lived in Israel during the early '80s everyone had guns, and a lots of them. My landlord had a small armory in his bombshelter (something ever home has). I do not know what the gun laws are there concerning non-military citizens, but considering that everyone is in the military this doesn't seem to be much of an issue (unless you are a Palestinian). Nice country to live, good climate (comparable to southern California), friendly people, civilized country, strong European influence to the culture (for obvious reasons), parliamentary form of government. Inflation was *very* bad when I was there (I think only Italy & Argentina was worse) hopefully this has improved. I left at the end of '82 before all this crap with the Palestinians started. I don't know what shape basic liberties have taken since I have left. I imagine that after 50 years of continual war things are a little more restrictive than what most Americans are accustom to. - -- - --------------------------------------------------------------- William H. Geiger III http://www.openpgp.net Geiger Consulting Cooking With Warp 4.0 Author of E-Secure - PGP Front End for MR/2 Ice PGP & MR/2 the only way for secure e-mail. OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html - --------------------------------------------------------------- Tag-O-Matic: Windows: The CP/M of the future! -----BEGIN PGP SIGNATURE----- Version: 2.6.3a-sha1 Charset: cp850 Comment: Registered_User_E-Secure_v1.1b1_ES000000 iQCVAwUBNfVNqI9Co1n+aLhhAQH3EwP/VZ0hgtMSKkx5Rdm538UbYGOCRjZ3bQbG TrbSm1nVbtT3UeT6vXbm8thrl9zmu8wQup0iOhLqmbDIFfKrgr43rOnS8vWos1Ud JPMmt5lKwzsq40QhJNd1bPBU98Bk4do9gH4U4035b12Pkd85lJXHJHMe3BVUDRHT hNSNmbecAE0= =3Q9Q -----END PGP SIGNATURE----- From cicho at free.polbox.pl Tue Sep 8 08:55:48 1998 From: cicho at free.polbox.pl (cicho) Date: Tue, 8 Sep 1998 23:55:48 +0800 Subject: wired on y2k In-Reply-To: <199809080235.TAA23415@netcom13.netcom.com> Message-ID: <35f55163.1411866@193.59.1.1> I read this piece in the print edition and wondered... >F E A T U R E|Issue 6.08 - August 1998 >The Y2K Solution: Run for Your Life!! > By Kevin Poulsen Not *the* Kevin Poulsen, is it? ('the', as in http://www.well.com/user/fine/journalism/jail.html or http://www.catalog.com/kevin/scales.html) .marek From tcmay at got.net Tue Sep 8 09:35:42 1998 From: tcmay at got.net (Tim May) Date: Wed, 9 Sep 1998 00:35:42 +0800 Subject: Citizenship silliness. Re: e$: crypto-expatriatism In-Reply-To: Message-ID: At 7:26 AM -0700 9/8/98, Ryan Lackey wrote: >> [gun control laws in other countries being even worse than the US] > >Does anyone know of any countries with more reasonable gun laws than the >US? I vaguely think Israel and Switzerland are better, at least for citizens. >It is one of the major problems I have with Anguilla -- "guns are bad". >I miss my M1A. Don't automatically assume Israel is good for gun ownership. If you're an untermenschen, a schwarzen, a sand nigger, an Arab, you can't legally own a gun. Unless you're one of the Trustees, i.e., a deputized member of the PLO's military or police. The Chosen People are of course encouraged to have fully automatic weapons. (This is not a detailed elaboration of Israeli gun laws. Maybe even some Jews are forbidden to have guns. Israel has a lot of laws. But I know that "settlers" carry Uzi and suchlike openly, while Arabs in the same lands are forbidden from even owning shotguns or .22s.) Switzerland is also not what many think it is. While able-bodied men who served in the military have weapons issued to them that they keep at home, this does not necessarily imply gun ownership nirvana. For one thing, all the guns are tracked. For another, visitors or temporary residents face the usual surveillance state controls. Don't count on there being Gun Show and Swap Meets, where folks trade .45s and 9s and Uzis and AR-15s and M1As without benefit of notifying the Supreme Ruler and His Minions. (Such as our Second Amendment says we can do, until the commies took over in these Beknighted States.) >I mostly have two classes of guns I'd like to have: air pistol, for >practice and competition, and military-style semiautomatic rifles, for >practice and long-term defense. Self-defense handguns and shotguns >are somewhat optional. See above. Let us know if you find anyplace in the Caribbean which actually allows these kinds of guns to be owned by the sheeple. --Tim May "The tree of liberty must be watered periodically with the blood of tyrants...." ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Licensed Ontologist | black markets, collapse of governments. From xena at best.com Tue Sep 8 10:36:58 1998 From: xena at best.com (Xena - Warrior Princess) Date: Wed, 9 Sep 1998 01:36:58 +0800 Subject: "info on spooks" Message-ID: The Internet Oracle has pondered your question deeply. Your question was: > > Maybe *you* can help, Mighty Oracle. > > ---------- Forwarded message ---------- > Date: Sat, 29 Aug 1998 20:19:26 EDT > From: XxxxXxxx at aol.com > To: cypherpunks at toad.com > Subject: tell me > > hola and good tidings > send some info on spooks please > i will be grateful > And in response, thus spake the Oracle: } } In a way, you have come to the right place, Supplicant. Some of my best } friends are spooks. Generally, they like to be known as "The Intangible } Ones", but that's a bit of pretentiousness on their parts. "Ghoul", } "ghost", "spirit", and "weird white smudge on film" all are appropriate } names. } Some of their favorite haunts, if you will, tend to be different than } what current culture dictates. For example, spooks will not hang out in } old houses. Too many cobwebs, bugs, and general naughtiness. Spooks are } very sensitive creatures, and prefer to relax in libraries, arboretums, } Newt Gingrich's bedroom -- places where nothing ever happens. } There's not much else to spooks, dear Supplicant. They're really quite } nice and friendly, and I recommend you make them a big steak dinner every } once in a while. Leave it out on the table, and make sure you tell me } your address so I can come by... er, so I can notify the spooks. } } You owe the Oracle some new potatoes to go with that steak. } From honig at sprynet.com Tue Sep 8 10:42:05 1998 From: honig at sprynet.com (David Honig) Date: Wed, 9 Sep 1998 01:42:05 +0800 Subject: Cypherpunks HyperArchive In-Reply-To: Message-ID: <3.0.5.32.19980908103600.008469f0@m7.sprynet.com> :: Anon-To: Ryan Lackey , Tim May At 03:27 PM 9/7/98 -0400, Ryan Lackey wrote: >Anguilla is actually a pretty reasonable choice as far as a place to >spend a few years away from the US -- 7 000 people, many with a strong Jul 7 1999 The US today launched a cruise missile strike against Anguilla, where Osama bin "Blowback" Laden was known, according to US National Security officials, to be investing in an online gambling casino. --Count of Monte Carlo From honig at sprynet.com Tue Sep 8 10:42:58 1998 From: honig at sprynet.com (David Honig) Date: Wed, 9 Sep 1998 01:42:58 +0800 Subject: IP: Encryption Expert Says U.S. Laws Led to Renouncing of Citizenship In-Reply-To: Message-ID: <3.0.5.32.19980908101154.00853210@m7.sprynet.com> At 11:01 AM 9/7/98 +0100, Mok-Kong Shen wrote: >Robert Hettinga wrote: > >Let's wait and see whether AES will be genuinely exportable. > >M. K. Shen > Surely you jest. The head AES honcho will send you (in .de) the CD of the english specs, but not the one with the code. Like it matters. They will continue playing games and misbehaving until punished. From mmotyka at lsil.com Tue Sep 8 10:58:54 1998 From: mmotyka at lsil.com (Michael Motyka) Date: Wed, 9 Sep 1998 01:58:54 +0800 Subject: wired on y2k In-Reply-To: <199809080235.TAA23415@netcom13.netcom.com> Message-ID: <35F56F1A.652C@lsil.com> > Scott has decided > that the only real fix for the Y2K problem may be to pack up and move to > this patch of land 75 miles from his San Diego home. "In the next year or > so," he predicts, "the most common cocktail party chatter will be, 'What > are you doing to prepare for Y2K?' But by then, it will be too late." > Water? Met a reactor designer from Los Alamos once who lived in some super but isolated place in the Sangre De Christos. He had to drill some 3K ft for water. VERY EXPENSIVE. Ever seen the Peoples Broadcasting Service piece about the "Cadillac Desert"? Water is just another utility here. All automated. From whgiii at invweb.net Tue Sep 8 11:21:14 1998 From: whgiii at invweb.net (William H. Geiger III) Date: Wed, 9 Sep 1998 02:21:14 +0800 Subject: Citizenship silliness. Re: e$: crypto-expatriatism In-Reply-To: Message-ID: <199809081814.OAA17367@domains.invweb.net> -----BEGIN PGP SIGNED MESSAGE----- In , on 09/08/98 at 09:24 AM, Tim May said: >> >>Does anyone know of any countries with more reasonable gun laws than the >>US? I vaguely think Israel and Switzerland are better, at least for citizens. >>It is one of the major problems I have with Anguilla -- "guns are bad". >>I miss my M1A. >Don't automatically assume Israel is good for gun ownership. If you're an >untermenschen, a schwarzen, a sand nigger, an Arab, you can't legally own >a gun. Unless you're one of the Trustees, i.e., a deputized member of the >PLO's military or police. >The Chosen People are of course encouraged to have fully automatic >weapons. Yes Tim, we all know your anti-Israel position and your sympathy for the Palistinians even though they are in the position that they are due to their own actions. They started the war, got their asses beat and have been whining about it for the past 50 years. - -- - --------------------------------------------------------------- William H. Geiger III http://www.openpgp.net Geiger Consulting Cooking With Warp 4.0 Author of E-Secure - PGP Front End for MR/2 Ice PGP & MR/2 the only way for secure e-mail. OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html - --------------------------------------------------------------- Tag-O-Matic: OS/2...Opens up Windows, shuts up Gates. -----BEGIN PGP SIGNATURE----- Version: 2.6.3a-sha1 Charset: cp850 Comment: Registered_User_E-Secure_v1.1b1_ES000000 iQCVAwUBNfV1+o9Co1n+aLhhAQFYJQP+NKcHhRntStmWAukv9QuQ6rgoTrGihLjX MEHt9qxFtKbgFhtEMVBG6NufK/CxjPcKUj0RJpr2PTOTF2NQFsNRLP66lYk+FRRm RbLhXl3BixMZZyMNVDzCiG9cnlyHEWtKZMcUn8m3Kse7p91V+9Ld9KE/ZkJb5hyG xvvzah0MjTY= =+X7j -----END PGP SIGNATURE----- From ryan at systemics.ai Tue Sep 8 11:37:16 1998 From: ryan at systemics.ai (Ryan Lackey) Date: Wed, 9 Sep 1998 02:37:16 +0800 Subject: radio net Message-ID: Is anyone else interested in setting up a radio net (probably packet radio relay) to relay small quantities of data in the event the telecommunications infrastructure becomes unavailable (either technically or legally/politically/ militarily)? There are existing packet relay nets, but in my experience amateur radio people, especially in the US, are very willing to roll over for the government at the slightest cause. I think the cost would be something like $1-5k per station, and it could be done in a fairly turnkey fashion. Exactly how to handle routing and what protocol to use on the network is kind of an open question -- there are a lot of solutions, none of them optimal. From tcmay at got.net Tue Sep 8 11:44:24 1998 From: tcmay at got.net (Tim May) Date: Wed, 9 Sep 1998 02:44:24 +0800 Subject: Citizenship silliness. Re: e$: crypto-expatriatism In-Reply-To: Message-ID: At 11:19 AM -0700 9/8/98, William H. Geiger III wrote: >Yes Tim, we all know your anti-Israel position and your sympathy for the >Palistinians even though they are in the position that they are due to >their own actions. > >They started the war, got their asses beat and have been whining about it >for the past 50 years. We'll see who's whining after 2 million Zionists are consumed in the holy fire that sweeps through Haifa and Tel Aviv. Some Jews learned nothing from WWII. Ironic that our Cypherpunks technology, including remailers, will help the forces of liberation coordinate their attacks. On this point, Freeh and Reno are completely correct, as I have been saying for years. --Tim May "The tree of liberty must be watered periodically with the blood of tyrants...." ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Licensed Ontologist | black markets, collapse of governments. From ravage at einstein.ssz.com Tue Sep 8 12:22:45 1998 From: ravage at einstein.ssz.com (Jim Choate) Date: Wed, 9 Sep 1998 03:22:45 +0800 Subject: Best & Brightest Message-ID: <199809081935.OAA10317@einstein.ssz.com> Hi, Sorry it took so long to get back on this, but... I went and checked the book in the bookstore as I had a vague memory of reading it in high school. Yep, it's the same book I read in '74 in a government class. David Halberstam's "Best and Brightest" was an excellent book on the Vietnam War and the political wrangling that got us into it - *for 1972*. This book has never been updated and near as I can find nobody has taken the time to compare its line of argument and innuendo with the last 26 years of data that has come to light. In particular it makes no mention, and because of time travel limitations shouldn't be expected to, of the wealth of data on the Cuban Missile Crisis and the Vietnam Conflict that has come to light in the last 3 years because these classified materials weren't released yet. This material is available via the Kennedy Library and the LBJ Library. It includes internal memos and similar material that Halberstam did not have any knowledge of. Of paritcular note to the thesis that some espouse that Kennedy intended to increase the force level is a memo to the combined chiefs of staff to remove ALL US forces from SE Asia. This memo was signed just weeks before Kennedy was assassinated. Every indication is that LBJ would have honored that had the Ya Drang Valley (the 7th Cavalry almost had another Little Bighorn) not occurred in '64. After this tactical defeat (both US and Viet forces claimed it as a strategic win) the US level of forces in the area went through the roof. This book is good for a historical perspective only, if you're interested in understanding what happened from 1962 - 1963 with Kennedy and 1963+ with LBJ then this is not the book to go to. It is simply out of date. A general rule of thumb in doing historical research: If the reference is not a primary and it is over 5 years old and has not been updated then it is suspect. ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From ravage at einstein.ssz.com Tue Sep 8 12:53:11 1998 From: ravage at einstein.ssz.com (Jim Choate) Date: Wed, 9 Sep 1998 03:53:11 +0800 Subject: radio net (fwd) Message-ID: <199809082004.PAA10445@einstein.ssz.com> Forwarded message: > Subject: radio net > Date: Tue, 08 Sep 1998 14:29:53 -0400 > From: Ryan Lackey > Is anyone else interested in setting up a radio net (probably packet radio > relay) to relay small quantities of data in the event the telecommunications > infrastructure becomes unavailable (either technically or legally/politically/ > militarily)? There are existing packet relay nets, but in my experience > amateur radio people, especially in the US, are very willing to roll over > for the government at the slightest cause. > > I think the cost would be something like $1-5k per station, and it could > be done in a fairly turnkey fashion. Exactly how to handle routing and > what protocol to use on the network is kind of an open question -- there > are a lot of solutions, none of them optimal. What sort of use do you see it being put to? One or two stations wouldn't be worth the investment in money or time. Would it be some sort of private channel or the backbone of a more complex enterprise? Do you see it being a form of employment in the crash in that the operator could trade communications access for vittles and ammo? As to protocols, the standard IP packet software seems to work just fine (I think it's something like KA9Q or some such). I've used it twice and it worked like a champ. Are you proposing to get a license or would it be strictly underground until after the crash? ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From fisherm at tce.com Tue Sep 8 13:02:53 1998 From: fisherm at tce.com (Fisher Mark) Date: Wed, 9 Sep 1998 04:02:53 +0800 Subject: Zooko on JYA, cpunks, and surveillance (was: Re: Can't tell the kooks without a scorecard? Re: Monkey Wrenching the Echelon Engine) Message-ID: <2C396693FBDED111AEF60000F84104A721BFA5@indyexch_fddi.indy.tce.com> Zane Lewkowicz writes: >As far as i can tell, only people who >threaten feds with physical danger are getting busted. >Threatening feds with the possibility of a future society in >which their roles are obviated apparently doesn't work. This matches what I've seen. Mr. Bell made the big mistake of directly attacking the IRS (the mercaptan [sp?] attack). I've had some dealings with local government people on real estate issues (who have generally been reasonably helpful), and the set of people who like practical jokes has a (nearly?) null intersection with the set of people who go into government service. Especially when you do something to send people to the doctor because of chemical-induced vomiting... If Tim May gets picked up, I expect it to be a result of a Chinese Cultural Revolution-type action (all intellectuals, all programmers, all engineers, etc.). As long as Tim isn't entrapped, he is probably pretty safe from being picked up. However, there's going to be a lot of changes in the near future (e$, Y2K, Internet fall-out, biochemoelectronics, etc.), so I advise that everyone batten down the hatches -- we're in for a stormy ride into a [likely] glorious future. ========================================================== Mark Leighton Fisher Thomson Consumer Electronics fisherm at indy.tce.com Indianapolis, IN "Their walls are built of cannon balls, their motto is 'Don't Tread on Me'" From rdl at MIT.EDU Tue Sep 8 13:19:49 1998 From: rdl at MIT.EDU (Ryan Lackey) Date: Wed, 9 Sep 1998 04:19:49 +0800 Subject: Citizenship silliness. Re: e$: crypto-expatriatism Message-ID: > let us know if you find any places in the caribbean [which allow > sheeple to have real guns] AFAIK, none, unless you include "people who bribe the government of some of these countries" as "sheeple". International waters might work, if you can find a flag which allows you to keep weapons on your ship, which AFAIK is rare these days. Some of the independent non-BDTs like St. Kitts and Nevis, Antigua, etc. might be better for this than Anguilla. Anguilla has the benefit of being small and stable, such that you're less likely to need a gun. I seriously doubt if the 60 police officers on Anguilla could be organized to do a Waco-style offensive in any case. This isn't an ideal situation, but is pretty reasonable for now. Israel is *definitely* not on my "list of places I'd go to avoid trouble", no matter what kind of weaponry I were permitted by virtue of being non-Arab and Western. Tel Aviv being a political target for the Palestians, Jerusalem being a target with definite style points for others, and Armageddon having additional style points for the first private nuclear detonation -- three targets in one tiny country, oh joy. I'd feel safer in Washington DC. -- Ryan Lackey rdl at mit.edu http://sof.mit.edu/rdl/ From rwright at adnetsol.com Tue Sep 8 13:35:06 1998 From: rwright at adnetsol.com (Ross Wright) Date: Wed, 9 Sep 1998 04:35:06 +0800 Subject: (Fwd) Radio Activists March on DC, Oct 4 & 5 Message-ID: <199809082033.NAA28205@bsd.adnetsol.com> ------- Forwarded Message Follows ------- Date: Mon, 7 Sep 1998 06:48:58 -0700 (PDT) From: gregruggiero at earthlink.net (New York Free Media Alliance) Subject: Radio Activists March on DC, Oct 4 & 5 To: iaj-futuremedia at igc.org Dear Supporters of Community Media and Free Speech, You may be aware that the Federal Communications Commission has recently intensified it's assault on unlicensed micropower radio stations. In response to this campaign and the government's longstanding ban on low-power radio, a national movement has emerged to proliferate microbroadcasting, and win constitutional protection to broadcast at the community level. We invite you to show your support for community access to the airwaves. Join us in Washington, DC on Sunday, October 4 for a micropower radio conference, and on Monday October 5 for a march on FCC and NAB headquarters. Workshops & information will be offered on how to start a radio station and acquire the necessary equipment. Please pass this on to people who might be interested, especially those who don't have access to the internet. See you in Washington. Thanks, Greg Ruggiero New York Free Media Alliance http://artcon.rutgers.edu/papertiger/nyfma/ "Where there is even a pretense of democracy, communications are at its heart." --Noam Chomsky -------------------------------------------- SHOWDOWN AT THE FCC! FREE RADIO ACTIVISTS MARCH ON WASHINGTON TO CONFRONT THE GLOBAL MEDIA MONOPOLY AND THEIR MARIONETTES IN GOVERNMENT! Sunday, October 4, 1998 Monday, October 5, 1998 Washington, DC Calling all media activists, microbroadcasters and people for a democratic media: Come to DC for the first national mobilization for free radio. Microbroadcasters from around the country will gather for two days to share radio skills, organize alliances, speak out to the media and protest at the FCC and NAB buildings, culminating in a live broadcast straight into the offices of the people working so hard to shut us down. Free Radio Berkeley, Radio Mutiny, Steal This Radio and other microstations have all broadcast live in public and challenged the FCC to shut them down in the light of day, in front of the press and the Feds have never dared to show their face- this time, we're going to take it right to their doorstep and tell them that if they're so sure that their dumb law is worth enforcing, then the Chairman should come down from the 8th floor and put the cuffs on us himself. There will also be workshops to help new folks start stations, appointments will be made to lobby congress people, and press events will be held to show the true, diverse face of the microbroadcasting movement. Schedule Sunday, 10-12 workshops (to be announced) 12-1 lunch 1-3 workshops (to be announced) 3-5 speakout 5-6:30 dinner 7pm party/puppet making for demonstration Monday 10:30 am MARCH AND PUPPET PARADE starts at Dupont Circle, goes to the Federal Communications Commission building, and then marches on to confront the National Association of Broadcasters. During these protests, we will flip the giant free speech switches, turn on our transmitters and strike a blow against the meta-marionettes: A giant puppet of General Electric and Corporate America, which will in turn control a slightly smaller puppet of the National Association of Broadcasters, which in turn will operate a smaller puppet of the FCC, which in turn will be trying to stamp out microbroadcasters and our free speech rights. These demonstrations will also include a number of sneaky surprises that are so cool that we can't even mention them here! 1:30pm meetings set up with people's congressional representatives for lobbying 4pm press event: What Can a Black Panther, a Free Market Think Tank Policy Analyst, an Anarchist Feminist, A Radio Engineer, A Public Health Worker and a Discount Store Owner Agree Upon? IT'S TIME TO LEGALIZE MICROBROADCASTING! So what's YOUR excuse not to come to the most excellent weekend of mayhem ever? Nothing. Then good- we'll see you there. Bring a sleeping bag, cameras and recording devices, vehicles, some money to help this all come off, questions for the experts on pirate station operations, puppet materials, signs and banners, transmitters, AND ALL OF YOUR FRIENDS! contact info: email: petetridish at hotmail.com phone:Pete tri Dish 215-474-6459 or Amanda at 202-518-5644 p.o.box 179, College Park, MD 20741-0179 ************************************************** NEW YORK Media for Change <<< FREE MEDIA >>> Changing the Media ALLIANCE listserve: nyfreemedia at tao.ca voicemail: (212) 969-8636 website: http://artcon.rutgers.edu/papertiger/nyfma ************************************************** =-=-=-=-=-=- Ross Wright King Media: Bulk Sales of Software Media and Duplication Services http://ross.adnetsol.com Voice: (408) 259-2795 From tcmay at got.net Tue Sep 8 14:35:36 1998 From: tcmay at got.net (Tim May) Date: Wed, 9 Sep 1998 05:35:36 +0800 Subject: Cypher Freedom Fighters In-Reply-To: <2C396693FBDED111AEF60000F84104A721BFA5@indyexch_fddi.indy.tce.com> Message-ID: (I've changed the thread title to something simple, replacing the "RE: Zooko on JYA, cpunks, and surveillance (was: Re: Can't tell the kooks without a scorecard? Re: Monkey Wrenching the Echelon Engine)" title.) At 11:56 AM -0700 9/8/98, Fisher Mark wrote: >Zane Lewkowicz writes: >>As far as i can tell, only people who >>threaten feds with physical danger are getting busted. >>Threatening feds with the possibility of a future society in >>which their roles are obviated apparently doesn't work. > >This matches what I've seen. Mr. Bell made the big mistake of directly >attacking the IRS (the mercaptan [sp?] attack). I've had some dealings with >local government people on real estate issues (who have generally been >reasonably helpful), and the set of people who like practical jokes has a >(nearly?) null intersection with the set of people who go into government >service. Especially when you do something to send people to the doctor >because of chemical-induced vomiting... Ditto in spade for me. To wit, if I caught someone dumping mercaptin under my door I'd likely be so enraged I'd empty a clip into him right then and there...and I'd consider myself justified. Bell "crossed the line" into committing prosecutable offenses in more than just the alleged mercaptin attack. There was also the matter of working under multiple faked Social Security numbers. (No, I'm not saying this was immoral. Just illegal. And those who do the crime should not be surprised to have to do the time.) The issue of whether he threatened IRS officials at their home by having their home addresses is unproven to me. Compiling such lists is perfectly legal. The metal chaff he supposedly wanted to drop down an IRS building airshaft...well, it seems unworkable. And, as many of us have noted, their is zero chance a working AP system was deployed, absent several of the building blocks. So AP could not in itself have been a threat. But clearly his AP literature aroused much interest by various arms of law enforcement. And once arouse, they pretty much had to find something to get him on. His earlier conviction or plea on chemical and/or drug charges meant they were looking for chemicals. And they found them. Plus, recall that Bell bragged to his friends that he'd gotten revenge against a lawyer he didn't like, and against the IRS. >If Tim May gets picked up, I expect it to be a result of a Chinese Cultural >Revolution-type action (all intellectuals, all programmers, all engineers, >etc.). As long as Tim isn't entrapped, he is probably pretty safe from >being picked up. However, there's going to be a lot of changes in the near >future (e$, Y2K, Internet fall-out, biochemoelectronics, etc.), so I advise >that everyone batten down the hatches -- we're in for a stormy ride into a >[likely] glorious future. I don't hide my political views, nor my support of various interesting technologies. My actions are fully protected by the Bill of Rights, even if various unconstitutional restrictions on mys speech and funding habits have been recently passed. I expect the chickens to come home to roost...meaning, some nerve gas or biological attacks on government, the nuking of at least one major city, and possibly the driving of the Zionists into the sea (figuratively speaking, as more literally they'll probably be hacked to death by Arabs, gassed by neighboring states, and possibly incinerated with ex-Soviet nukes). Chickens coming home to roost. The patriot movement in the U.S. is gaining strength every day, though it is going to ground. (Which makes strong crypto tools much more interesting and important to them.) I expect they may strike at various targets as Y2K unfolds. It is a glorious thing for our technologies to be spreading into the hands of those who can do so much. --Tim May "The tree of liberty must be watered periodically with the blood of tyrants...." ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Licensed Ontologist | black markets, collapse of governments. From whgiii at invweb.net Tue Sep 8 15:36:25 1998 From: whgiii at invweb.net (William H. Geiger III) Date: Wed, 9 Sep 1998 06:36:25 +0800 Subject: Citizenship silliness. Re: e$: crypto-expatriatism In-Reply-To: Message-ID: <199809082230.SAA21185@domains.invweb.net> -----BEGIN PGP SIGNED MESSAGE----- In , on 09/08/98 at 11:41 AM, Tim May said: >>Yes Tim, we all know your anti-Israel position and your sympathy for the >>Palistinians even though they are in the position that they are due to >>their own actions. >> >>They started the war, got their asses beat and have been whining about it >>for the past 50 years. >We'll see who's whining after 2 million Zionists are consumed in the holy >fire that sweeps through Haifa and Tel Aviv. While you may gleefully look forward to such a day, need I remind you that it will be more than the Jews that go up in flames. Israel has a nice little stockpile of weapons and are not shy about using them. Any major attack against Israel is liable to cause the entire Middle East turned into one large glass bowl. More than likely Israel will make use of a pre-emptive strike before anyone gets close to finishing their weapons let alone launching them (I was there when Israel launched their attack against the Iraq Breeder Reactor the French were so kind to build for them). >Some Jews learned nothing from WWII. Actually they learned quite a bit. They will *never* be herded into cattle cars and shipped off to the gas chambers again. They may eventually fall to the forces of darkness but they will do so fighting. >Ironic that our Cypherpunks technology, including remailers, will help >the forces of liberation coordinate their attacks. On this point, Freeh >and Reno are completely correct, as I have been saying for years. forces of liberation? Lets see, Jews emigrate to Trans-Jordan, *buy* land from the arabs living there, and live peaceably. The British decide to divide up this area between Jordan, Palestine, and Israel. The Grand Mufti declares a "holy war" against the Jews in which the Palestinians and several neighboring countries join. The Arabs loose, the Jews win. They continue this war for the next 50 years with various periods of cease-fire. Every time they loose. What the Arabs have attempted to do is finish the job the Nazi's started. Only the Jews are not going to go down without a fight. The continuing conflict in the Middle East has not been a battle of liberation but a war of ethnic cleansing and extermination against the Jews. - -- - --------------------------------------------------------------- William H. Geiger III http://www.openpgp.net Geiger Consulting Cooking With Warp 4.0 Author of E-Secure - PGP Front End for MR/2 Ice PGP & MR/2 the only way for secure e-mail. OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html - --------------------------------------------------------------- Tag-O-Matic: One man's Windows are another man's walls. -----BEGIN PGP SIGNATURE----- Version: 2.6.3a-sha1 Charset: cp850 Comment: Registered_User_E-Secure_v1.1b1_ES000000 iQCVAwUBNfWx2I9Co1n+aLhhAQFfswP+LOQ1zJfGKfIoIO1AcKpWumaMSoO9xheA dY40gRUN8QDhhMqBMND7vGnU2UMDZ2yQXoGjIPl1W/NgevZdFcVrj195Hb1XCO7b 7+lxbO670vFeA40NCGs3JqnNk2KpzyCSLl9QJRlxd7a/yxseJ0Lei8KEXbJ5E/SV C96AeJpygTU= =far2 -----END PGP SIGNATURE----- From kamikaze23 at juno.com Tue Sep 8 15:37:43 1998 From: kamikaze23 at juno.com (M I T) Date: Wed, 9 Sep 1998 06:37:43 +0800 Subject: Any good hacking sites? Message-ID: <19980908.182213.2926.0.kamikaze23@juno.com> hey all, any1 know of any good hacking sites that teach u the basics and stuff? also, any1 here into AOL hacking??? thanx, ~Fallen Angel _____________________________________________________________________ You don't need to buy Internet access to use free Internet e-mail. Get completely free e-mail from Juno at http://www.juno.com Or call Juno at (800) 654-JUNO [654-5866] From petro at playboy.com Tue Sep 8 15:55:41 1998 From: petro at playboy.com (Petro) Date: Wed, 9 Sep 1998 06:55:41 +0800 Subject: Citizenship silliness. Re: e$: crypto-expatriatism In-Reply-To: Message-ID: At 1:19 PM -0500 9/8/98, William H. Geiger III wrote: >-----BEGIN PGP SIGNED MESSAGE----- > >In , on 09/08/98 > at 09:24 AM, Tim May said: > >>> >>>Does anyone know of any countries with more reasonable gun laws than the >>>US? I vaguely think Israel and Switzerland are better, at least for >>>citizens. >>>It is one of the major problems I have with Anguilla -- "guns are bad". >>>I miss my M1A. > >>Don't automatically assume Israel is good for gun ownership. If you're an >>untermenschen, a schwarzen, a sand nigger, an Arab, you can't legally own >>a gun. Unless you're one of the Trustees, i.e., a deputized member of the >>PLO's military or police. > >>The Chosen People are of course encouraged to have fully automatic >>weapons. > >Yes Tim, we all know your anti-Israel position and your sympathy for the >Palistinians even though they are in the position that they are due to >their own actions. > >They started the war, got their asses beat and have been whining about it >for the past 50 years. Crap, the U.N. (what was that about "United?") started the shit when they ham-fisted decided that the "homeland" the "Jews" needed was land considered holy by the Moslems AND Christians, and ignored the fact that the jews were just as racist and bigoted as a group as the Kikes that had been trying to cook them. Israel was a DUMB idea, like mixing Nitric acid and Glycerol in a blender. Anyone who thought it wouldn't end in violence was a total fool, anyone who thinks that the Powers That Be want it cool down is a bigger fool. petro at playboy.com----for work related issues. I don't speak for Playboy. petro at bounty.org-----for everthing else. They wouldn't like that. They REALLY Economic speech IS political speech. wouldn't like that. From honig at sprynet.com Tue Sep 8 15:56:14 1998 From: honig at sprynet.com (David Honig) Date: Wed, 9 Sep 1998 06:56:14 +0800 Subject: No Subject Message-ID: <3.0.5.32.19980908153726.00816100@m7.sprynet.com> When the American government eventually reveals the [full range of] reconnaissance systems developed by this nation, the public will learn of space achievements every bit as impressive as the Apollo Moon landings. http://www.nro.odci.gov/speeches/grab-698.html Prepared Remarks at the Naval Research Laboratory 75th Anniversary Event By Mr. Keith Hall, Director of the National Reconnaissance Office 17 June 1998 From aba at dcs.ex.ac.uk Tue Sep 8 16:12:23 1998 From: aba at dcs.ex.ac.uk (Adam Back) Date: Wed, 9 Sep 1998 07:12:23 +0800 Subject: Toto, AP and Jim Bell? (Re: Space Aliens Return my Drugs!) In-Reply-To: <199809050903.KAA02997@server.eternity.org> Message-ID: <199809082055.VAA14004@server.eternity.org> Recently I speculated that Toto may have been locked up due to some connection with Jim Bell: I wrote: > I've been searching my cp archives trying to figure out if there has > been any connection between Toto and Jim Bell/AP, as Alia Johnson > said that she thought Toto was locked up due to posts about AP. someone who has been in contact with Jim Bell tells me that Jim did not know Toto. Adam From ravage at EINSTEIN.ssz.com Tue Sep 8 16:18:18 1998 From: ravage at EINSTEIN.ssz.com (Jim Choate) Date: Wed, 9 Sep 1998 07:18:18 +0800 Subject: Doing nothing wrong... Message-ID: <199809082334.SAA11809@einstein.ssz.com> It occurred to me that a great comeback to: If you don't have anything to hide you shouldn't mind being monitored by the police. To which the responce should be: Ok, since the police don't have anything to hide they shouldn't mind being monitored by the citizens. ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From lazlototh at hempseed.com Tue Sep 8 16:20:58 1998 From: lazlototh at hempseed.com (Lazlo Toth) Date: Wed, 9 Sep 1998 07:20:58 +0800 Subject: Mitnick wants cyphertext; gov't wants keys Message-ID: >http://www.wired.com/news/print_version/politics/story/14855.html > >Wired News: >Hacker Can't Get Access >By Arik Hesseldahl > >8:35pm 4.Sep.98.PDT > >The epic legal wrangling in the Kevin Mitnick case took a new turn last >week when the accused hacker lost an appeal to access certain encrypted >data that his attorneys say could help him. >The data, seized by the FBI from Mitnick's computer when he was arrested in >1995, could contain evidence that could prove him innocent of some of the >charges against him, according to his defense. >In its encrypted form, the data is useless to prosecutors, who may have >tried to decode it and failed, said Donald C. Randolph, the Santa Monica, >California, attorney defending Mitnick. >.... >"We told the judge that giving him access to those files was like giving >someone access to a locked safe that might contain a gun," Painter said. >"[Mitnick's attorneys] claimed in court that the data might contain >exculpatory evidence but offered no further explanation." >Greg Vincent, Randolph's associate on the case, said that under federal >rules, Mitnick should be given access to all the evidence against him, and >that by denying such access, the government is opening itself up to losing >an appeal should Mitnick be convicted. >Vincent also said the government was willing to give access to the >encrypted files, provided that Mitnick hand over the password. This, said >Vincent, would violate Mitnick's Fifth Amendment rights against >self-incrimination. >Painter confirmed that the files had not been decrypted by the government. From petro at playboy.com Tue Sep 8 16:32:19 1998 From: petro at playboy.com (Petro) Date: Wed, 9 Sep 1998 07:32:19 +0800 Subject: Citizenship silliness. Re: e$: crypto-expatriatism In-Reply-To: Message-ID: At 2:44 PM -0500 9/8/98, William H. Geiger III wrote: >What the Arabs have attempted to do is finish the job the Nazi's started. Bullshit. I don't care much for palestinians, mostly for cultural reasons, but they were, in the begininging not interested in killing every jew in the world, they may not have liked the Northern European Jews, but from what I've seen, there wasn't any love lost the other way. Personally, I hope they BOTH nuke each other off the god damn planet and take all that fucking oil with them. >Only the Jews are not going to go down without a fight. The continuing >conflict in the Middle East has not been a battle of liberation but a war >of ethnic cleansing and extermination against the Jews. No, more like a get off our fucking land. petro at playboy.com----for work related issues. I don't speak for Playboy. petro at bounty.org-----for everthing else. They wouldn't like that. They REALLY Economic speech IS political speech. wouldn't like that. From ravage at EINSTEIN.ssz.com Tue Sep 8 16:44:41 1998 From: ravage at EINSTEIN.ssz.com (Jim Choate) Date: Wed, 9 Sep 1998 07:44:41 +0800 Subject: Citizenship silliness. Re: e$: crypto-expatriatism (fwd) Message-ID: <199809082359.SAA12044@einstein.ssz.com> Forwarded message: > Date: Tue, 8 Sep 1998 18:17:45 -0500 > From: Petro > Subject: Re: Citizenship silliness. Re: e$: crypto-expatriatism > planet and take all that fucking oil with them. I wonder how the new realization that the calthrate deposits in the ocean bottem off the continental shelf make fine fuel and it's replenishable and may be of a larger quantity than the oil reserves will effect the power balance. ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From jya at pipeline.com Tue Sep 8 17:02:45 1998 From: jya at pipeline.com (John Young) Date: Wed, 9 Sep 1998 08:02:45 +0800 Subject: Carl Johnson Warrant and Complaint Message-ID: <199809082346.TAA31245@camel8.mindspring.com> Thanks to anonymous we offer the arrest warrant and complaint against Carl Edward Johnson: http://jya.com/usa-v-cej-wc.htm (23K) List Cypherpunks is spotlighted by the IRS complainant, Jeff Gordon, who made Jim Bell famous. The list is quoted, logged, tracked, and cited for its hosting alleged death threat messages against federal officials, which were PGP-authenticated and -decoded, and their style and content assessed for identity of the author, along with other allegations by the RCMP on what Carl may or may not have done up north and by the Secret Service on Carl may or may not have said out west. We have also been told that Carl is known as "The King of Country Porn" among admiring fans of his music. Whether this has anything to do with the little-known person we're seeking information about is a mystery. From ravage at EINSTEIN.ssz.com Tue Sep 8 17:06:42 1998 From: ravage at EINSTEIN.ssz.com (Jim Choate) Date: Wed, 9 Sep 1998 08:06:42 +0800 Subject: Spelling error... Message-ID: <199809090019.TAA12278@einstein.ssz.com> Hi, It's clathrate, not calthrate... Sorry. ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From ravage at EINSTEIN.ssz.com Tue Sep 8 17:40:57 1998 From: ravage at EINSTEIN.ssz.com (Jim Choate) Date: Wed, 9 Sep 1998 08:40:57 +0800 Subject: usa-v-cej-wc.htm (fwd) Message-ID: <199809090053.TAA12423@einstein.ssz.com> Notice: mucho text deleted. Forwarded message: > X-within-URL: http://jya.com/usa-v-cej-wc.htm > criminal threats to kill, injure, obstruct, impede, threaten and > intimidate IRS > and other Government employees. I have also conducted numerous > investigations involving the use of computers and the Internet. Since > Western District of Washington. In the investigation of Mr. Bell, it > was discovered that he had posted a plan (titled "Assassination > Politics") on the Internet, offering users of the Internet a method > for anonymously funding the assassinations of IRS and other Government > Internet group known as the "Cypherpunks." During the investigation of This guy has experience with the Internet and doesn't know the difference between a group and a mailing list, what a maroon. > Bell I noted that Bell exchanged both private and public e-mail > messages with an unidentified person using the name "Toto." Implying Bell was under surveillance. > residence. Shortly thereafter, a member of the Cypherpunks group > stated via the Internet that he had obtained a copy of the warrant and > return, and publicly posted them on the Internet. And the point is? > Bell was arrested and charged with Corruptly Obstructing and Impeding So I can non-corruptly obstruct and impede? > 4. On June 23, 1997, an anonymous message was posted to the > Cypherpunks Internet mailing list. [A "mailing list" consists of the Well, finaly got the terms right. > 5. Based on my training and experience, I know that "Bot" is a slang > term for an automated computer program. I also know that "e$" and > "eCa$h" are slang terms for electronic or digital cash, which was a ... > maker or indorser [as written]. [By analogy, digital cash is like a > digital "poker chip" issued by a particular casino.] Oh well, I knew he couldn't keep it straight. > 6. On September 4, 1997, a second message involving "Dead Lucky" was > anonymously posted to the Cypherpunks group. This message stated in This guy keeps using 'group' instead of 'mailing list', there is the potential implication of conspiracy here...I wouldn't be surprised if just about all of us weren't under surveillance at this point. > 8. On December 9, 1997, an anonymous message was posted to the > Cypherpunks Internet mail group with the subject listed as "Encrypted > InterNet DEATH THREAT!!! / ATTN: Ninth District Judges / PASSWORD: > sog"[.] The body of the message was encrypted with the publicly > available encryption software PGP, and was initially unreadable. Using > PGP software and the password shown in the subject line of the > message, I was able to decrypt the message, which contained a > rambling, five-page statement, including the following: > I can also be tied into Jim Bell's Worldwide Conspiracy to > assassinate government authorities, through my implementation of an > Assassination Bot ..." See I told you there was a conspiracy buried in there somewhere! > 9. I noted that this message contained a PGP digital signature. From > my training and experience, I am aware that this digital signature is > used as a way to authenticate digital documents to make sure that they > are authored by the purported author and that no one has tampered with > them. When I checked the signature using only PGP software, the PGP > program was unable to identify it. > Only July 1, 1998, Royal Canadian > Mounted Police (RCMP) Investigator Steve Foster provided me with a PGP > "Secret Key Ring" which he stated he had obtained from a computer > which Canadian Customs authorities had seized from an individual by > the name of CARL EDWARD JOHNSON. [A "secret key ring" is a > user-generated code which allows for the encryption (and later > authentication) of computer-generated documents.] When I checked the > digital signature on the Internet death threat using the PGP software > and JOHNSON'S secret key ring, the computer identified the signature > as one of the signature keys stored in JOHNSON'S computer. Because > both the "private" and "public" portions of the "key" were stored on > JOHNSON'S computer, the message can be authenticated as having been > generated by the person who possessed this "secret key" and knew the > correct password. In other words, only the person possessing the > secret key found on JOHNSON'S computer could have generated the "death > threat" message. > 10. I have also spoken by phone with Special Agent Jeremy Sheridan of > the United States Secret Service. Sheridan told me that on July 31, > 1998, he located and interviewed Carl JOHNSON at 1800 West Magee, in > Tucson, Arizona. The address belongs to a Linda Reed, who, according > to Canadian police authorities, is a friend of JOHNSON'S. During this > interview JOHNSON admitted that he often wrote on the Internet and > among the names he used were Toto, C.J. Parker, and TruthMonger. > Johnson also stated that he had been using the Internet account of > Linda Reed. Sheridan showed JOHNSON a decrypted copy of the December > 9, 1997 Internet message entitled "Encrypted InterNet DEATH THREAT!!! > / ATTN: Ninth district Court Judges / PASSWORD: sog." JOHNSON > acknowledge that he wrote it. JOHNSON also stated that he had > significant psychological problems. Probably not a wise move, don't know about psychological problems but it certainly demonstrates a lack of intelligence. > bomb that was discovered in the basement of the Estevan courthouse on > June 3, 1998. Block advised me that Carl JOHNSON has been formally > charged with placing the bomb and that a warrant for his arrest has > been issued in Canada. Block advised me that he believes that JOHNSON > fled to the United States after placing the bomb in the Estevan > courthouse. That's impressive if true. > 15. On June 10, 1998, an anonymous message was posted to the > Cypherpunks Internet group. In the message, it is stated that the > bomber "placed the bomb before embarking on a middle-leg of the So that's why he came to Austin? ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From bbt at mudspring.uplb.edu.ph Tue Sep 8 18:12:07 1998 From: bbt at mudspring.uplb.edu.ph (Bernardo B. Terrado) Date: Wed, 9 Sep 1998 09:12:07 +0800 Subject: interchange... In-Reply-To: <896C7C3540C3D111AB9F00805FA78CE2013F83CA@MSX11002> Message-ID: I will be interchanging the meaning of cryptography with encryption, will this be alright or will it only confuse my listeners? Thank you. It's me Bernie. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Some people they might say that I'm hard to get to know. I go my own sweet way, well that maybe so. Something about the crowd that makes me walk alone. I never had a need in me to be the party's life and soul. metaphone at altavista.net `````````````````````````````````````````````````````````````````````````````` From WGKOPP at aol.com Tue Sep 8 18:39:15 1998 From: WGKOPP at aol.com (WGKOPP at aol.com) Date: Wed, 9 Sep 1998 09:39:15 +0800 Subject: Movie/Research Research Message-ID: <22a37099.35f5db02@aol.com> Hi, I'm a screenwriter in Los Angeles and I'm currently working on a psychological thriller. I'm trying to research how a particular thing could be done, and I cannot seem to find precisely what I'm looking for. You are surely highly learned individual, and I wonder if I could pick your brains for a moment. Here is the situation I need help with:- The "villians" are charging people $15 (from their credit card - or another source) to download or "watch" a video clip of highly illicit material, from a specific website. Our "protagonist" has to stop these "video's" and the people behind them, but, they cannot seem to trace them, or where the funds are going. How can this be done? How can we realistically make it so that origins and/or location & authors of the website are untraceable. Also, that the funds are untraceable. The only way our protagonist can find the villains, is by revealing a terrible secret from his past, something he's tried desperately to forget and put behind him. He eventually does catch the villains, but not electronically. He catches them, by reliving his painful past. Do you have any idea's? If so, I'd be most grateful if you could share them with me. Once the screenplay is completed and hopefully sold, I'm sure the very least I could offer is a film credit. Yours, Wayne Kopping From vznuri at netcom.com Tue Sep 8 18:44:03 1998 From: vznuri at netcom.com (Vladimir Z. Nuri) Date: Wed, 9 Sep 1998 09:44:03 +0800 Subject: internet monitoring, UK Message-ID: <199809090136.SAA14290@netcom13.netcom.com> ------- Forwarded Message From: "ama-gi ISPI" To: Subject: IP: ISPI Clips 4.25:UK Police May Soon Tap Your Email & Internet Use At Will Date: Tue, 8 Sep 1998 01:16:50 -0700 ISPI Clips 4.25:UK Police May Soon Tap Your Email & Internet Use At Will News & Info from the Institute for the Study of Privacy Issues (ISPI) Tuesday September 8, 1998 ISPI4Privacy at ama-gi.com ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ This From: The Independent Network, Monday September 7, 1998 http://www.independent.co.uk The PC in your mailbox: The police may soon be allowed to read your email and check your Internet use at will. http://www.independent.co.uk/net/980907ne/index.html By Paul Lavin When you drop an envelope in a red pillar-box, you walk away confident that your mail will not be read by anyone except the addressee. However, when you send an email, it might be wise to reflect on the differences. According to the organisation Internet Freedom, an agreement being negotiated between the UK's internet service providers (ISPs) and the police will open the email of the UK's eight million Internet users to scrutiny without debate in Parliament or oversight by the courts or the Home Secretary. British police are said to be close to reaching an agreement with ISPs that will enable them to monitor customers' emails and web usage logs. Chris Ellison of Internet Freedom, says: "Following a series of meetings between the Association of Chief Police Officers (ACPO) and Internet industry representatives, we understand that both groups have stated a willingness to reach a 'memorandum of understanding' about implementing police access to private data held by ISPs." According to David Kennedy, chairman of the Internet Service Providers Association, that is a serious overstatement of the discussions. However, he admits that the UK's ISPs are trying to avoid being flooded by court orders or having the police cart off critical servers for evidence. He says: "We are talking to law enforcement representatives to find a way to work with them within the legal framework that exists. All members of our association take the view that emails are private." As with the understanding between the Metropolitan Police and the ISPs over "banned" Usenet newsgroups and the closing down of web sites that may breach the law, the significance of such an agreement is that any such police activity may not be subjected to judicial review or legal constraint. Detective Chief Superintendent Keith Ackerman, chairman of the ACPO's computing crimes sub-committee, says: "We want to ensure the criminal doesn't take best advantage of the Internet, without requiring the Government to use the sledgehammer of regulation. However, we are not looking for the ability to go on fishing expeditions." The ISPs know that they are stuck in the middle, according to Keith Mitchell, chairman of Linx, a partnership of large ISPs. He says: "To divulge private email even under duress would be commercial suicide for an ISP. In some circumstances it would constitute a crime." Nonetheless, mistakes happen and there are well-known cases where the police have been persuasive. Mitchell says: "The current laws do not adequately protect ISPs or private individuals. We will be active in seeking responsive changes from Parliament." While there are undoubtedly individuals who use the Internet's email and worldwide web for nefarious purposes, the vast majority of people who use email and the web for personal and business communications have an expectation of privacy. And law-abiding citizens who wholeheartedly support the goals of law enforcement agencies may nevertheless feel uneasy about giving them carte blanche over email. America Online has been quite vocal in its opposition to opening the doors to the police short of a court order. Many ISPs agree. Julie Hatch, marketing communications director of Easynet, says:"We do not allow anyone to access our customers' email without a court order. "It makes no difference if it is an estranged wife or a suspicious business partner or anyone else, we would not divulge a subscriber's private email unless we were presented with a court order. This is in accordance with our terms and conditions. "Our business is also subject to restrictions imposed by the Data Protection Act (DPA), and in any situation we would certainly abide by those rules. So unless a subscriber's actions are illegal, you can say that email is confidential." The DPA provides scanty protection to email users, however. While the Act has aspects that protect the quality and use of information held in computer systems, disclosure can be afforded by a compliant ISP by simply including appropriate language in the small print of their terms and conditions. Data may be revealed to law enforcement officials as long as the subscriber is notified. Easynet's assurances highlight the differences between ISPs that are classified as telecoms providers, protected from feeling the long arm of the law by a regulatory framework, and those that are merely private businesses unaccountable to anyone but their owners and governed solely by their contracts with subscribers. As well as Easynet, UK ISPs that are regulated as telecoms providers include BT Internet and Demon, which is now part of Scottish Telecom. Smaller ISPs are more vulnerable to the persuasive demands of the police.They have no legally protected right of privacy and any redress for email disclosure would only be for breach of contract. Furthermore, most ISPs now include in their terms and conditions a requirement that the subscriber bear the expense of any legal costs resulting from their use of the service. This could lead to a complaining subscriber having to bear the costs of both sides of a lawsuit against an ISP even if they won. The most serious aspect of this potential agreement between the police and ISPS is, according to critics, the absence of legal safeguards. In order to tap telephones, the police need the permission of the Home Secretary and must justify violating the privacy of a suspect. It is not clear from the law whether tapping a telephone and tapping into an email exchange are the same thing. Chris Ellison says: "This is what is so dangerous about the new culture of private regulation and moral responsibility. ISPs now operate in a moral climate which insists on limitations for freedom of speech. Any material that causes offence - especially to children and ethnic minorities - is regularly removed. ISPs have now embraced this self-censorship credo and are willing to set themselves up as moral arbiters of internet content, filtering out anything that they feel may be illegal." Without public debate or scrutiny by Parliament, the police are likely to gain, as Liz Parratt from the organisation Liberty puts it, "a snoopers' charter for the Internet". Ordinary users will have little legal protection or redress against police monitoring of their communications. This trend could render the Internet less private and more regulated than any other communications medium. "If nothing else, these discussions have demonstrated what self-regulation really means: ISPs undertaking the role of publicly unaccountable instruments of law enforcement." Email is not like a letter in an envelope; it is more like a postcard. Just as you would not put some messages on a postcard, you should think before you use email for your most private communications. While the legality and desirability of the any agreement between ACPO and the ISPs is highly debatable, anyone interested in maintaining their privacy on the Internet must take responsibility for their own actions. The agreement between ACPO and ISPs will be the subject of three seminars: 22 September in Edinburgh, 8 October in London and 27 October in Manchester. Additional details can be found at http://www.linx.net/misc/acposeminar.html . - --------------------------------NOTICE:------------------------------ ISPI Clips are news & opinion articles on privacy issues from all points of view; they are clipped from local, national and international newspapers, journals and magazines, etc. Inclusion as an ISPI Clip does not necessarily reflect an endorsement of the content or opinion by ISPI. In compliance with Title 17 U.S.C. section 107, this material is distributed free without profit or payment for non-profit research and educational purposes only. - --------------------------------------------------------------------------- ISPI Clips is a FREE e-mail service from the "Institute for the Study of Privacy Issues" (ISPI). To receive "ISPI Clips" on a daily bases (approx. 4 - 8 clips per day) send the following message "Please enter [Your Name] into the ISPI Clips list: [Your e-mail address]" to: ISPIClips at ama-gi.com . The Institute for the Study of Privacy Issues (ISPI) is a small contributor-funded organization based in Victoria, British Columbia (Canada). ISPI operates on a not-for-profit basis, accepts no government funding and takes a global perspective. ISPI's mandate is to conduct & promote interdisciplinary research into electronic, personal and financial privacy with a view toward helping ordinary people understand the degree of privacy they have with respect to government, industry and each other and to likewise inform them about techniques to enhance their privacy. But, none of this can be accomplished without your kind and generous financial support. If you value in the ISPI Clips service or if you are concerned about the erosion of your privacy in general, won't you please help us continue this important work by becoming an "ISPI Clips Supporter" or by taking out an institute Membership? We gratefully accept all contributions: Less than $60 ISPI Clips Supporter $60 - $99 Primary ISPI Membership (1 year) $100 - $300 Senior ISPI Membership (2 years) More than $300 Executive Council Membership (life) Your ISPI "membership" contribution entitles you to receive "The ISPI Privacy Reporter" (our bi-monthly 12 page hard-copy newsletter in multi-contributor format) for the duration of your membership. For a contribution form with postal instructions please send the following message "ISPI Contribution Form" to ISPI4Privacy at ama-gi.com . We maintain a strict privacy policy. Any information you divulge to ISPI is kept in strict confidence. It will not be sold, lent or given away to any third party. ********************************************** To subscribe or unsubscribe, email: majordomo at majordomo.pobox.com with the message: (un)subscribe ignition-point email at address ********************************************** www.telepath.com/believer ********************************************** ------- End of Forwarded Message From ravage at EINSTEIN.ssz.com Tue Sep 8 18:45:09 1998 From: ravage at EINSTEIN.ssz.com (Jim Choate) Date: Wed, 9 Sep 1998 09:45:09 +0800 Subject: Movie/Research Research (fwd) Message-ID: <199809090201.VAA12886@einstein.ssz.com> Forwarded message: > From: WGKOPP at aol.com > Date: Tue, 8 Sep 1998 21:33:54 EDT > Subject: Movie/Research Research > The "villians" are charging people $15 (from their credit card - or another > source) to download or "watch" a video clip of highly illicit material, from > a specific website. > Our "protagonist" has to stop these "video's" and the people behind them, but, > they cannot seem to trace them, or where the funds are going. > > How can this be done? How can we realistically make it so that origins and/or > location & authors of the website are untraceable. Also, that the funds are > untraceable. You'd need to use something like an eternity server or a data haven. These allow one to obtain information from an unknown 3rd party based on a distributed network of servers and search engines. All transactions of e$ would need to go through an anonymous remailer of some sort that interfaced to a suitable bank handlding EFT's via the Internet. The web surfing could be implimented via a CROWDS style mechanism. ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From demona at demona.doldrums.dyn.ml.org Tue Sep 8 18:46:09 1998 From: demona at demona.doldrums.dyn.ml.org (demona at demona.doldrums.dyn.ml.org) Date: Wed, 9 Sep 1998 09:46:09 +0800 Subject: (fwd) ppdd - encrypted filesystem - kernel patch and support progs. Message-ID: <199809082143.RAA01758@demona.doldrums.dyn.ml.org> -- forwarded message -- Path: nntp.net-link.net!ptdnetP!newsgate.ptd.net!newsfeed.fast.net!howland.erols.net!newsfeed1.telenordia.se!newsfeed1.funet.fi!news.helsinki.fi!not-for-mail From: Allan Latham Newsgroups: comp.os.linux.announce Subject: ppdd - encrypted filesystem - kernel patch and support progs. Followup-To: comp.os.linux.misc Date: Tue, 8 Sep 1998 08:38:12 GMT Organization: Flexsys Lines: 48 Approved: linux-announce at news.ornl.gov (Mikko Rauhala) Message-ID: Reply-To: alatham at flexsys-group.com NNTP-Posting-Host: laulujoutsen.pc.helsinki.fi Old-Date: Sat, 05 Sep 1998 14:43:19 +0200 X-No-Archive: yes X-Auth: PGPMoose V1.1 PGP comp.os.linux.announce iQCVAgUBNfTs+lrUI/eHXJZ5AQEL7QQAm4TJb/hig4GSK4jpwd2PhuA8IKynybEF L+5ki9aYooX3Je/LdyvHVeg9kFL0IM8qdYNK01W6jJDqscoM4Hlp8KstxmpIDn1v OTBF9AbX4HQKUKO3J1UcNn+J89WZN/lmSB9lcgnJ6YAaKWpAYPVUFaoOoTPgHTg4 ITpeWxe/v9s= =w014 Xref: nntp.net-link.net comp.os.linux.announce:1426 -----BEGIN PGP SIGNED MESSAGE----- ppdd is an advanced encrypted file system for i386 Linux only. It is used in a similar way to the loop device and offers simplicity and speed plus full strength encryption (128 bit). The design takes into consideration the fact that data on disc has a long lifetime and that an attacker may have the matching plaintext to much of the cyphertext. A combination of master/working pass phrases offers enhanced security for backup copies. Current status is BETA and comments on the implemenation and underlying crypography are most welcome. It consists of a kernel patch plus support programs and is intended for users with enough knowledge to compile the kernel, setup lilo, partition disks etc. It is not for absolute beginners or "non technical" users just yet. Available from: http://pweb.de.uu.net/flexsys.mtk Package is ppdd-0.4.tgz, pgp signature is also available from same url. Allan Latham - -- This article has been digitally signed by the moderator, using PGP. http://www.iki.fi/mjr/cola-public-key.asc has PGP key for validating signature. Send submissions for comp.os.linux.announce to: linux-announce at news.ornl.gov PLEASE remember a short description of the software and the LOCATION. This group is archived at http://www.iki.fi/mjr/linux/cola.html -----BEGIN PGP SIGNATURE----- Version: 2.6.3i Charset: latin1 iQCVAgUBNfTs+lrUI/eHXJZ5AQEWhQP9Fd7tlWEZs/jG5Kcq/foSJBW6Me/WXS1W wRgKukImIl/DstOW9Ni1ZhfEoT4xwp0fpnVPdl+5aPG76thLv/T4iVRwVwh47hem y34x3IbvKnX6jvOqONEvrYbGL3CreMd1QWq3YuXUTZUVJVZVb6nSL4Wh5vKt/0na ijokp4QDMDk= =K4sO -----END PGP SIGNATURE----- -- end of forwarded message -- From emc at wire.insync.net Tue Sep 8 18:47:38 1998 From: emc at wire.insync.net (Eric Cordian) Date: Wed, 9 Sep 1998 09:47:38 +0800 Subject: Carl Johnson Warrant and Complaint In-Reply-To: <199809082346.TAA31245@camel8.mindspring.com> Message-ID: <199809090140.UAA29195@wire.insync.net> > Thanks to anonymous we offer the arrest warrant and > complaint against Carl Edward Johnson: I conclude: A. There actually exist federal investigators who have nothing better to do with their lives than read the complete writings of the Performance Artists Sometimes Known as "Toto," and engage in endless mental masturbation over the hidden messages they imagine to be contained therein. B. When writing parody on the subject of AP, it is best not to employ the names of actual federal slackers, lest the clueless investigators actually believe them to be targeted in some fashion. The part where he explains digital cash and how he clicked on the AP Web Form almost rises to the AOL level of stupidity. I'm amazed Arjen Lenstra isn't in the slammer for the "DigiCrime" parody, given the "knowlege and experience" of Mr. Investigator here. -- Sponsor the DES Analytic Crack Project http://www.cyberspace.org/~enoch/crakfaq.html From vznuri at netcom.com Tue Sep 8 18:47:49 1998 From: vznuri at netcom.com (Vladimir Z. Nuri) Date: Wed, 9 Sep 1998 09:47:49 +0800 Subject: Mitnick wants cyphertext; gov't wants keys In-Reply-To: Message-ID: <199809090134.SAA14123@netcom13.netcom.com> well, this is very interesting. Mitnick therefore represents one of the first cases in which the govt is attempting to compel keys. he's taken the 5th amendment against giving the keys. it looks to me like this: maybe mitnick had no backup of his encrypted data. the FBI takes his laptop with all the encrypted data. there may be some things in the data that could tend to support his innocence-- but perhaps there are other things that would tend to incriminate him more than he already is. so he wants the whole set of data first, so he can make sure, without giving the keys. the govt wants the whole set of data first, so they can make sure!! stalemate. I think the govt does not have much of a case. it seems to me that they should make the full contents of the laptop available to the defense. it was mitnicks property. it would be like them seizing someone's file cabinet. it would be easy to make xerox's and return them to the defendant. but gosh, maybe with Rico that's too much of a gracious act. From tcmay at got.net Tue Sep 8 19:17:09 1998 From: tcmay at got.net (Tim May) Date: Wed, 9 Sep 1998 10:17:09 +0800 Subject: Tax silliness In-Reply-To: Message-ID: At 10:39 PM -0700 9/7/98, Tim May wrote: >Folks, I generally restrain myself from passing on all the various news >stories I see or read. > >But tonight Fox News is reporting that the IRS has said it may seek to >assess "gift taxes" if the guy who recovered Mark McGwire's 61st home >baseball gives the ball back to Mark McGwire. > >(The ball is said to have a street value, to museums or collectors, of >$250K or so. The 62nd home run ball, the one which breaks Maris' record, >will supposedly be worth more than a million bucks.) As you may have heard by now, if you are watching the game tonight, the IRS Commissioner issued a statement saying anyone who gets the ball and gives it to another (esp. McGwire) will NOT face taxes. (Ah, but will McGwire face taxes on such a gift? Just think, had the IRS not issued a royal decree absolving the perpetrator of taxes, they could have collected taxes on the guy who got the ball and then taxes on the guy who had the ball given to him. Through the miracle of multiple taxation, the IRS gets it all....) The IRS Commissioner also acknowledged the absurdity of this particular clause of the tax code, and compared the tax code to obscure baseball rules. Someone suggested in private e-mail to me that the IRS would likely _not_ seek taxes, but acknowledged that it _could_. And there's the rub. As it happens, a ballpark employee actually _caught_ the ball, it is being reported, in a special restricted zone. He says he'll give the ball to McGwire ("but I don't want to be taxed!" he said on camera). Possibly a good deal for him, as it heads off a typically American lawsuit by the owners of the ballpark claiming they own the fruits of his labor, and he maybe gets a minor book deal, and he avoids villification by the Oprah and Geraldo crowd. (I confess that if I'd gotten the ball I'd let capitalism work its magic by selling the ball to the highest bidder. A million bucks, for starters.) --Tim May "The tree of liberty must be watered periodically with the blood of tyrants...." ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Licensed Ontologist | black markets, collapse of governments. From ravage at EINSTEIN.ssz.com Tue Sep 8 19:27:35 1998 From: ravage at EINSTEIN.ssz.com (Jim Choate) Date: Wed, 9 Sep 1998 10:27:35 +0800 Subject: Tax silliness (fwd) Message-ID: <199809090245.VAA13237@einstein.ssz.com> Forwarded message: > Date: Tue, 8 Sep 1998 19:04:02 -0700 > From: Tim May > Subject: Re: Tax silliness > not issued a royal decree absolving the perpetrator of taxes, they could > have collected taxes on the guy who got the ball and then taxes on the guy > who had the ball given to him. Through the miracle of multiple taxation, > the IRS gets it all....) That isn't accurate. The tax was a 'gift tax' and the ONLY person required to pay tax on it is the person GIVING the gift. Had you actualy read the announcement by the IRS it states very clearly that the reciever is NOT responsible for any taxes. ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From vznuri at netcom.com Tue Sep 8 19:27:38 1998 From: vznuri at netcom.com (Vladimir Z. Nuri) Date: Wed, 9 Sep 1998 10:27:38 +0800 Subject: IP: ISPI Clips 4.25:UK Police May Soon Tap Your Email & Internet Use At Will Message-ID: <199809090224.TAA18211@netcom13.netcom.com> From: "ama-gi ISPI" Subject: IP: ISPI Clips 4.25:UK Police May Soon Tap Your Email & Internet Use At Will Date: Tue, 8 Sep 1998 01:16:50 -0700 To: ISPI Clips 4.25:UK Police May Soon Tap Your Email & Internet Use At Will News & Info from the Institute for the Study of Privacy Issues (ISPI) Tuesday September 8, 1998 ISPI4Privacy at ama-gi.com ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ This From: The Independent Network, Monday September 7, 1998 http://www.independent.co.uk The PC in your mailbox: The police may soon be allowed to read your email and check your Internet use at will. http://www.independent.co.uk/net/980907ne/index.html By Paul Lavin When you drop an envelope in a red pillar-box, you walk away confident that your mail will not be read by anyone except the addressee. However, when you send an email, it might be wise to reflect on the differences. According to the organisation Internet Freedom, an agreement being negotiated between the UK's internet service providers (ISPs) and the police will open the email of the UK's eight million Internet users to scrutiny without debate in Parliament or oversight by the courts or the Home Secretary. British police are said to be close to reaching an agreement with ISPs that will enable them to monitor customers' emails and web usage logs. Chris Ellison of Internet Freedom, says: "Following a series of meetings between the Association of Chief Police Officers (ACPO) and Internet industry representatives, we understand that both groups have stated a willingness to reach a 'memorandum of understanding' about implementing police access to private data held by ISPs." According to David Kennedy, chairman of the Internet Service Providers Association, that is a serious overstatement of the discussions. However, he admits that the UK's ISPs are trying to avoid being flooded by court orders or having the police cart off critical servers for evidence. He says: "We are talking to law enforcement representatives to find a way to work with them within the legal framework that exists. All members of our association take the view that emails are private." As with the understanding between the Metropolitan Police and the ISPs over "banned" Usenet newsgroups and the closing down of web sites that may breach the law, the significance of such an agreement is that any such police activity may not be subjected to judicial review or legal constraint. Detective Chief Superintendent Keith Ackerman, chairman of the ACPO's computing crimes sub-committee, says: "We want to ensure the criminal doesn't take best advantage of the Internet, without requiring the Government to use the sledgehammer of regulation. However, we are not looking for the ability to go on fishing expeditions." The ISPs know that they are stuck in the middle, according to Keith Mitchell, chairman of Linx, a partnership of large ISPs. He says: "To divulge private email even under duress would be commercial suicide for an ISP. In some circumstances it would constitute a crime." Nonetheless, mistakes happen and there are well-known cases where the police have been persuasive. Mitchell says: "The current laws do not adequately protect ISPs or private individuals. We will be active in seeking responsive changes from Parliament." While there are undoubtedly individuals who use the Internet's email and worldwide web for nefarious purposes, the vast majority of people who use email and the web for personal and business communications have an expectation of privacy. And law-abiding citizens who wholeheartedly support the goals of law enforcement agencies may nevertheless feel uneasy about giving them carte blanche over email. America Online has been quite vocal in its opposition to opening the doors to the police short of a court order. Many ISPs agree. Julie Hatch, marketing communications director of Easynet, says:"We do not allow anyone to access our customers' email without a court order. "It makes no difference if it is an estranged wife or a suspicious business partner or anyone else, we would not divulge a subscriber's private email unless we were presented with a court order. This is in accordance with our terms and conditions. "Our business is also subject to restrictions imposed by the Data Protection Act (DPA), and in any situation we would certainly abide by those rules. So unless a subscriber's actions are illegal, you can say that email is confidential." The DPA provides scanty protection to email users, however. While the Act has aspects that protect the quality and use of information held in computer systems, disclosure can be afforded by a compliant ISP by simply including appropriate language in the small print of their terms and conditions. Data may be revealed to law enforcement officials as long as the subscriber is notified. Easynet's assurances highlight the differences between ISPs that are classified as telecoms providers, protected from feeling the long arm of the law by a regulatory framework, and those that are merely private businesses unaccountable to anyone but their owners and governed solely by their contracts with subscribers. As well as Easynet, UK ISPs that are regulated as telecoms providers include BT Internet and Demon, which is now part of Scottish Telecom. Smaller ISPs are more vulnerable to the persuasive demands of the police.They have no legally protected right of privacy and any redress for email disclosure would only be for breach of contract. Furthermore, most ISPs now include in their terms and conditions a requirement that the subscriber bear the expense of any legal costs resulting from their use of the service. This could lead to a complaining subscriber having to bear the costs of both sides of a lawsuit against an ISP even if they won. The most serious aspect of this potential agreement between the police and ISPS is, according to critics, the absence of legal safeguards. In order to tap telephones, the police need the permission of the Home Secretary and must justify violating the privacy of a suspect. It is not clear from the law whether tapping a telephone and tapping into an email exchange are the same thing. Chris Ellison says: "This is what is so dangerous about the new culture of private regulation and moral responsibility. ISPs now operate in a moral climate which insists on limitations for freedom of speech. Any material that causes offence - especially to children and ethnic minorities - is regularly removed. ISPs have now embraced this self-censorship credo and are willing to set themselves up as moral arbiters of internet content, filtering out anything that they feel may be illegal." Without public debate or scrutiny by Parliament, the police are likely to gain, as Liz Parratt from the organisation Liberty puts it, "a snoopers' charter for the Internet". Ordinary users will have little legal protection or redress against police monitoring of their communications. This trend could render the Internet less private and more regulated than any other communications medium. "If nothing else, these discussions have demonstrated what self-regulation really means: ISPs undertaking the role of publicly unaccountable instruments of law enforcement." Email is not like a letter in an envelope; it is more like a postcard. Just as you would not put some messages on a postcard, you should think before you use email for your most private communications. While the legality and desirability of the any agreement between ACPO and the ISPs is highly debatable, anyone interested in maintaining their privacy on the Internet must take responsibility for their own actions. The agreement between ACPO and ISPs will be the subject of three seminars: 22 September in Edinburgh, 8 October in London and 27 October in Manchester. Additional details can be found at http://www.linx.net/misc/acposeminar.html . --------------------------------NOTICE:------------------------------ ISPI Clips are news & opinion articles on privacy issues from all points of view; they are clipped from local, national and international newspapers, journals and magazines, etc. Inclusion as an ISPI Clip does not necessarily reflect an endorsement of the content or opinion by ISPI. In compliance with Title 17 U.S.C. section 107, this material is distributed free without profit or payment for non-profit research and educational purposes only. --------------------------------------------------------------------------- ISPI Clips is a FREE e-mail service from the "Institute for the Study of Privacy Issues" (ISPI). To receive "ISPI Clips" on a daily bases (approx. 4 - 8 clips per day) send the following message "Please enter [Your Name] into the ISPI Clips list: [Your e-mail address]" to: ISPIClips at ama-gi.com . The Institute for the Study of Privacy Issues (ISPI) is a small contributor-funded organization based in Victoria, British Columbia (Canada). ISPI operates on a not-for-profit basis, accepts no government funding and takes a global perspective. ISPI's mandate is to conduct & promote interdisciplinary research into electronic, personal and financial privacy with a view toward helping ordinary people understand the degree of privacy they have with respect to government, industry and each other and to likewise inform them about techniques to enhance their privacy. But, none of this can be accomplished without your kind and generous financial support. If you value in the ISPI Clips service or if you are concerned about the erosion of your privacy in general, won't you please help us continue this important work by becoming an "ISPI Clips Supporter" or by taking out an institute Membership? We gratefully accept all contributions: Less than $60 ISPI Clips Supporter $60 - $99 Primary ISPI Membership (1 year) $100 - $300 Senior ISPI Membership (2 years) More than $300 Executive Council Membership (life) Your ISPI "membership" contribution entitles you to receive "The ISPI Privacy Reporter" (our bi-monthly 12 page hard-copy newsletter in multi-contributor format) for the duration of your membership. For a contribution form with postal instructions please send the following message "ISPI Contribution Form" to ISPI4Privacy at ama-gi.com . We maintain a strict privacy policy. Any information you divulge to ISPI is kept in strict confidence. It will not be sold, lent or given away to any third party. ********************************************** To subscribe or unsubscribe, email: majordomo at majordomo.pobox.com with the message: (un)subscribe ignition-point email at address ********************************************** www.telepath.com/believer ********************************************** From vznuri at netcom.com Tue Sep 8 19:30:54 1998 From: vznuri at netcom.com (Vladimir Z. Nuri) Date: Wed, 9 Sep 1998 10:30:54 +0800 Subject: IP: Machine Vision For Biometric Applications Message-ID: <199809090224.TAA18267@netcom13.netcom.com> From: believer at telepath.com Subject: IP: Machine Vision For Biometric Applications Date: Wed, 09 Sep 1998 09:07:57 -0500 To: believer at telepath.com ---------------------- NOTE: Document contains instructive images. You should go to the website and open the images. ---------------------- Source: Applied Optics Group at the University of Kent at Canterbury (U.K.) http://speke.ukc.ac.uk/physical-sciences/aog/facereco/ Machine Vision For Biometric Applications We are currently conducting research in the areas of automated facial recognition and data compression of digitised images of the human face. This work began by performing an eigenfactor analysis on a data set comprising 290 faces drawn largely from the student population at the University of Kent, Canterbury. The image below shows the first three components (eigenfaces) resulting from this analysis. It is interesting to note that eigenfaces 2 and 3 have a clear relationship to gender. Thus the addition of eigenface 2 to the average eigenface (1) results in a feminine face whereas the subtraction of face 2 produces a face having masculine characteristics. In a similar way, addition of face 3 to the average produces a masculine face and subtraction of face 3 from the average results in a face having feminine features. This approach, variously known as the Karhunen-Loeve expansion, eigenfactor analysis, principal components or the Hotelling transform has exceptional data compression properties when applied to this particular pattern class (2-D images of human faces). Below, we show the image reconstruction quality that is achievable using codes of varying lengths which describe how to reconstitute the image using the component eigenfaces as a basis. Note that the subject shown here was not included in the original data set used to generate the eigenface basis. Despite this, recognition is achieved using a very short code. This method works particularly well when conditions such as head-camera orientation and subject illumination are controlled.We are now investigating other methods (some related to the Karhunen-Loeve expansion, some not) which may be suitable for automated facial recognition under less benign conditions. In particular, we are beginning to investigate the use of illumination compensation techniques and 3-D imaging techniques which are independent of illumination conditions. The group working on facial recognition here at UKC collaborates with a number of commercial/industrial organisations in the U.K. and Europe. We currently await the outcome of a cooperative research bid (CRAFT) to the European Commission which will involve the development of facial biometrics for smart cards and other access control applications. The industrial partners are Neural Computer Sciences (U.K.), Datastripe Ltd (U.K.), Inside Technologies (France), Smartkort (Iceland) and A la Carte (Belgium). More links on Facial Recognition Staff Involved Dr. C.J. Solomon - E-mail: C.J.Solomon at ukc.ac.uk Jamie P. Brooker - E-mail: jpb3 at ukc.ac.uk ----------------------- NOTE: In accordance with Title 17 U.S.C. section 107, this material is distributed without profit or payment to those who have expressed a prior interest in receiving this information for non-profit research and educational purposes only. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml ----------------------- ********************************************** To subscribe or unsubscribe, email: majordomo at majordomo.pobox.com with the message: (un)subscribe ignition-point email at address ********************************************** www.telepath.com/believer ********************************************** From vznuri at netcom.com Tue Sep 8 19:31:01 1998 From: vznuri at netcom.com (Vladimir Z. Nuri) Date: Wed, 9 Sep 1998 10:31:01 +0800 Subject: [FP] FW: Bill to Limit Nat'l ID Plan Message-ID: <199809090224.TAA18290@netcom13.netcom.com> From: "ScanThisNews" Subject: [FP] FW: Bill to Limit Nat'l ID Plan Date: Fri, 4 Sep 1998 22:09:53 -0500 To: "Scan This News Recipients List" [Forwarded message from:] believer at telepath.com [mailto:believer at telepath.com] Sent: Monday, May 05, 1997 3:12 PM To: believer at telepath.com Subject: Bill to Limit Nat'l ID Plan --------------------------- NOTE TO LISTEES: Remember: LIMITING is NOT what we want. Limiting will only detail the terms and conditions under which a National ID *W*I*L*L* be required. We want no ID at all. Let's make this clear to legislators. They still don't get it. --------------------------- Source: Washington Post http://search.washingtonpost.com/wp-srv/WAPO/19980904/V000365-090498-idx.htm l Senate Mulls Healthcare ID Proposal By Cassandra Burrell Associated Press Writer Friday, September 4, 1998; 1:39 a.m. EDT WASHINGTON (AP) -- A plan to assign every American a lifetime health-care ID number, similar to a Social Security number, could face new limits under a measure headed for Senate debate. A provision introduced Thursday by Sen. Kay Bailey Hutchison, R-Texas, would prohibit the Health and Human Services Department from going forward with the plan until Congress approves its specifics. Critics say the system, being developed as part of the 1996 Health Insurance Portability and Accountability Act, could invade privacy by opening medical histories to insurers, employers and others. The law guarantees that anyone changing or losing a job would be able to get health insurance, even with a pre-existing medical condition. ``The plan, as HHS intended to carry it forward, raises questions of excessive government involvement and control -- not to mention privacy,'' Hutchison said. The Senate Appropriations Committee added Hutchison's amendment to an $82 billion spending bill funding the Labor, Education and Health and Human Services departments as well as several related agencies for the fiscal year that begins Oct. 1. The committee approved the overall bill with little debate and sent it to the Senate. But some members said they planned to introduce more controversial issues into the bill during floor debate, including provisions dealing with federal funding of single-sex classrooms and allowing Medicare recipients to go outside the program for care not covered by the plan. President Clinton has threatened to veto a matching bill in the House because it lacks money for some of his favorite programs, such as summer jobs for poor youth and low-income heating assistance. Also Thursday, the Senate resolved a dispute over staffing at the Federal Election Commission, clearing the way for passage of a $29.9 billion spending bill funding the Treasury Department and related agencies. The Treasury bill was pulled from the Senate floor in late July because of Democratic objections to a Republican amendment that would have made it easier to remove the FEC's staff director and general counsel. With resolution of the issue, the bill passed 91-5 Thursday without further debate. Introduced by Sen. Mitch McConnell, R-Ky., the disputed amendment sought to limit to four years the currently open-ended terms of the two officials and to require approval of four of the FEC's six commissioners before the terms could be extended. Each party selects three commissioners. Democrats, led by Sen. Carl Levin of Michigan, contended the amendment would let one party remove an official for no reason and undermine the agency's independence. Under a compromise worked out with Levin, the current general counsel and staff director would not have term limits, future service would be set at six years with votes of only three commissioners required to approve an extension. The $27 billion House bill, which passed in July, does not include language on the FEC staffers. Differences will have to be worked out in a House-Senate conference. The Senate bill, which would increase money for drug enforcement, gang resistance and customer service by the Internal Revenue Service, establishes spending at $7.85 billion for the IRS, $1.7 billion for the U.S. Customs Service and $593 million for the Secret Service. Like the House bill, it would freeze salaries for members of Congress but would allow 3.6 percent cost-of-living raises for other federal workers. It also was amended to require federal employee health plans that cover prescription drugs to provide coverage for contraceptives. � Copyright 1998 The Associated Press ----------------------- NOTE: In accordance with Title 17 U.S.C. section 107, this material is distributed without profit or payment to those who have expressed a prior interest in receiving this information for non-profit research and educational purposes only. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml ----------------------- From vznuri at netcom.com Tue Sep 8 19:31:21 1998 From: vznuri at netcom.com (Vladimir Z. Nuri) Date: Wed, 9 Sep 1998 10:31:21 +0800 Subject: IP: [FP] Congress's Secret Plans to Get Our Medical Records Message-ID: <199809090224.TAA18233@netcom13.netcom.com> From: "ScanThisNews" Subject: IP: [FP] Congress's Secret Plans to Get Our Medical Records Date: Tue, 8 Sep 1998 06:47:05 -0500 To: ignition-point at majordomo.pobox.com Congress's Secret Plans to Get Our Medical Records http://www.eagleforum.org/column/1998/aug98/98-08-19.html August 19, 1998 Americans were outraged to learn about the Federal Government's plans to assign a personal identification number to every medical patient. But Congress nevertheless passed H.R. 4250, the so-called Patient Protection Act, which allows anyone who maintains your personal medical records to gather, exchange and distribute them. The only condition on distribution is that the information be used for "health care operations," which is a vague and meaningless limitation that does not even exclude marketing. Even worse, H.R. 4250 preempts state laws that currently protect patients from unauthorized distribution of their medical records. While the sponsors of H.R. 4250 claim that they did not intend for the information to be circulated for "just anything," their spokesman confirmed that personal medical records would be used for future programs concerning health quality and disease management. When the Kennedy-Kassebaum law was passed in 1996, we were told it was to improve access to health insurance. The law became explosively controversial last month when the Department of Health and Human Services (HHS) began to implement the Kennedy-Kassebaum "unique health care identifiers" so that government can electronically tag, track and monitor every citizen's personal medical records. After this news broke on July 18, embarrassed Congressmen inserted a line in H.R. 4250, which passed July 24, ordering HHS not to promulgate "a final standard" without Congressional authorization. That language is a total phony; it doesn't prevent HHS from issuing proposed or interim standards (which will become de facto standards) or from collecting medical data. So much money is involved in accessing and controlling personal information that the Washington lobbyists are moving rapidly to lock in the extraordinary powers conferred by the Kennedy-Kassebaum law. That explains these sneaky eleventh-hour inserts in pending legislation. On August 4, the House passed yet another bill to protect the gathering of personal information on private citizens. To paraphrase Ronald Reagan, there they go again. Just before passing H.R. 2281, a bill about copyrights on the Internet, the House quietly attached a separate and dangerous bill deceptively entitled the "Collections of Information Antipiracy Act." No one, of course, is in favor of "piracy," but the impact of this bill goes far beyond any reasonable definition of piracy. By the legerdemain of inserting it in another bill, it will go straight to a House-Senate conference committee under a procedure designed to avoid debate or amendments in the Senate. This Collections of Information bill (now part of H.R. 2281), in effect, creates a new federal property right to own, manage and control personal information about you, including your name, address, telephone number, medical records, and "any other intangible material capable of being collected and organized in a systematic way." This new property right provides a powerful incentive for corporations to build nationwide databases of the personal medical information envisioned by the Kennedy-Kassebaum law and the Patient Protection bill. Under the Collections of Information bill, any information about you can be owned and controlled by others under protection of Federal law. Your medical chart detailing your visits to your doctor, for example, would suddenly become the federally protected property of other persons or corporations, and their rights (not your rights) would be protected by Federal police power. This bill will encourage health care corporations to assign a unique national health identifier to each patient. The government can then simply agree to use a privately-assigned national identifier, and Clinton's longtime goal of government control of health care will be achieved. This bill creates a new federal crime that penalizes a first offense by a fine of up to $250,000 or imprisonment for up to 5 years, or both, for interfering with this new property right. It even authorizes Federal judges to order seizure of property before a finding of wrongdoing. H.R. 2281 grants these new Federal rights only to private databases, and pretends to exclude the government's own efforts to collect information about citizens. But a loophole in the bill permits private firms to share their Federally protected data with the government so long as the information is not collected under a specific government agency or license agreement. This loophole will encourage corporations, foundations, Washington insiders and political donors, to build massive databases of citizens' medical and other personal records, and then share that data with the government. And, under the House-passed bill cynically called the Patient Protection Act, patients would be unable to invoke state privacy laws to protect their personal records. Meanwhile, in another aspect of the Federal takeover of all Americans' health care, the Centers for Disease Control is aggressively building a national database of all children's medical records through the ruse of tracking immunizations. Tell your Congressman and Senators you won't vote for them in the upcoming elections unless they immediately stop all Federal plans to track and monitor our health or immunization records. Phyllis Schlafly column 8-19-98 [thanks to jim groom for finding this piece] [message forwarded by] ======================================================================= Reply to: ======================================================================= To subscribe to the free Scan This News newsletter, send a message to and type "subscribe scan" in the BODY. Or, to be removed type "unsubscribe scan" in the message BODY. For additional instructions see www.efga.org/about/maillist.html ----------------------------------------------------------------------- "Scan This News" is Sponsored by S.C.A.N. Host of the "FIGHT THE FINGERPRINT!" web page: www.networkusa.org/fingerprint.shtml ======================================================================= ********************************************** To subscribe or unsubscribe, email: majordomo at majordomo.pobox.com with the message: (un)subscribe ignition-point email at address ********************************************** www.telepath.com/believer ********************************************** From vznuri at netcom.com Tue Sep 8 19:31:26 1998 From: vznuri at netcom.com (Vladimir Z. Nuri) Date: Wed, 9 Sep 1998 10:31:26 +0800 Subject: IP: [FP] FW: Americans love a police state Message-ID: <199809090224.TAA18222@netcom13.netcom.com> From: "ScanThisNews" Subject: IP: [FP] FW: Americans love a police state Date: Tue, 8 Sep 1998 06:46:54 -0500 To: ignition-point at majordomo.pobox.com [Forwarded message] [The driver's license/ID serves as the link, giving police the "authority" to set up so-called "DUI checkpoints." These are in reality ID checkpoints. That is the fact. They can stop you and ask to se the DL/ID because it actually belongs to the state and the state can demand it any time they like. The next time you hear someone talking about how great these DUI stops are, just remember, they are really ID checkpoints -- do you have your papers?] ------------------------------- WND - Letters to the editor http://www.worldnetdaily.com/e-mail/98.e-mail.html Americans love a police state I think I've said this before but I'm amazed how our society (America) has adopted like a favorite pet, the concept of DUI CHECKPOINTS. They don't even call them POLICE CHECKPOINTS but DUI CHECKPOINTS because the MAD mothers convinced America that everyone must be a drunk driver, therefore you need DUI CHECKPOINTS. Remember, it is for the children! I heard a news brief this morning telling viewers "this holiday weekend most law enforcement agencies in the city and county (San Diego) will be conducting DUI checkpoints." Then the report showed statistics of a checkpoint that was conducted last night saying 643 cars were checked and 4 drivers were arrested, three for DUI while seven cars were impounded. My math shows that only less than one half of one-percent (00.47 percent) were DUI in the checkpoint last night. This clearly should be evidence to the Beanie Baby collectors in their sport utility vehicles that people who are not intoxicated while driving are being subject to arrest for other items along with drivers having their cars towed because they missed an insurance payment or did not register their car because the new SMOG II standards caused their car to be classified as a GORE or GROSS POLLUTER. By the way, the insurance companies in America are some of the most corrupt and greedy institutions that contribute to all those politicians who require you have insurance. Talk about the oligarchs in Russia, we have them here already! As Americans we thought we had free speech and free movement but not with these checkpoints. And you know how they tell you that you can turn around before a checkpoint to avoid it? WRONG! The Supreme Court did rule that there must be a sign with a point that vehicles may do a 180 but the problem is that law enforcement actively posts a patrol vehicle or two with lights off near that turn-around point and then they follow whoever avoids the checkpoint and stop them on probable cause. When will these checkpoints seize cash if you cannot account for the $1,000 you carry? They are already doing this at the border leaving America. When will these checkpoints seize anti-government printed e-mail messages (I carry this kind of stuff in my car, sometimes books on the New World Order or Illuminati) because of a new ANTI-TERRORIST LAW? This week your friendly politicians held hearings interviewing Louis Freeh of FBI and ex-CIA Directors (most of the ex-Directors are dead now, i.e. Colby and Casey, etc., so I think they only had one to use) with an active discussion that items that were originally thrown out of the ANTI TERRORIST BILL need to be re-included to protect against those nasty Islamic terrorists. Sure! I also have a King James Bible in my car (been accident free for at least 300,000 miles) and maybe one day at the checkpoint they'll grab that and say "don't get caught with that again." "You know those Christians are dangerous people" the two cops will say to one another, "those Christians are against abortion and euthanasia, can you believe that Sam?" DARREN -----Original Message----- From: Jim Groom [mailto:gs924jfj at mon-cre.net] Sent: Tuesday, September 08, 1998 5:11 AM To: Current Events Subject: Americans love a police state ********************************************** To subscribe or unsubscribe, email: majordomo at majordomo.pobox.com with the message: (un)subscribe ignition-point email at address ********************************************** www.telepath.com/believer ********************************************** From vznuri at netcom.com Tue Sep 8 19:31:41 1998 From: vznuri at netcom.com (Vladimir Z. Nuri) Date: Wed, 9 Sep 1998 10:31:41 +0800 Subject: IP: " Will Y2K usher in TEOTWAWKI?" Message-ID: <199809090224.TAA18278@netcom13.netcom.com> From: believer at telepath.com Subject: IP: " Will Y2K usher in TEOTWAWKI?" Date: Wed, 09 Sep 1998 12:49:38 -0500 To: believer at telepath.com Source: Dallas Morning News http://www.dallasnews.com/texas-southwest-nf/tsw1.htm Turn for the worst? 09/06/98 By Victorial Loe Hicks / The Dallas Morning News A CAVE IN ARKANSAS - Will Y2K usher in TEOTWAWKI? Bryan Elder is sure it will - so sure that he'll be deep beneath the ground on Jan. 1, 2000. "As soon as I get a cave, I'm going to live in it," Mr. Elder vowed, wending his way through one Arkansas cavern. "I'll be the world's next caveman." Y2K is the pop-culture moniker for the programming glitch that left millions of computers and other devices unable to recognize dates beyond the year 1999. The disruption will depend on how many faulty mainframes, PCs and microchips - in everything from nuclear plants to VCRs - can be detected and fixed in the next 16 months. Most people regard Y2K with mild to moderate anxiety. But a flourishing subculture insists that it portends nothing less than TEOTWAWKI (tee-OH-tawa-kee): The End of the World as We Know It. "There won't be any accidental survivors," said Mr. Elder, who believes that computer failures will short-circuit the electric grid and the transportation system, fostering severe food shortages and social anarchy. "I'm not afraid of dying," he said. "I'd prefer not to starve to death." His scenario - which also envisions nuclear war, bombardment by asteroids, incineration by solar windstorm, the flip-flop of the North and South poles, an ice age and the second coming of Jesus Christ - is one of the more dramatic, even among Y2K alarmists. But he isn't alone in hunkering down. Merchants of survival goods say business is booming, primarily driven by new customers who are girding for Y2K. Anecdotes abound of city dwellers, including some computer jocks, who are poised to flee to the boonies, where they can store and grow food without having to fend off rapacious neighbors. Dallas systems analyst Steve Watson told Wired magazine that he bought 500 remote Oklahoma acres and several guns after recognizing the full ramifications of the Y2K crisis. Mr. Watson did not respond to interview requests from The Dallas Morning News. A vice president of the firm he works for, DMR Consulting, said Mr. Watson had come to regret his public stance, which "the company doesn't share." But in one respect, every cautionary voice is right. Y2K is absolutely guaranteed to happen. In a mounting wave that will crest powerfully on Jan. 1, 2000, computers will encounter dates in which the two-digit year field reads 00, which "noncompliant" computers will read as 1900. Depending on whether a particular computer needs to know what year it is - to calculate accrued interest, for example, or to track maintenance schedules of industrial machinery - it may go on working normally, produce bad data or simply freeze up. If enough computers fail - say, at banks or telephone companies - the whole country, perhaps the world, could wake up with a whale of a New Year's hangover. By some estimates, industries and governments will spend as much as $600 billion to make things right. Even so, the Gartner Group, a research firm that has studied the issue since 1989, forecasts that half of the companies around the world will experience some disruption of their operations, further sapping an already woozy global economy. Precisely who will get hurt, how badly and for how long is the question - a question impossible to answer. "The uncertainty factor is immense. That's what makes this prophetic material," said Dr. Richard Landes, director of the Center for Millennial Studies at Boston University. "Back when I first heard about Y2K, I immediately realized that this would be grist for the apocalyptic prophets' mills." At a vigorous 32, Mr. Elder hardly fits the hoary image of a prophet. A marketing major from the University of Arkansas, he ran his own hydraulic service company until a couple of years ago, when he began devoting himself to studies of biblical prophecies and other spiritual texts. "The angel of death, that's how I feel," he said. He wants urgently for others to heed his warning, to believe, as he does, that anyone who remains above ground faces certain annihilation. Once the power grid goes dark, as he is sure it will, the financial system will collapse, he said. "Then we're back to the barter system and 'How much food do you have?' " That's only a prelude however. On May 5, 2000, Mr. Elder said, most of the planets in the solar system will align themselves on the opposite side of the sun from Earth. That will trigger the solar gales and the asteroid shower, which will precipitate still further catastrophes. "The computer problem will weed out a lot, and the solar wind will get the rest," he said. "The time to prepare is right now." For prepare, read: find a cave. Mr. Elder has his sights on one near Cassville, Mo., that he figures can accommodate 125 people. If he can reach a deal with the present owners, he plans to add plumbing, ventilation, diesel-fired generators, grow lights and enough basic supplies to sustain life for as long as seven years. Everyone will share the costs - $11,743 per person, he calculates. Byron Kirkwood isn't ready to live in a cave, but he does plan to be prepared for Y2K. Which in his case is easy, since he runs a mail-order survival products business from his rural Oklahoma home. He started the company six years ago, after his wife, Annie, said she received messages from the Virgin Mary - which she passed on in a series of books - warning that cataclysmic "earth changes" were imminent. These days, though, most of Mr. Kirkwood's customers are more worried about whether Y2K will cripple the U.S. economy than whether the Earth is about to turn on its side and acquire a second sun. Mrs. Kirkwood said Mary has not explicitly addressed Y2K, although she did warn recently that "major changes . . . will come about through government, banking institutions and telecommunications. Your power sources will be interrupted, and your life will change drastically." "That sure fits Y2K," Mr. Kirkwood said, "but she didn't come right out and say, 'The computers will fail.' " In any case, he said, sales of his survival products are up five-fold over last year, with water filters, hand-cranked radios and long-shelf-life foods leading the list. A rack in his office displays freeze-dried entrees - pepper steak, cheese ravioli and chili - packaged with individual chemical heating units. Some orders have come from as far away as Hong Kong and Austria. Like many Y2K pessimists, he gets much of his information and does much of his business via the Internet - using computers to bewail humankind's impending betrayal by computers. "I'm not trying to be a doomsayer," Mr. Kirkwood said. "I only give TEOTWAWKI a 10 percent chance of happening." However, he said, if food becomes scarce, "there's not enough police, not enough national guard, not enough military to go around." Those who stockpile food, water and cash - or who head for the hills - may look foolish to those who don't, he said, but only time will tell who are the real fools. "Some of us will look stupid one way, or some of us will look stupid the other way," he said. "You just don't know which side of stupid you're going to be on." Although Y2K is a purely technological, secular problem, there is a strong nexus between Y2K anxieties and religious millennialism, which predicts a catastrophic cleansing as the precursor to a new paradise. Like the Kirkwoods and Mr. Elder, the Dallas Area Y2K Community Preparedness Group is overtly Christian. The Rev. Pat Robertson's Christian Broadcasting Network has extensive Y2K links on its Web site. And Dr. Gary North, whom some regard as the Paul Revere of the Y2K crisis, is prominent in the Religious Reconstruction movement, which advocates replacing the Constitution with biblical law. Dr. North used to live in Tyler, Texas, but he has moved to northern Arkansas, which, like eastern Oklahoma, offers solitude to separatists of various persuasions. "The millennial myth can take secular or religious forms," said Dr. Philip Lamy, a sociologist at Castleton State College in Vermont who studies millennial movements. Regardless of the form, he said, the driving force is angst about today's rapid social change - change as momentous as that experienced during the Industrial Revolution. "What a lot of millennial groups are trying to do is hold onto the past," Dr. Lamy said. "They are merely saying that they're afraid." Of course, fear is not an unreasonable response. "This is not a false issue," said Bill Wachel, a computer consultant who founded DFW Prep 2000, a forum in which industry representatives share information on the issue. "It's possible, yeah, that the whole world could come apart. Is it probable? No." Dr. Leon Kappelman of the University of North Texas is leading the charge for government to pressure crucial industries such as electric utilities, telecommunications and medicine to fix Y2K problems. He isn't anticipating doom, but he doubts that many Americans will escape unscathed. "I don't really know what the future is. I know there are serious risks," he said. "I expect life to be a little more difficult for awhile." He has no use for those who choose to flee. "Cowards would be a good word [for them]," he said. "Deserters." Dr. Landes, too, urges Americans to hang together rather than hang separately. "Y2K can be a gift," he said. "It's a test. How do we as a culture handle this - not only the problem, but the rhetoric surrounding the problem?" As Mr. Elder explored the cave he had chosen to demonstrate to a visitor the wisdom of his plan, he came upon artifacts of a earlier era's doomsday fears. Next to a sign designating the cavern as an official fallout shelter lay tins of 1950s-vintage survival rations. The tins were unopened and pocked with rust. � 1998 The Dallas Morning News ----------------------- NOTE: In accordance with Title 17 U.S.C. section 107, this material is distributed without profit or payment to those who have expressed a prior interest in receiving this information for non-profit research and educational purposes only. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml ----------------------- ********************************************** To subscribe or unsubscribe, email: majordomo at majordomo.pobox.com with the message: (un)subscribe ignition-point email at address ********************************************** www.telepath.com/believer ********************************************** From vznuri at netcom.com Tue Sep 8 19:31:56 1998 From: vznuri at netcom.com (Vladimir Z. Nuri) Date: Wed, 9 Sep 1998 10:31:56 +0800 Subject: IP: Industrial Espionage Increases as Firms Seek Competitive Edge Message-ID: <199809090224.TAA18256@netcom13.netcom.com> From: Richard Sampson Subject: IP: Industrial Espionage Increases as Firms Seek Competitive Edge Date: Tue, 08 Sep 1998 12:52:43 -0400 To: "ignition-point at majordomo.pobox.com" Industrial Espionage Increases as Firms Seek Competitive Edge Sep. 6 (The Record/KRTBN)--The place: the Four Seasons Hotel, Philadelphia. The date: June 14, 1997. On one side of the table, two men from a Taiwanese company hoping to expand into biotechnology. On the other, an FBI agent posing as an information broker, and a researcher from Princeton-based Bristol-Myers Squibb posing as a corrupt scientist preparing to sell a piece of his company's soul. On the table: a sheaf of papers -- stamped "confidential" in big, black letters -- representing the company's investment of hundreds of millions of dollars in Taxol, the blockbuster anti-cancer drug. The asking price, according to the FBI: $200,000 and a percentage of sales. The drama played out in that hotel room -- which ended when additional FBI agents burst through the door and arrested the Taiwanese -- marked the first federal sting operation against alleged spies for a foreign corporation. But industrial espionage today is far from unusual. U.S. companies are increasingly being looted of some of their most precious technical secrets by competitors -- both foreign and domestic -- using legal and illegal methods. And New Jersey's research labs and high-tech companies -- particularly pharmaceutical companies -- are prime targets. >From 1992 to 1996, according to one study, the number of cases of industrial espionage at the nation's 1,300 largest companies nearly doubled to about 1,100. The potential commercial value of the stolen information was pegged at $300 billion. Richard Heffernan, a Branford, Conn., consultant who conducted the study for the American Society of Industrial Security of Alexandria, Va., said New Jersey pharmaceutical companies -- including Merck & Co., Schering-Plough, Warner-Lambert, and Johnson & Johnson -- have all been targeted by corporate spies. The reason: the hundreds of new products in their research and development pipelines -- products that require huge investments in time and money. Those pipelines hold the potential for billions of dollars in profits. "New Jersey is one of the top 10 areas for corporate espionage," said Heffernan, who has advised a number of New Jersey drug companies on ways to protect their secrets. "This is not a new thing for pharmaceutical companies, and it's become progressively worse. There's so much money to be made from the theft of their information. That pipeline is a very deep, rich vein of gold." In addition to illegal intrusions -- which can include anything from hacking into a private computer to buying trade secrets from a company insider -- more companies are targeting competitors' secrets using legal -- but in some cases, unethical, or highly intrusive -- methods. Membership in the Society of Competitive Intelligence Professionals -- an Alexandria, Va., group that advocates the use of legal methods to gather business intelligence on competitors -- has skyrocketed in recent years, more than quadrupling since 1990. For the most part, competitive intelligence professionals analyze data from public sources -- news reports, databases, trade shows, and the like. But they also tap more questionable sources, such as satellite photos. And they have indicated a widespread willingness to step over ethical lines to obtain information on business rivals. In a survey published in April by the competitive intelligence group, participants -- all corporate spies -- were given several scenarios and asked to choose from various options on how to proceed. Nearly half said they were willing to misrepresent the purpose of their research, 30 percent were prepared to read a marketing report left on an adjacent airplane seat, more than 70 percent said it was permissible to pump a new hire for confidential information about her previous employer, and 20 percent were willing to read and use a competitor's proprietary product data. All of those tactics violate the competitive intelligence group's own code of ethics, and the last might step over legal lines as well, according to the survey's authors. "I think there is room for some very legitimate information gathering that's important for companies to do," said Gayle Porter, an authority on business ethics at Rutgers University. "But I think there are probably many, many, many examples of people taking it too far." In New Jersey, there are abundant examples of companies alleging that they have been targets of industrial espionage -- or who have been accused of targeting others. In 1996, Boehringer Mannheim Corp., a German drug company competing against New Brunswick-based Johnson & Johnson in the $1.75 billion market for blood-monitoring devices, sued J&J and its LifeScan subsidiary in federal court. Boehringer alleged that LifeScan offered employees incentives for spying on its archrival, and that LifeScan employees sneaked into Boehringer sales meetings in Indiana, Florida, Turkey, and Germany to obtain proprietary product information. J&J denied the charges and in a countersuit said Boehringer hired detectives to obtain secrets and had workers pose as customers. Boehringer acknowledged some of J&J's charges, including that it had reprimanded an executive for posing as an importer to obtain a demonstration of a product not yet on the market, and that it had maintained a "competitive kill team" targeted at LifeScan. But the two companies reached an out-of-court settlement in 1997, agreeing to keep the terms of the settlement secret. J&J spokesman Jeffrey Leebaw declined to comment. Boehringer did not return calls. Heffernan and others say industrial espionage is on the rise because of tougher competition in domestic markets, the targeting of U.S. trade secrets by foreign economic and industrial interests, and the combination of computer hackers with increasing technical sophistication and companies that are woefully unprepared to stop them. And they say one of the times companies become vulnerable is when high-level employees leave. Executives with knowledge of marketing plans for new products and researchers responsible for developing the next big scientific breakthrough are often exploited by their new employers to obtain a competitive edge. That is what Warner-Lambert of Morris Plains charged in a 1997 lawsuit that was subsequently dropped. The company spent 12 years and $17 million developing Procan SR, a sustained-release drug used to treat heart rhythm irregularities. The product won Food and Drug Administration approval in 1982. Warner-Lambert accused a former employee of giving the top-secret formulas for the drug to Copley Pharmaceutical Inc., a Canton, Mass., generic drug manufacturer she went to work for in 1984. Seven months after she joined the company, Copley asked the FDA to approve a generic version of the drug, which Copley eventually brought to market. Neither company would comment on the settlement that ended the matter, but Jason Ford, a Warner-Lambert spokesman, said the drug -- which was discontinued several years ago by the company -- was never a blockbuster. "It wasn't so much the stealing of the product," Ford said. "The main reason why we filed the lawsuit was to make it clear that we vigorously defend our intellectual property. It sends a loud and clear message that this is something we take very seriously." Another North Jersey company, the Wormser Corp. of Englewood Cliffs, also played a key role in an industrial espionage case involving a former employee -- not as the victim, but as the accused. The case centered on Frederick Marks III, a production manager employed by Powell Products Inc. of Colorado Springs, Colo., until 1993. According to a lawsuit filed by Powell in 1995, Marks took with him top-secret blueprints for a machine developed by Powell to mass-produce foam-tipped swabs more quickly and cheaply than any other machine then available. Powell accused the Wormser Corp. of bankrolling a plan to use the stolen blueprints to create a prototype of the Powell machine, and using the machine to compete against Powell. After two years of litigation, a Denver jury awarded Powell $2.7 million in damages and legal fees, but Powell settled with the Wormser Corp. for $1.7 million. Marks pleaded guilty to misdemeanor theft in February in exchange for his cooperation with the FBI. The Wormsers -- company president Stephen, and his sons, Alan and David -- have not been charged. David Wormser referred questions to Bill Meyer, a Boulder, Colo., lawyer who denied the allegations, saying the Wormsers settled with Powell to avoid "years and years" of legal wrangling. Powell President Stephen Robards said the Wormsers are the true culprits. "There's no question about it," he said. "The blueprints Marks stole would not have damaged us without the Wormsers' money. He didn't have the resources to start a business without them." Since the passage of the 1996 Economic Espionage Act (EEA) making the theft of trade secrets a felony, the FBI has become more involved in industrial espionage cases in which U.S. companies have been targeted by foreign or domestic interests. To date, five cases have been brought under the act, including one in July in which a Piscataway man -- a former scientist for Roche Diagnostics, a Branchburg division of Nutley-based Hoffmann-La Roche -- was charged with attempted theft of trade secrets from the company. According to the complaint, Huang Dao Pei tried to obtain secrets from a current Roche scientist about the company's hepatitis C diagnostic kit, hoping to market a similar kit in China. William Megary, special agent in charge of the FBI's Newark office, said individuals trying to steal American trade secrets are not "street thugs," but high-tech thieves who are "educated, resourceful, and elusive." "Our cases illustrate the complexity of not only how diverse the criminals are, but how diverse the crimes are, as well," he said. "The FBI is committed to enforcing the EEA. Our message is clear -- it is no longer open season on American technology." Even before the act became law, federal stings were not unheard of. In the Bristol-Myers Squibb case, FBI agent John Hartmann established himself as a technology information broker in 1995 and began laying a paper trail of more than 135 faxes, e-mail messages, telephone calls, and letters with the representatives of the Yuen Foong Paper Co., which would eventually lead to the fateful meeting at the Philadelphia hotel. Jane Kramer, a spokeswoman for Bristol-Myers Squibb, said the company uses "the most sophisticated techniques" for safeguarding its trade secrets, but she would not elaborate. When security is breached, she added, it is important for a company to fight the intruder with every weapon in its arsenal. "Taxol is a major advance in cancer treatment," she said, adding that the company's multimillion-dollar investment in research on the drug is more than repaid by its $1 billion in annual sales. "You have a dramatic investment in research and development that's the lifeblood of a company like ours. The ramifications are huge for our present and our future." In what authorities described as the largest industrial espionage case in U.S. history, a 1990 FBI sting led to charges against two men for stealing secrets valued at $1 billion from Merck & Co. in Whitehouse Station and Schering-Plough Corp. in Madison. Biochemist Bernard Mayles, a former employee of the two companies, and a confederate, Mario Miscio, were ultimately convicted of trying to sell the secret formulas for Ivermectin, an anti-parasitic drug marketed by Merck, and Interferon, a cancer and hepatitis treatment sold by Schering-Plough. An FBI agent posing as a Chinese investor who wanted to convert an idle factory for Ivermectin production agreed to pay $1.5 million for the formula and the microorganism used to produce the drug. He promised to arrange the sale of the Interferon formula to a Polish investor for $10 million. Schering-Plough spokesman Ronald Asinari declined to comment, but Merck spokeswoman Maggie Beute said her company has taken additional steps to safeguard secrets in recent years, including beefing up computer security and being more vigilant about getting vendors to sign confidentiality agreements. "There's so much at stake here," she said. "Anything that shortens the life of any of our products is going to have detrimental effects on our ability to recoup our investment in R&D. As an industry, we're very focused on making sure our intellectual property rights aren't violated." Illegal intrusions such as those against Merck, Schering-Plough, and Bristol-Myers Squibb have created a cottage industry for consultants who advise companies on how to keep their secrets safe. Andy Welch, a senior consultant at KPMG Peat Marwick's risk-management practice, said business has increased tenfold in two years. Two out of three companies who come to him for help are taking preventive measures, but the others have already suffered security breaches. Welch examines personnel policies to make sure there are procedures for deactivating computer passwords when employees leave. And he attempts to hack into the company's system from the outside to find its weak links, such as the ability to dial in to a company's computer system without a password. He said many companies are not prepared to deal with the threat of corporate espionage, especially intrusions into their computer systems, where many of their most valuable secrets reside. "The indication is that there is a large degree of unpreparedness out there," Welch said. "It needs to be taken seriously. I can't tell you with a straight face that everything is warm and fuzzy out there." By Louis Lavelle -0- Visit The Record, Hackensack, N.J., on the World Wide Web at http://www.bergen.com (c) 1998, The Record, Hackensack, N.J. Distributed by Knight Ridder/Tribune Business News. BMY, MRK, SGP, WLA, JNJ, CPLY, END!A$9?HK-BIZ-ESPIONAGE News provided by COMTEX. [!BUSINESS] [!COMMUNITY] [!HEALTHCARE] [!WALL+STREET] [BIOTECHNOLOGY] [BUSINESS] [CANCER] [CHINA] [COLORADO] [COMPUTER] [CORPORATE] [DOLLAR] [E-MAIL] [ESPIONAGE] [FDA] [FLORIDA] [FOOD] [GERMANY] [GOLD] [INDIANA] [INVESTMENT] [KRT] [LAWSUIT] [MARKET] [MARKETING] [MEN] [MONEY] [NEW+BRUNSWICK] [NEW+JERSEY] [NEWS] [NEWSGRID] [PIPELINE] [PRODUCTS] [PROPERTY] [RESEARCH] [SALES] [TECHNOLOGY] [TRADE] [TURKEY] [USA] -- ----------------------- NOTE: In accordance with Title 17 U.S.C. section 107, this material is distributed without profit or payment to those who have expressed a prior interest in receiving this information for non-profit research and educational purposes only. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml ----------------------- ********************************************** To subscribe or unsubscribe, email: majordomo at majordomo.pobox.com with the message: (un)subscribe ignition-point email at address ********************************************** www.telepath.com/believer ********************************************** From vznuri at netcom.com Tue Sep 8 19:32:05 1998 From: vznuri at netcom.com (Vladimir Z. Nuri) Date: Wed, 9 Sep 1998 10:32:05 +0800 Subject: IP: [Fwd: Govt.Storing MRE's In Caves] Message-ID: <199809090224.TAA18245@netcom13.netcom.com> From: me Subject: IP: [Fwd: Govt.Storing MRE's In Caves] Date: Tue, 08 Sep 1998 08:45:42 -0400 To: IP This is a multi-part message in MIME format. --------------08FDE2A053FE721F529722FE Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit --------------08FDE2A053FE721F529722FE Content-Type: message/rfc822 Content-Transfer-Encoding: 7bit Content-Disposition: inline Path: news.dx.net!uunet!in5.uu.net!xmission!newsfeed.berkeley.edu!su-news-hub1.bbnplanet.com!news.bbnplanet.com!pln-w!spln!extra.newsguy.com!newsp.newsguy.com!enews3 From: "Steve" Newsgroups: misc.survivalism Subject: Re: Govt.Storing MRE's In Caves Date: 7 Sep 1998 23:00:31 GMT Organization: http://extra.newsguy.com Message-ID: <01bddab3$a25f5600$d34ae5d0 at maddog1.camalott.com> References: <1998090721534800.RAA12052 at ladder01.news.aol.com> Reply-To: "Steve" NNTP-Posting-Host: p-499.newsdawg.com X-Newsreader: Microsoft Internet News 4.70.1161 I can vouch for the existance of these caves in KC.....been by there many times in the days of my youth( lived there '56-'88). The interesting thing is the government(FED) kicked the private business's that were using them for warehousing/storage out....declaring that the caves were unsafe and dangerous. Funny thing is.....they weren't unsafe enough for the FED's to use. Steve West Texas -- "We the people are the rightful masters of both Congress and the courts, not to overthrow the Constitution, but to overthrow the men who pervert the Constitution." --- Abraham Lincoln "You know, of course, that this means war..." Bugs Bunny to Elmer Fudd: 1942 PAPACHUBY2 wrote in article <1998090721534800.RAA12052 at ladder01.news.aol.com>... Hi, This is off the Ark list. Interesting. S. Below are two differnet notes that I received today. I took all the return paths off of these so that they can be passed around. I personally know both sources and they are EXTREMELY credible. Perhaps we can locate a source near Kansas City..to look into this (with pictures)......I am MOST curious... marie - - - - - - - - - - - - - - - name Here's the post I received yesterday from a Y2K chat friend regarding the situation. The second message is one I received today from him. He'll be keeping me posted on what else he learns. Jeff > >>>>>>>>>>>>> Yesterday's Post------- Dear friends, As some of you know, I live in a poor and working class neighborhood in kansas city, and am involved with various activities that help poor people become less poor. As part of this, I often take in people who are homeless, or would be if not for a safe harbor. One of my housemates just got a four month temporary job unloading trucks at an underground storage center located near my neighborhood (KC has a lot of underground limestone caves that are used for storage). Anyway, this particular contract is a government contract, and the product being unloaded and stored is MRE's. that is, "meal ready to eat", which i believe is the current incarnation of the old army c rations. how many mre's are on a truck? all day, 8 hours a day, for four months. that is a LOT of meals ready to eat. Note that I didn't hear this from somebody who heard from somebody, i heard this from somebody in my own household who is unloading the mres, beginning at 7:30 in the am. Three things: First, I am comforted to know that this large amount of food is being stored here locally. Second, if you have any fiends or acquaintances who do temporary labor or casual jobs, you might ask around and see if any such operations are going on in your city.Three, somebody is taking this really seriously. mre's aren't cheap. Today's Post -------------- Dear Jeff and everybody, Today they unloaded nine trucks, and then were let go early because some additional expected trucks didn't show. It takes two guys about 1-1/2 hours to unload a truck, and each gets $35. Don't know if this space has been used to store mre's before, but that's on the list of questions to scope out. It does seem to be a government contract, the supervisors seem sure of that. It has been confirmed that this is new, that is, it isn't the regular cold storage location for Ft. Leonard Wood, etc. One of the other laborers said that each truck had 3500 cases, so today there were nine trucks times 3500 cases equals 31,500 cases. Anybody know how many mre's are in a case? This would seem to be literally an enormous amount of food, as if there were six mre's in each case, that would mean 189,000 means were unloaded today alone, and today was a short day. He was called back to work at 3:30 in the afternoon, but the expected trucks still didn't arrive. Note that the laborers apparently have to +spc- a certain amount of time sitting around and waiting. Since the contract is for four months, 22 work days a month, and if today's unloading was an average work day, and there are at least six mre's per case, then we're talking a minimum of 16,632,000 mres. Any way you look at that, it is a large amount of prepared food, being tucked securely away in a limestone cavern in KCMO. It's three meals a day for 500,000 people for 11 days, and that's the low estimate, since today was deemed a slack day by those doing the labor. - - - - -- Note: this is from another source... came in after the top portion.... > >>>>>>>>>>>> I researched MRE's just this evening to learn more about them. The full meal type MRE comes 12 per case, and the case weighs 17 pounds. So, for doing some math, double the figures you were dealing with. Using Robert's math that would come to 33,264,000 meals - using 22 work days per month, for 4 months, and the light work load experienced by Robert's friend that particular day. Assuming 12 per case, that's 2,772,000 cases at 17 pounds per case equals 47,124,000 pounds of food, or 23,562 tons. That would mean you could feed 500,000 people 3 meals per day for 22.17 days or roughly 100,000 people for just over 3 months (about 111 days actually). These are large numbers indeed and we can all look forward to learning more about this. Robert, can you put the local news people on it to open it up? Would that be wise or not? I don't know, but if appropriate, it's one heck of a story they may wish to track down. God bless all of you, << End of Forwarded message >> [snip] Local Y2K Update: I received a telephone call from a highly credible source. This informant told me that government employees recently attended a Y2K meeting in Orange County. At this meeting, one of the handouts was a listing of all the Mormon Canneries. Even more disturbing was the fact, these employees were casually told not to make this public so that they could have the necessary time to acquire their long-term storage food first. --------------08FDE2A053FE721F529722FE-- ********************************************** To subscribe or unsubscribe, email: majordomo at majordomo.pobox.com with the message: (un)subscribe ignition-point email at address ********************************************** www.telepath.com/believer ********************************************** From tcmay at got.net Tue Sep 8 19:38:59 1998 From: tcmay at got.net (Tim May) Date: Wed, 9 Sep 1998 10:38:59 +0800 Subject: Carl Johnson Warrant and Complaint In-Reply-To: <199809082346.TAA31245@camel8.mindspring.com> Message-ID: At 6:40 PM -0700 9/8/98, Eric Cordian wrote: > I'm amazed Arjen >Lenstra isn't in the slammer for the "DigiCrime" parody, given the >"knowlege and experience" of Mr. Investigator here. > I'm sometimes surprised I was never arrested for pulling off the "BlackNet" secrets trading scheme. (Especially as it actually worked as I described it....and to think some of the folks here think I've never built anything.) As for the Carl Johnson document that John Young offers, I read it with great interest, much more interest than I ever could muster for the rants of Toto/Human Gus-Peter/Truthmonger. As I'd been deleting nearly all of Toto's stuff unread, I missed all the stuff about (allegedly) threatening to bomb the RCMP. I recall seeing his "AP Bot" and "Dead Lucky" items, which came out before I was deleting all of his stuff. I suppose I agree with Eric's earlier point (snipped above) that mentioning the actual names of judges or FBI agents or IRS inspectors in rants about AP and AP bots is not a wise move. As with Bell's stuff, it makes for a case that _possibly_ these agents and judges had something to fear. Were I one of those judges or agents, I would tend to think that _possibly_ my life was in danger. Best to leave rants at the general, protected speech level, and to not get into specifics of names and working habits of agents. (I make it a point not to bother learning the names of any of these folks, except high-visibility folks like Diane Feinswine, Janet Reno, Louis Freeh, etc. This makes it hard for any of my generalized rants to be taken as direct threats against local judges, agents, lawyers, etc.) And if Toto or Carl Johnson did in fact plant a bomb....I guess he'll be extradited to Canada after his trial here in the U.S. for the charges described. And he may well get off on the U.S. charges, as it seems likely that experts (like us, ironically) can testify that whatever point Toto thought he was making, there was no chance that a working "dead pool" was being demonstrated. But Toto will probably make a plea, as Bell did. --Tim May "The tree of liberty must be watered periodically with the blood of tyrants...." ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Licensed Ontologist | black markets, collapse of governments. From ravage at einstein.ssz.com Tue Sep 8 20:21:49 1998 From: ravage at einstein.ssz.com (Jim Choate) Date: Wed, 9 Sep 1998 11:21:49 +0800 Subject: Gift taxes... Message-ID: <199809090336.WAA13892@einstein.ssz.com> Forwarded message: > "The giver is responsible for paying any applicable tax on any large > gift," IRS spokesman Steven Pyrek said Monday. > > A baseball is owned by Major League Baseball until it leaves the > field. It is then owned by the fan who comes up with it. > > A gift tax applies to any property given away that is worth $10,000 or > more. The person receiving the gift owes no taxes. > > Under the federal tax code, the first $625,000 would be exempt because > of the lifetime tax credit provided to every individual. So if the > ball is deemed to be worth $1 million, the fan would owe at least 40 > percent of the remaining $375,000, or $150,000, to the government. ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From ravage at EINSTEIN.ssz.com Tue Sep 8 20:33:59 1998 From: ravage at EINSTEIN.ssz.com (Jim Choate) Date: Wed, 9 Sep 1998 11:33:59 +0800 Subject: Taxes & baseball... Message-ID: <199809090345.WAA13954@einstein.ssz.com> Hi, It occurs to me that if the fan who caught the ball and then gave it to McGyer had to pay a gift tax then so would the NLB, after all it was their ball until it left the field at which point they give it to the fan who catches it. I wonder what made the IRS back down from a cool 1.2M...? ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From bmm at minder.net Tue Sep 8 20:41:23 1998 From: bmm at minder.net (BMM) Date: Wed, 9 Sep 1998 11:41:23 +0800 Subject: Taxes & baseball... In-Reply-To: <199809090345.WAA13954@einstein.ssz.com> Message-ID: This is a rhetorical question, yes? On Tue, 8 Sep 1998, Jim Choate wrote: > I wonder what made the IRS back down from a cool 1.2M...? From techsales at oreilly.com Tue Sep 8 20:41:39 1998 From: techsales at oreilly.com (techsales at oreilly.com) Date: Wed, 9 Sep 1998 11:41:39 +0800 Subject: WebSite Professional 2.3 Message-ID: <199809090329.UAA23899@rock.west.ora.com> Hello! Thank you for downloading O'Reilly's WebSite Professional 2.3. There's a ton of great stuff wrapped up in that one package, so I hope you'll invest a little time to play with it thoroughly. I'm confident you'll consider it time well spent. In fact, before long, you may just find yourself among WebSite's growing ranks of raving fans. Just like these corporations and institutions: AT&T National Cancer Institute Bear Stearns Siemens Nixdorf Boeing North America Smithsonian Institution County of Los Angeles Snap-on Tools, Inc. Hewlett-Packard Sprint Indiana University Union Pacific Railroad Intel United States Geological Survey JCPenny University of Miami Lucent Technologies Warner Brothers Motorola Yamaha Corporation If, during your trial of WebSite Pro, you have any questions about its capabilities or functionality, please contact me directly at techsales at oreilly.com or call 1-800-998-9938 (707-829-0515) ext. 351. To download other WebSite Professional 2.3 components you can go to: http://software.oreilly.com/download/wsp23demo_download.html To access our Knowledge Base: http://software.oreilly.com/techsupport/index_ws.html Thanks again, and have a great day! -- Michelle Koff, techsales at oreilly.com Technical Sales Associate O'Reilly & Associates (http://software.oreilly.com) From petro at playboy.com Tue Sep 8 20:47:43 1998 From: petro at playboy.com (Petro) Date: Wed, 9 Sep 1998 11:47:43 +0800 Subject: Citizenship silliness. Re: e$: crypto-expatriatism (fwd) In-Reply-To: <199809091556.KAA16265@einstein.ssz.com> Message-ID: At 10:56 AM -0500 9/9/98, Jim Choate wrote: >Forwarded message: > >> Date: Wed, 9 Sep 1998 10:03:25 -0500 >> From: Petro >> Subject: Re: Citizenship silliness. Re: e$: crypto-expatriatism (fwd) > >> There already are several, the problem is the cannot be centralized >> the way oil is. >That's not really the problem... I'd say it is, but hell, I'm paranoid. > >> Alcohol is acceptable (and in some ways better) than gasoline for >> cars and motorcycles, but anyone can set up a still and compete with RDS & >> Standard. > >The problem with alcohol is that there isn't enough free land in order grow >enough plant material to provide the necessary quantities without seriously >restricting the amount of land available for actual foodstuffs and living >space (unless you want everyone to move to Black Rock desert or live on the >top of a mountain). There are lots of things you can make alcohol out of. Seaweed, etc. There would also be incentive to other countries to produce excess for importation into the US. >Alcohol is also much more of a fire hazard than gas. It burns hotter, isn't And what would you need to add to it to "color" the flame? >put out by water spray easily, and burns invisibly (well all right in the >near-UV). Put about 2% detergent (just about any grade will do) into that "water spray", and the fire goes out quicker, and stays out longer. >> A mix of solar >Again not enough land to make it feasible, not to mention the low efficiency >of even the best panels. There are plenty of unused roof tops here in Chicago bouncing free energy off into the air. >> wind >Not enough places in the US (or anywhere else for that matter) where the >wind blows with sufficient force 18 hours a day to make it economical. Again, there are a lot of tall buildings here where the wind is constantly moving. Also, we have this large, flat, relatively undeveloped area just to the east of chicago where the wind is constantly at least 10 m.p.h. (from (admittedly imperfect memory) 7 m.p.h. is necessary to run an electric generator from a windmill) and where no one lives. It's called Lake Michigan. >> coal >Coal isn't an acceptable substitute, mainly because there isn't enough >low-sulphur deposits in the world to supply the US, let alone the rest of >the world. Plus it isn't renewable. No, but it is PART of the solution. >> hydroelectric >Not enough rivers with sufficient hydrodynamic head to make this work >for the US let alone the rest of the planet. Again, PART of the solution. >> nuclear > >I'll buck the general consensus because I like nuclear energy, however there >is a single MAJOR caveat, we need fussion and not fission reactors to make >it economical. The waste problem with fission reactors is enough to vote >in the negative on them. The waste problem goes away of you build a decently stable launch platform and drop the shit into the sun. >> and other sources >cop-out. No, it's an inclusive statment. It takes into account things like your beloved Clathrate deposits, things like the possiblity of launching "power sats" into orbit (altho I am not real clear on how the energy gets back down, something about using microwaves ) Also, you ignored, or didn't see the "mix of" statement. Oil CAN be replaced, and should be. There are plenty of ways to replace the energy with something else, and there are ways--without modifying lifestyles all that much--to reduce dependence on oil. No, don't look at me to be waving the Big Green Flag, I mean I'm for clean air as much as the next guy, and I guess trees are kinda nice to look at, but I'd like to see far more diversity in energy sources, and investigation into more long term, renewable sources. >The reality is that the clathrate deposits occur across the entire ocean. >The existing Magnesium Nodule treaties could be extended to cover the >countries that don't have coastlines. They are the first renewable, >occurring in sufficient quantity, and with realizable and economicly >feasible methods for mining, processing, and distributing to have been put >on the table. Actually it looks like something that could be made in a factory. Take a methane source (sewage, rotting plant matter) pump it into really cold water under pressure, and blam. >As to the gas and oil folk being against them, they're about the only ones >with an existing infrastructure (ie extracting oil and gas from the sea >floor) to take advantage of the source, implying that existing changes in >the infrastructure would be minor. Depends on what you want it to replace. The one of the largest uses of oil is in the transportation sector, and "they" have been pushing Natural Gas there for years to little effect. petro at playboy.com----for work related issues. I don't speak for Playboy. petro at bounty.org-----for everthing else. They wouldn't like that. They REALLY Economic speech IS political speech. wouldn't like that. From nobody at sind.hyperreal.art.pl Tue Sep 8 21:01:37 1998 From: nobody at sind.hyperreal.art.pl (HyperReal-Anon) Date: Wed, 9 Sep 1998 12:01:37 +0800 Subject: Any good hacking sites? Message-ID: <0022261586779894a81c52a54603b461@anonymous> On Tue, 8 Sep 1998, M I T Flunky wrote: > > hey all, Hey, d00d! What be happenin'? My homies and my bro's are just a hangin', man! We be k-rad kool, d00d! > > any1 know of any good hacking sites that teach u the basics and stuff? Find somebody who has been the attacker in a recent axe murder. He'll be more than happy to teach you the basics and stuff, I'm sure, particularly if you lock yourself in stocks first. > also, any1 here into AOL hacking??? I prefer a chainsaw, myself. It does cause a bit of a mess, but the mess is still preferable to the AOLholes like yourself. > > thanx, > ~Fallen Angel No pro', bro', ~LamenessMonger > > _____________________________________________________________________ > You don't need to buy Internet access to use free Internet e-mail. Apparently you don't need a clue either. > Get completely free e-mail from Juno at http://www.juno.com Well, they don't punctuate the end of the sentence, but at least they put the protocol specifier on. > Or call Juno at (800) 654-JUNO [654-5866] Or at (800) 6NO-CLUE. LamenessMonger From ravage at einstein.ssz.com Tue Sep 8 21:04:14 1998 From: ravage at einstein.ssz.com (Jim Choate) Date: Wed, 9 Sep 1998 12:04:14 +0800 Subject: Austin: Meet on Wed. Sept. 16, 1998 (new location) Message-ID: <199809090421.XAA14309@einstein.ssz.com> Hi, The next physical meet will be held on Wed. Sept. 16, 1998 from 7-8pm (or later). We are meeting at the Korea House across the street from The Yellow Rose on N. Lamar. If you need directions please send a request to austin-cpunks at ssz.com. I am sure there will be some discussion about Toto as well as the database project we've been half-heartedly working on (if only work didn't take so much time). ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From declan at well.com Tue Sep 8 21:12:13 1998 From: declan at well.com (Declan McCullagh) Date: Wed, 9 Sep 1998 12:12:13 +0800 Subject: Netly News on Nutly News (resend) Message-ID: ---------- Forwarded message ---------- Date: Wed, 9 Sep 1998 05:42:20 -0700 (PDT) From: Declan McCullagh To: politech at vorlon.mit.edu Subject: The Arrest of the Nutly Bomber http://cgi.pathfinder.com/netly/0,2326,201980909-14593,00.html TIME Digital Daily September 9, 1998 The Arrest of the Nutly Bomber By Declan McCullagh (declan at well.com) [Part I of a Series For two years a pair of anonymous Net crackpots have been posting angry tirades to a cryptography discussion list under a takeoff of Netly called "Nutly News." Now the FBI and Royal Canadian Mounted Police say that a digital signature connects them to a bomb discovered last June in a Canadian courthouse.] It was about 5 p.m. on August 18. Carl Johnson, 49, was beating the heat inside the Rialto Theater in what passes for downtown Tuscon, Ariz. That morning a friend had tipped off Johnson that the police were trying to find him, but for now he had something else on his mind: his music. The itinerant musician and writer had spent the last month furiously scribbling lyrics, friends say, and he wanted a loan from someone he knew who worked at the theater. It was for some recording work, Johnson explained. This was going be his third album, after "My Way or the Highway" and "Please! Stop Me Before I Sing Again." But when Johnson left the Rialto, his musical career was cut short by two federal agents from the IRS's internal security division. They arrested him on charges of Internet threats against federal judges and police. The Canadians wanted Johnson, too, on charges of planting a bomb in a Saskatchewan courthouse. From chatski at gl.umbc.edu Tue Sep 8 21:17:59 1998 From: chatski at gl.umbc.edu (chatski carl) Date: Wed, 9 Sep 1998 12:17:59 +0800 Subject: A question about gas warfare in San Fran in '66... In-Reply-To: <199809080109.UAA06813@einstein.ssz.com> Message-ID: On Mon, 7 Sep 1998, Jim Choate wrote: > .... on some > sort of bio-weapon test that occurred in '66 in San Francisco. He is > claiming that deaths resulted. > Anyone have a clue what he's talking about? He is probably talking about a test run by the CIA, Navy Etc. A navy ship in the bay sprayed SF with a 'simulated' BW agent ( Serratia marcescens - If I remember correctly ). This was not designed to hurt people but to see the spread of an aerosolized agent in a real city. Monitoring collectors were set up all over the city including in schools etc. Several days after the spraying started, in one hospital ( connected with Stanford I think ), where there was a ward with a number of catheterized men, some dozen or so men became seriously ill with Serratia infections, and 2 died. There was never a case of Serratia infection before this time. The military people conducting the experiment did not inform the hospital physicians even after the men became ill! - Carl From whgiii at invweb.net Tue Sep 8 21:19:40 1998 From: whgiii at invweb.net (William H. Geiger III) Date: Wed, 9 Sep 1998 12:19:40 +0800 Subject: Citizenship silliness. Re: e$: crypto-expatriatism (fwd) In-Reply-To: <199809082359.SAA12044@einstein.ssz.com> Message-ID: <199809090416.AAA25585@domains.invweb.net> -----BEGIN PGP SIGNED MESSAGE----- In <199809082359.SAA12044 at einstein.ssz.com>, on 09/08/98 at 06:59 PM, Jim Choate said: >Forwarded message: >> Date: Tue, 8 Sep 1998 18:17:45 -0500 >> From: Petro >> Subject: Re: Citizenship silliness. Re: e$: crypto-expatriatism >> planet and take all that fucking oil with them. >I wonder how the new realization that the calthrate deposits in the ocean >bottem off the continental shelf make fine fuel and it's replenishable >and may be of a larger quantity than the oil reserves will effect the >power balance. Once an alternative fuel source is discovered that is more economical than oil, the arabs will slip back into obscurity. - -- - --------------------------------------------------------------- William H. Geiger III http://www.openpgp.net Geiger Consulting Cooking With Warp 4.0 Author of E-Secure - PGP Front End for MR/2 Ice PGP & MR/2 the only way for secure e-mail. OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html - --------------------------------------------------------------- Tag-O-Matic: Bugs come in through open Windows. -----BEGIN PGP SIGNATURE----- Version: 2.6.3a-sha1 Charset: cp850 Comment: Registered_User_E-Secure_v1.1b1_ES000000 iQCVAwUBNfYC6o9Co1n+aLhhAQF0NAQAn5iFtYL/mDu1PQYyZkQfWsczExcnZGGm dO9f99+vs9ZJG8GdnqIjcCWUvbettt3BX9GkaHJloIS1x16l8vrPwB9CuIIRv7RM 6/R3BEkRtEck0HSMYQmb9H+1UvGZWJzM0mYVVILURhEtXd0bbz62CHOj49D1qBK5 LW5yRENnvV8= =c4/s -----END PGP SIGNATURE----- From whgiii at invweb.net Tue Sep 8 21:37:45 1998 From: whgiii at invweb.net (William H. Geiger III) Date: Wed, 9 Sep 1998 12:37:45 +0800 Subject: Citizenship silliness. Re: e$: crypto-expatriatism In-Reply-To: Message-ID: <199809090418.AAA25605@domains.invweb.net> -----BEGIN PGP SIGNED MESSAGE----- In , on 09/08/98 at 06:17 PM, Petro said: > No, more like a get off our fucking land. Sure thing, and where you live, exactly who's land was it before you got there? - -- - --------------------------------------------------------------- William H. Geiger III http://www.openpgp.net Geiger Consulting Cooking With Warp 4.0 Author of E-Secure - PGP Front End for MR/2 Ice PGP & MR/2 the only way for secure e-mail. OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html - --------------------------------------------------------------- Tag-O-Matic: If at first you don't succeed, work for Microsoft. -----BEGIN PGP SIGNATURE----- Version: 2.6.3a-sha1 Charset: cp850 Comment: Registered_User_E-Secure_v1.1b1_ES000000 iQCVAwUBNfYDZo9Co1n+aLhhAQEbeQP+Me7nXx6bhbVGyPD6yYmGruyaKTbwVZaV SbKzSWS/EY2I6yQyDDw9ajGvvjOtZzqyqhGshfpXCWSgAmd/TyZ+pSAR/cjEFOru cQSuklDR/Bb5i2ogqNNydaHXC8SzzaZYkqt+FUrdME7nZll6LAfad9jThliEDyDv 3F3RP/mV9wQ= =yrE9 -----END PGP SIGNATURE----- From nobody at nowhere.to Tue Sep 8 21:38:05 1998 From: nobody at nowhere.to (Anonymous) Date: Wed, 9 Sep 1998 12:38:05 +0800 Subject: PEDIATRIC ADVISE - FREE WEBSITE In-Reply-To: <199809090432.AAA17439@evision.nac.net> Message-ID: <646ff1bc59610ed0600775274c0a4885@anonymous> On Wed, 09 Sep 1998 00:34:04 PDT Jen at evision.nac.net wrote: >If you are a parent you owe it to yourself to visit this site. It is the >greatest relief site for all parents. Dr. Paula is the most non >judgemental pediatrician I have ever heard of and her site is incredible. >Every parent question gets answered usualy within a day. Dear Dr. Paula I wonder if you could help me with my problem child. He is such a sweet lad really but he does seem to hang out with the wrong crowd. Only the other day I caught him reading Toaderpunks whilst laughing maniacly. Is there anything I can do? I have tried the normal things, like getting him an AOL account, but it isn't working! I haven't been able to tell a soul about this, but since you claim not to judge, I thought you'd understand. Those damn Toaderpunks! If you ask me they should all be shot. I wasn't prying, but I read some of my sons e-mail the other day. That's when I found out about the Toaderpunks. They are all so rude. Why, I read one post from a nice AOL guy, asking about some stickers for his favorite "Rock 'n' Roll" band and they weren't helpful at all! In fact, they were down right rude! Oh and the language they use! It's all f*** this and f*** that -- if only their Mothers could hear them. I was trying to help my son by stopping his subscription to Toaderpunks, so I sent a message to the command address. Since this may be useful to you, I'll tell you what to do (there must be millions of poor kids in the Toaderpunks trap) send an electronic message to: cypherpunks at toad.com and in the body write GET ME OFF Whilst this didn't end my sons Toaderpunk subscription, a very well hung young man named Tim May visited me and "got me off" in the most spectacular way. Gosh, I'm getting wet just thinking about that boy! Anyway Doctor, I am sure you understand about those kind of things and I am getting a little off my original question. As I said, I am sure that information will help you help a lot of others. What do I do about my son? Thanks in advance. Missy From declan at well.com Tue Sep 8 21:47:52 1998 From: declan at well.com (Declan McCullagh) Date: Wed, 9 Sep 1998 12:47:52 +0800 Subject: Netly News on Nutly News Message-ID: http://cgi.pathfinder.com/netly/0,2326,201980909-14593,00.html The Arrest of the Nutly Bomber By Declan McCullagh (declan at well.com) [Part I of a Series For two years a pair of anonymous Net crackpots have been posting angry tirades to a cryptography discussion list under a takeoff of Netly called "Nutly News." Now the FBI and Royal Canadian Mounted Police say that a digital signature connects them to a bomb discovered last June in a Canadian courthouse.] It was about 5 p.m. on August 18. Carl Johnson, 49, was beating the heat inside the Rialto Theater in what passes for downtown Tuscon, Ariz. That morning a friend had tipped off Johnson that the police were trying to find him, but for now he had something else on his mind: his music. The itinerant musician and writer had spent the last month furiously scribbling lyrics, friends say, and he wanted a loan from someone he knew who worked at the theater. It was for some recording work, Johnson explained. This was going be his third album, after "My Way or the Highway" and "Please! Stop Me Before I Sing Again." But when Johnson left the Rialto, his musical career was cut short by two federal agents from the IRS's internal security division. They arrested him on charges of Internet threats against federal judges and police. The Canadians wanted Johnson, too, on charges of planting a bomb in a Saskatchewan courthouse. [...] From petro at playboy.com Tue Sep 8 21:52:41 1998 From: petro at playboy.com (Petro) Date: Wed, 9 Sep 1998 12:52:41 +0800 Subject: Carl Johnson Warrant and Complaint In-Reply-To: <199809090140.UAA29195@wire.insync.net> Message-ID: At 9:37 PM -0500 9/8/98, Tim May wrote: > >I suppose I agree with Eric's earlier point (snipped above) that mentioning >the actual names of judges or FBI agents or IRS inspectors in rants about >AP and AP bots is not a wise move. As with Bell's stuff, it makes for a >case that _possibly_ these agents and judges had something to fear. Were I >one of those judges or agents, I would tend to think that _possibly_ my >life was in danger. One could point out that WE have reason to beleive that our lives and freedoms are in danger. >Best to leave rants at the general, protected speech level, and to not get >into specifics of names and working habits of agents. That, and don't plant bombs that don't go off. >But Toto will probably make a plea, as Bell did. He may be nuts enough not to. petro at playboy.com----for work related issues. I don't speak for Playboy. petro at bounty.org-----for everthing else. They wouldn't like that. They REALLY Economic speech IS political speech. wouldn't like that. From jya at pipeline.com Tue Sep 8 21:52:44 1998 From: jya at pipeline.com (John Young) Date: Wed, 9 Sep 1998 12:52:44 +0800 Subject: Checking CDR Message-ID: <199809091748.NAA15881@camel8.mindspring.com> Those of us on cyberpass.net are not getting mail this morning so I've subbed to algebra and ssz to see if the x-posting is working. From vznuri at netcom.com Tue Sep 8 21:54:57 1998 From: vznuri at netcom.com (Vladimir Z. Nuri) Date: Wed, 9 Sep 1998 12:54:57 +0800 Subject: SCADA in power grid Message-ID: <199809090318.UAA21915@netcom13.netcom.com> this is from http://www.garynorth.com/y2k/detail_.cfm/2439 Gary North's Y2K Links and Forums Summary and Comments (feel free to mail this page) ---------------------------------------------------------------- Category: Power_Grid Date: 1998-08-29 13:57:30 Subject: The Convenient Lie: Link: http://y2ktimebomb.com/PP/RC/dm9834.htm Comment: On August 27, I spoke before a meeting of 500 people -- 5% of a local town. At that meeting, representatives of several industries spoke: banking, telephone, electrical power. When pressed by someone in the audience, the representative of the power company insisted they could run the entire company on manual systems without compliant computers. Forget about noncompliant chips. The company can do it manually. I asked him straight: Can they run the SCADA (supervisory control and data acquisition) system without telecommunications? That's the computerized system that tells them how much power is running through the lines. "Yes," he said. A week before I had been told by an engineer with a large urban power company that without SCADA, they would fry the lines permanently. "There is no way we could run the system manually." I guess engineers don't agree. I told the audience this: "No system can be switched to pre-computer manual operations without training. Any outfit that claims that it can be run manually had better have a highly trained technical staff to take over in 2000. Does the outfit have a training manual? How much training money has it budgeted?" Any outfit that does not have the staff being trained right now is lying when it says that it can be run manually. It cannot be run manually by phantom workers. The men who knew how to run it manually were fired 30 years ago. The manual systems were replaced. The industry did not spend hundreds of billions of dollars on computerization so as to have two separate operation systems. They spent the money to get rid of manual systems. Any time you hear some representative tell you his public utility can be run manually, ask five questions: 1. How many trained personnel do you need, including substitutes, to run your system manually? 2. How many are currently undergoing training for this task, and how many have finished it? 3. May I come in and see your training manual that you use to train these people? 4. How much money has your company budgeted to train this staff? 5. How much has already been spent? You must call their bluff. They're lying. They have no intention of trying to run anything manually. It's just a PR ploy. It's Monica Lewinsky syndrome. Nobody suffers any consequences for lying to the public. But can't they be sued for lying, i.e., misleading the public? Not if all companies in the industry collapse for the same reason. They will share the blame, or pass it on to a higher authority: "An act of God." When you catch one of them in a lie this big, you can rest assured: he knows that it can't be fixed by anyone, so he knows he can't be successfully sued. Training to convert to manual systems won't work, of course. The power industry can't be run manually, and it's too late to fix the code. Besides, nobody in the industry will pay any attention to such warnings. But at least it lets the industry know that you don't believe the lie any more. Dick Mills, who is a public optimist about the power grid, recently issued a warning to the industry: begin contingency planning. This includes training. This is the best advice that anyone could give the power industry -- not because the advice could work at this late date, but because it's time to call their bluff. This is from Westergaard's site. * * * * * * * * * . . . Isn't there already a national emergency plan in place for such as critical infrastructure such as power? No, not to my knowledge. Please write and tell me if I'm wrong. Never before, has there been a threat to the power system of such sweeping scope and magnitude as Y2K. There was no need for a national electric-power emergency plan. Prudence requires that we have such a plan, not only for Y2K but also for other future threats. I foresee that this plan will need to span national, state, local, public, private, utility and non-utility boundaries. How might we accomplish that? I've been told that existing presidential executive orders allow the entire industry to be nationalized at the stroke of a pen in case of emergency. Thus the authority exists, but it will do no good unless there are plans and trained organizations in place to use it effectively. There are numerous mitigating possibilities to be considered. That is true of not only to electric power but also to all industries and all facets of the Y2K problem. . . . It is already too late to finish Y2K remediation for many companies, but it is not too late for disaster preparations. To actually get practical and practiced disaster preparedness plans in place, we must accomplish three things. I see these three as my working goals. I hope you do the same. . . . We must plan, train, and practice the implementation of emergency procedures. Those are key elements of all emergency services like fire and police. In the Y2K case, we have to combine strangers into teams, invent new roles, and practice. That takes time. Link: http://y2ktimebomb.com/PP/RC/dm9834.htm ---------------------------------------------------------------- Return to Category: Power_Grid Return to Main Categories Return to Home Page From petro at playboy.com Tue Sep 8 21:56:11 1998 From: petro at playboy.com (Petro) Date: Wed, 9 Sep 1998 12:56:11 +0800 Subject: Citizenship silliness. Re: e$: crypto-expatriatism In-Reply-To: Message-ID: At 11:25 PM -0500 9/8/98, William H. Geiger III wrote: >-----BEGIN PGP SIGNED MESSAGE----- > >In , on 09/08/98 > at 06:17 PM, Petro said: > >> No, more like a get off our fucking land. > >Sure thing, and where you live, exactly who's land was it before you got >there? Point is, the "Arabs" didn't start it, the UN/European leaders (US, UK, FR, and RU) did. If I move you off your property at the point of a gun, should I expect you to _like_ it, even if I gave you what I consider "fair market value"? Oh, and the about should have read: No, more like a "get off our fucking land". petro at playboy.com----for work related issues. I don't speak for Playboy. petro at bounty.org-----for everthing else. They wouldn't like that. They REALLY Economic speech IS political speech. wouldn't like that. From tcmay at got.net Tue Sep 8 21:57:20 1998 From: tcmay at got.net (Tim May) Date: Wed, 9 Sep 1998 12:57:20 +0800 Subject: Citizenship silliness. Re: e$: crypto-expatriatism In-Reply-To: Message-ID: At 9:25 PM -0700 9/8/98, William H. Geiger III wrote: \ >In , on 09/08/98 > at 06:17 PM, Petro said: > >> No, more like a get off our fucking land. > >Sure thing, and where you live, exactly who's land was it before you got >there? Well, I take a lot more seriously the claims of a Palestinian orange grower in Jaffa who is farming land that has been in his family for many generations than I do the claim of an Auschwitz survivor from Krakow who claims that YHVH or some other bearded Sky Father gave his lineage the entire land 3000 years ago. What was done to the Jews by Hitler in WWII was horrible. But the solution was not to take ethnic Northern Europeans (much more of their genetic material is Russian, Latvian, Polish, northern European in general, than is Semitic) and resettle them on the lands of people who've actually been living in the area and farming it for at least the past several generations, and probably closer to the past few thousand years. A claim that Yahweh "gave" Palestine to those who have been living in Poland for a thousand years is just pure bullshit. And it wouldn't have happened had the victorious superpowers decided the sand niggers in Palestine could be kicked off their land. (I have no beef with those Jews who peacefully bought land in Palestine prior to this mass resettlement.) Frankly, I've always thought the suitable place for the Allies to have resettled the Jews--to the extent it was our business at all--was Germany itself. Plenty of conquered villages, plenty of seized castles and villas and chalets. And if the Jews thought this was too "icky," to be resettled in the land of their oppression, and insisted instead that the Alllies push the sand niggers out of their orange groves...well, fuck 'em. Given 'em a loaf of bread and wish them good luck and send them on their way. (And let us not forget the actions of the Stern Gang and such in blowing up the King David Hotel.) The chickens are coming home to roost. --Tim May "The tree of liberty must be watered periodically with the blood of tyrants...." ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Licensed Ontologist | black markets, collapse of governments. From mok-kong.shen at stud.uni-muenchen.de Tue Sep 8 21:59:29 1998 From: mok-kong.shen at stud.uni-muenchen.de (Mok-Kong Shen) Date: Wed, 9 Sep 1998 12:59:29 +0800 Subject: IP: Encryption Expert Says U.S. Laws Led to Renouncing of Citizenship In-Reply-To: Message-ID: <35F633A6.B307772A@stud.uni-muenchen.de> David Honig wrote: > > At 11:01 AM 9/7/98 +0100, Mok-Kong Shen wrote: > > >Let's wait and see whether AES will be genuinely exportable. > > Surely you jest. The head AES honcho will send you (in .de) the CD of the > english > specs, but not the one with the code. Like it matters. I suppose one should not forget one aspect if AES is to become an ISO standard. There will be different implementations but one needs validations. For compilers there are validation centres run by certain institutes authorized by some national standard organizations (certificates of validation are issued). Similar facilities should be assured for the future AES. Implementation as such can't in my opinion be a big problem outside of US. M. K. Shen From petro at playboy.com Tue Sep 8 22:01:20 1998 From: petro at playboy.com (Petro) Date: Wed, 9 Sep 1998 13:01:20 +0800 Subject: Carl Johnson Warrant and Complaint In-Reply-To: <199809082346.TAA31245@camel8.mindspring.com> Message-ID: At 8:40 PM -0500 9/8/98, Eric Cordian wrote: >> Thanks to anonymous we offer the arrest warrant and >> complaint against Carl Edward Johnson: > >I conclude: > >A. There actually exist federal investigators who have nothing > better to do with their lives than read the complete writings > of the Performance Artists Sometimes Known as "Toto," and > engage in endless mental masturbation over the hidden messages > they imagine to be contained therein. He planted a bomb. Like Mr. Bell, this is a very dumb thing to do, especially when the bomb didn't go off. >B. When writing parody on the subject of AP, it is best not to > employ the names of actual federal slackers, lest the clueless > investigators actually believe them to be targeted in some fashion. If they had a sense of humor, they wouldn't work for the government. petro at playboy.com----for work related issues. I don't speak for Playboy. petro at bounty.org-----for everthing else. They wouldn't like that. They REALLY Economic speech IS political speech. wouldn't like that. From bmm at minder.net Tue Sep 8 22:03:39 1998 From: bmm at minder.net (BMM) Date: Wed, 9 Sep 1998 13:03:39 +0800 Subject: Checking CDR In-Reply-To: <199809091748.NAA15881@camel8.mindspring.com> Message-ID: Looks like rigel.cyberpass.net has been down for about 24 hours. Hardware problems? On Wed, 9 Sep 1998, John Young wrote: > Those of us on cyberpass.net are not getting mail this > morning so I've subbed to algebra and ssz to see if the > x-posting is working. > From whgiii at invweb.net Tue Sep 8 22:04:42 1998 From: whgiii at invweb.net (William H. Geiger III) Date: Wed, 9 Sep 1998 13:04:42 +0800 Subject: Citizenship silliness. Re: e$: crypto-expatriatism In-Reply-To: Message-ID: <199809091801.OAA04010@domains.invweb.net> -----BEGIN PGP SIGNED MESSAGE----- In , on 09/09/98 at 09:58 AM, Petro said: >At 11:25 PM -0500 9/8/98, William H. Geiger III wrote: >>-----BEGIN PGP SIGNED MESSAGE----- >> >>In , on 09/08/98 >> at 06:17 PM, Petro said: >> >>> No, more like a get off our fucking land. >> >>Sure thing, and where you live, exactly who's land was it before you got >>there? > Point is, the "Arabs" didn't start it, the UN/European leaders (US, UK, >FR, and RU) did. Both the Palestinians and the Jews living in Trans-Jordan wanted their own country. The UN resolution divided up the land based on population and gave each group their own country. Israel declared their independence, the Palestinians listened to the Grand Mufti and join in the holy war to wipe out the Jews. The Arabs lost, too bad, game over. And interesting note to the whole palestinian "issue" is that the majority of the population of Jordan is palestinian!! And long before the Intifada the PLO tried to take over the government of Jordan and were embroiled in civil war for most of the 60's and early 70's. The Jordanian Arabs finally kick the PLO out in the early 70's (71 maybe 72). > If I move you off your property at the point of a gun, should I expect >you to _like_ it, even if I gave you what I consider "fair market value"? This re-wright of history might give you warm fuzzies but no one was moved at gun point off their land (at least not until the Arabs started the war). The Jews that emigrated to Trans-Jordan/Palestine *purchased* the land from the Arabs that were living there. Even after the war the majority of palestinians left on their own. None of the current Arab countries existed until the British carved up their conquered territory after WWI. If Israel is not "legitimate" because of UK/UN involvement does it follow that all of the Arab states that were formed at this time are also illegitimate? Perhaps we should should re-unite the Ottoman Empire? How far back in history do you want to go to find the "legitimate" territorial boundaries? Persian? Roman? Israel? Egyptian? Sumerian? I find it quite hypocritical of Americans who see the Israelites as occupiers and oppressors but would be outraged at calls to give back the south-west to Mexico. Tim, you want to give your ranch to some Mexican family since the Americans took that land from them? but then the mexicans would have to give that land back to some deserving "native" Americans as they took that land from them. But then again we would have to sift through the thousands of years of tribal warfare and migration to find the one true owners of the land. - -- - --------------------------------------------------------------- William H. Geiger III http://www.openpgp.net Geiger Consulting Cooking With Warp 4.0 Author of E-Secure - PGP Front End for MR/2 Ice PGP & MR/2 the only way for secure e-mail. OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html - --------------------------------------------------------------- Tag-O-Matic: OS/2: Windows with bullet-proof glass. -----BEGIN PGP SIGNATURE----- Version: 2.6.3a-sha1 Charset: cp850 Comment: Registered_User_E-Secure_v1.1b1_ES000000 iQCVAwUBNfbEUI9Co1n+aLhhAQGMYgP/Wy+8lVZ6b1YiadmpJ2J/chGcj0NoFbp9 uQhCtPoV2017EdU9c0AcI1PtJ+Bat3wNrZsBMgcnRxA+elgBLe9EbI7kCLIiTr6d 8Kv1stRtd2UPcAoqbJR0EBKtGaryfZY1TzCC2SBbKJUi8pJnfET20wj4Trihw+jh lSpcGvvHVjg= =jXCe -----END PGP SIGNATURE----- From tcmay at got.net Tue Sep 8 22:05:14 1998 From: tcmay at got.net (Tim May) Date: Wed, 9 Sep 1998 13:05:14 +0800 Subject: RUSSIAN DEFECTOR WARNS OF PRE-POSITIONED PORTABLE NUKES In-Reply-To: <199809082136.VAA01195@earth.wazoo.com> Message-ID: <199809090406.VAA31614@always.got.net> An interesting report from a GRU defector. How much of it is true? How much is rehashed? In any case, somebody must have cursed us, because we truly do live in interesting times. Y2K, terrorism, busts of cypherpunks, martial law contingency plans, a meltdown of Asian and Russian economies (with Latin America apparently headed down the same drain), Asama bin Laden, VX nerve gas, Ebola being developed in weapons labs, and on and on. I'm glad I live far away from safe targets and have accumulated enough supplies to "hunker" down for a long time. There are two articles here, both interesting. --Tim May In article <199809082136.VAA01195 at earth.wazoo.com>, Anonymous wrote: > Colonel Stanislav Lunev, Russian GRU defector talks about the BACKPACK NUKES > on KSFO, Geoff Metcalf Show > > KSFO 560 AM San Francisco, Geoff Metcalf Show > > GUEST:Colonel Stanislav Lunev, Russian GRU defector, author of "Through the > Eyes of the Enemy" > > SUMMARY OF LUNEV'S REMARKS > > Boris Yelstin is a mafia tool, an alcoholic who has not at all decreased his > habit of drinking who "cannot appear more than one hour in public or he > looses control over himself". He is a "decoration of power" controlled by > criminals and industrial tycoons who rule Russia behind the scenes. > > "Russia as Friend" is a theme slavishly pursued by breathless Western-types, > but in fact is an illusion. Only 2 months ago a large secret Soviet Air Base > conducted a very large-scale simulation of all-out nuclear with the West. A > similar exercise undertaken by Soviet Northern Fleet only 2 weeks ago. > > In case of outbreak of war (something that Lunev sees as a greater danger > NOW than at any time in the past), portable containers of chemical, > biological, and nuclear for use by Spetnaz against command and control > centers, water and air supplies, and specific individuals in a "decapitory > strike"-type scenario. > > Prior to hostilities, "students and businessmen" infiltrate into the US > using regular airlines, discard their disguises, and proceed to weapon > storage sites and then onto final targets. > > 100 of these weapons are stored outside the former Soviet Union. > > 57 main cells of industrial techno-snooping exist around the San Francisco > Bay Area. > > In February �97, Boris Yelstin gave a special order to Russian intelligence > to dramatically increase industrial espionage against the USA. Lunev > estimates that just in the last several years, espionage within America has > roughly doubled. > > Lunev indicates that China and Russia have entered into substantial, formal > cooperation in their espionage efforts against the USA. He adds that in the > outbreak of war, both countries could fight together against America. > > Metcalf closes by saying that Lunev's book can be ordered by calling > 1-888-606-0614. > > ---------------------------------------------------------------------------- > [www.FreeRepublic.com] > > ---------------------------------------------------------------------- > USG Ignores Soviet Special Troops Inside Our Borders > by Neil C. Livingston and M. K. Pilgrim > > The following scenario outlining typical Spetsnaz-type operations > prior to a Soviet main-force incursion into a foreign country comes > from unclassified U.S. government documents. > > "An unconventional warefare scenario: The following hypothetical > scenario illustrates the employment concept for the full exploitation > of Soviet UW [unconventional warefare] assets. > > "In support of a coordinated attack, air-dropped or air-landed GRU > special purpose teams would be introduced into their respective target > areas some days prior to H-hour. Special KGB sabotage teams would have > been infiltrated over a longer period of time by clandestine methods > to include the use of international commercial travel. These sabotage > teams could be prepared to begin their operations well before the > enemy's rear area security apparatus can be fully alerted. In the > pre-war period, some KGB personnel will seek to undermine national > resistance through political measures. > > "Sabotage teams will begin isolated acts of sabotage such as > destroying a key bridge. In addition, KGB teams will attempt to create > chaos at major ports and distrupt communications. > > "Shortly before D-day, additional sabotage teams will be inserted and > the majority of `sleeper agents' activated. > > "Sabotage equipment can be smuggled into a country by any number of > secret methods and stored in hidden, but easily accessible, caches. > Smuggling techniques may include the offshore dropping of waterproof > containers from ships and submarines. In accordance with the > prearranged signals, they will be recovered and stored by clandestine > support personnel. > > "Sensitive or fragil equipment (electronics material, detonators, and > communication devices) can be brought into the country by diplomatic > pouch and made available to the teams through established procedures. > > "Teams will attempt tp place their explosives and incendiary devices > on the targets and set them to detonate at H-hour. All efforts will be > made to prevent association of these acts with the USSR in order to > maintain the element of surprise for the main attack. Immediately > prior to H-hour, the UW teams will prepare to: > * Locate and destroy nuclear capable weaponry. > * Jam radar installations. > * Kidnap or assassinate key political-military leadership. > * Seize or destroy radio and TV broadcasting facilities. > > "At H-hour a wide spectrum of sabotage actions will be initiated." > > > http://www.icom.net/~tachyon/military/spetsnaz.html > Soldier of Fortune > January 1988 > > SOF SOVIET SPECIAL OPS > SPETSNAZ INVADES AMERICA > USG Ignores Soviet Special Troops Inside Our Borders From tcmay at got.net Tue Sep 8 22:07:28 1998 From: tcmay at got.net (Tim May) Date: Wed, 9 Sep 1998 13:07:28 +0800 Subject: If there's a trial will some of us be witnesses? Message-ID: If Carl Johnson comes to trial, presumably both sides will call expert witnesses. So, who will these witnesses be? Ironically, we are almost certainly the most qualified witnesses on the planet in these issues. However, I expect we are too disreputable, to either side, to be called. Instead, they'll likely call on peripheral players like Dorothy Denning to explain to the jury what AP is. Or perhaps the "Science Applications Inc." lightweight who attempted to analyze anonymity and remailers for a conference paper a year or two ago. Food for thought. I'm not sure how I'd react if either side called on me to act as witness. And if they subpoenaed me, I suppose I'd have to spend a few kilobucks to hire some lawyer to explain to me how and when I could take the Fifth. (That's what it's come to, with lawyers needed at every stage.) --Tim May "The tree of liberty must be watered periodically with the blood of tyrants...." ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Licensed Ontologist | black markets, collapse of governments. From guy at panix.com Tue Sep 8 22:11:57 1998 From: guy at panix.com (Information Security) Date: Wed, 9 Sep 1998 13:11:57 +0800 Subject: Carl Johnson Warrant and Complaint Message-ID: <199809091550.LAA03183@panix7.panix.com> > From: Tim May > > As I'd been deleting nearly all of Toto's stuff unread, I missed all the > stuff about (allegedly) threatening to bomb the RCMP. That's probably true for most of us...it was an unbelievable volume of crap he sent the list. (as opposed to my crap ;-) > Best to leave rants at the general, protected speech level, and to not get > into specifics of names and working habits of agents. For example: # Date: Mon, 7 Sep 1998 22:39:01 -0700 # To: cypherpunks at cyberpass.net # From: Tim May # Subject: Tax silliness # # Fox News is reporting that the IRS has said it may seek to # assess "gift taxes" if the guy who recovered Mark McGwire's 61st home # baseball gives the ball back to Mark McGwire. # # Those fuckers in D. C. need to be put out of our misery. Yeah, much better, Tim. ;-) But don't start holding rallies and saying it in public in NYC, or Rudolph Giuliani might have you arrested. ---- http://jya.com/usa-v-cej-wc.htm > 8. On December 9, 1997, an anonymous message was posted to the > Cypherpunks Internet mail group with the subject listed as "Encrypted > InterNet DEATH THREAT!!! / ATTN: Ninth District Judges / PASSWORD: > sog"[.] The body of the message was encrypted with the publicly > available encryption software PGP, and was initially unreadable. Using > PGP software and the password shown in the subject line of the > message, I was able to decrypt the message, which contained a > rambling, five-page statement, including the following: That would appear to be this post: http://www.inet-one.com/cypherpunks/dir.97.12.04-97.12.10/msg00356.html Entirely unexplained is how one goes from passphrase "sog" (Shit on government?) to decrypting the PGP message. What public or private key was used? > 9. I noted that this message contained a PGP digital signature. From > my training and experience, I am aware that this digital signature is > used as a way to authenticate digital documents to make sure that they > are authored by the purported author and that no one has tampered with > them. When I checked the signature using only PGP software, the PGP > program was unable to identify it. What key...? > Only July 1, 1998, Royal Canadian > Mounted Police (RCMP) Investigator Steve Foster provided me with a PGP > "Secret Key Ring" which he stated he had obtained from a computer > which Canadian Customs authorities had seized from an individual by > the name of CARL EDWARD JOHNSON. [A "secret key ring" is a > user-generated code which allows for the encryption (and later > authentication) of computer-generated documents.] When I checked the > digital signature on the Internet death threat using the PGP software > and JOHNSON'S secret key ring, the computer identified the signature > as one of the signature keys stored in JOHNSON'S computer. Because > both the "private" and "public" portions of the "key" were stored on > JOHNSON'S computer, the message can be authenticated as having been > generated by the person who possessed this "secret key" and knew the > correct password. In other words, only the person possessing the > secret key found on JOHNSON'S computer could have generated the "death > threat" message. Sparky got it wrong. Many people could have the same public/secret key pairs, all they have to do is give them out. And you don't authenticate messages with the "secret key" in standard use. This person seems to have no clue, after months of tracking, how basic public key encryption software works. In fact, the key ring could be edited to have a fake secret key and the public key that works as the digital signature for the posted message. More questions: did they get the passphrase for his computer's PGP secret key? How? And why did RCMP customs seize his computer? ---guy From jhvo at earthlink.net Tue Sep 8 22:11:58 1998 From: jhvo at earthlink.net (Jim Van Over) Date: Wed, 9 Sep 1998 13:11:58 +0800 Subject: PGP5.5.5 Problem Message-ID: <35F6A8B2.CCB6D9FF@earthlink.net> I am seeking assistance with a PGP 5.5.5 system and noting your comments on the net I thought it might be possible for you to help me with a solution. I have been using PGP5.5.5, successfully, for the past four months. However, beginning three days ago I began experiencing a problem. I am using Netscape Navigator and the Netscape Message Center. The problem: When I receive a PGP message I copy it to the clipboard, but, when I depress the "decrypt and verify" line on the PGP tool bar the screen for the "pass phrase" flashes briefly on the screen and disappears. The same thing happens when I use the PGP tools. The PGP tool bar first referred to is the lock icon at the bottom of the screen. I have compared my public key with the key from which I receive messages and they are identical. I am able to encrypt a message to myself and then decrypt it without any problem. It is only when I receive a message from my other computer does the problem exist. I would very much appreciate any ideas you may have as how to correct this problem. Please make your solution as basic as possible as I am not as "computer literate" as I need to be in order to understand most explanations. Thank You Jim Van Over From rah at shipwright.com Tue Sep 8 22:17:20 1998 From: rah at shipwright.com (Robert Hettinga) Date: Wed, 9 Sep 1998 13:17:20 +0800 Subject: wired on y2k In-Reply-To: <199809080235.TAA23415@netcom13.netcom.com> Message-ID: At 1:53 PM -0400 on 9/8/98, Michael Motyka wrote: > Water? Met a reactor designer from Los Alamos once who lived in some > super but isolated place in the Sangre De Christos. He had to drill some > 3K ft for water. VERY EXPENSIVE. Being 3k feet above the floor of the Rio Grande Valley will kinda do that to ya... I prefer northeast Lincoln County, myself... Cheers, Bob Hettinga ----------------- Robert A. Hettinga Philodox Financial Technology Evangelism 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From edsmith at IntNet.net Tue Sep 8 22:37:29 1998 From: edsmith at IntNet.net (Edwin E. Smith) Date: Wed, 9 Sep 1998 13:37:29 +0800 Subject: Carl Johnson Warrant and Complaint In-Reply-To: <199809082346.TAA31245@camel8.mindspring.com> Message-ID: <3.0.2.32.19980908230841.007f4360@mailhost.IntNet.net> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 I read the arrest warrant and a couple of things strike me as strange. 1. Why would anyone post an encrypted message along with the password to decrypt it? 2. I thought the public portion of a key was required to authenticate a signature, the secret part is only used to sign a message. I believe that anyone who is now subscribed to the cypherpunks list is now under surveilance. I suspected that this might be true but now my belief is confirmed. Edwin At 07:40 PM 9/8/98 -0400, you wrote: >Thanks to anonymous we offer the arrest warrant and >complaint against Carl Edward Johnson: > > http://jya.com/usa-v-cej-wc.htm (23K) > >List Cypherpunks is spotlighted by the IRS complainant, >Jeff Gordon, who made Jim Bell famous. The list is >quoted, logged, tracked, and cited for its hosting alleged death >threat messages against federal officials, which were >PGP-authenticated and -decoded, and their style and content >assessed for identity of the author, along with other allegations >by the RCMP on what Carl may or may not have done up north >and by the Secret Service on Carl may or may not have said >out west. > >We have also been told that Carl is known as "The King >of Country Porn" among admiring fans of his music. > >Whether this has anything to do with the little-known person >we're seeking information about is a mystery. > > > > -----BEGIN PGP SIGNATURE----- Version: PGP for Personal Privacy 5.0 Charset: noconv iQA/AwUBNfXxN0mNf6b56PAtEQLWKgCgiU1Gxehlqmbo2/z99YEOHA3unKUAnjbL 8u1MirEV69rZ2ZGvf3GH8wIt =7cvz -----END PGP SIGNATURE----- From stuffed at stuffed.net Wed Sep 9 13:39:25 1998 From: stuffed at stuffed.net (STUFFED NEWS DAILY) Date: Wed, 9 Sep 1998 13:39:25 -0700 (PDT) Subject: The full Monica: Novel new 'service'/Collectors' issue - New interface tomorrow Message-ID: <19980909172510.14118.qmail@eureka.abc-web.com> Today is the last day using the current interface. After much research we designed a new front end along the lines of what many of you had been asking for. And it's turned out to be super-fast too. That's tomorrow's issue. But for today, here's what you also get! + 30+ FREE HI-RES JPEGS + PAGE 2 'SPREAD': A GORGEOUS GAL + RAUNCHY RECIPE: CRAFTY COOK + LA WINDSKY: AMAZING MODEL + KEEP IT IN THE FAMILY: STRANGE ENCOUNTER + CLINTON CONDOMS: YES IT'S TRUE + ASS-PIRIN: SEX AND DRUGS + WILD THUMBNAILS: 10 FREE PICS + SEXY STORY: "THE GROUPIE" + THE VERY BEST OF EUREKA! - YOUR FAVORITE SITES + SEXY SURPRISE THUMBS: 10 MORE FREE PICS + FOOD FOR SEX: FASCINATING FEATURE + MEGA THUMBNAIL ORGY: ANOTHER 10 FREE PICS + ULTRA HI-RES POSTER PIC: SAVE IT, PRINT IT + LOADS AND LOADS MORE STUFF: CHECK IT OUT! - Have fun! ----> http://stuffed.net/98/9/9/ <---- Welcome to today's issue of Stuffed. To read it you should click on the URL above. If it is not made clickable by your email program you will need to use your mouse to highlight the URL, copy it and then paste it into your browser (then press Return). This email is never sent unsolicited. Stuffed is the supplement for the Eureka newsletter you subscribed to. Full instructions on unsubscribing are in every issue of Eureka! ----> http://stuffed.net/98/9/9/ <---- From whgiii at invweb.net Tue Sep 8 22:41:08 1998 From: whgiii at invweb.net (William H. Geiger III) Date: Wed, 9 Sep 1998 13:41:08 +0800 Subject: Citizenship silliness. Re: e$: crypto-expatriatism In-Reply-To: Message-ID: <199809091840.OAA04706@domains.invweb.net> -----BEGIN PGP SIGNED MESSAGE----- In , on 09/08/98 at 09:40 PM, Tim May said: >And it wouldn't have happened had the victorious superpowers decided the >sand niggers in Palestine could be kicked off their land. (I have no beef >with those Jews who peacefully bought land in Palestine prior to this >mass resettlement.) Sorry Tim, you need to re-check your history. No one was kicked off their land until *after* war broke out in '45. All land occupied by the Jews before that was *purchased* from the Arabs living there. There was also a large percentage of land that was either desert or swaps that was reclaimed by the Jews and turned into productive farm land. Tel Aviv was nothing but sand and scrub brush before the Jews started building there (there was the Ancient city of Jaffo which Tel Aviv has now encompassed but it took decades of expansion before Tel Aviv reached that far south). After the various battles of this 50 year war large percentages of the Palestinian population left Israelie held territory, but this had more to do with the Arab leaders calling for them to do so (and their not wanting to live under Israelie rule) than it did with the Jews pushing them out. Similar migrations were seen when India and Pakistan were created. Large portions of Moslem population that were living in India moved to Pakistan despite Ghandi's calls for them to stay. - -- - --------------------------------------------------------------- William H. Geiger III http://www.openpgp.net Geiger Consulting Cooking With Warp 4.0 Author of E-Secure - PGP Front End for MR/2 Ice PGP & MR/2 the only way for secure e-mail. OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html - --------------------------------------------------------------- Tag-O-Matic: One man's Windows are another man's walls. -----BEGIN PGP SIGNATURE----- Version: 2.6.3a-sha1 Charset: cp850 Comment: Registered_User_E-Secure_v1.1b1_ES000000 iQCVAwUBNfbNiY9Co1n+aLhhAQGZ2AQAgWGUujzGbVvq6uhqnE4fEabsvZCJiYqP J5MCk3+Z/FJ/ufV37pOlDlBjApPBl87kVmrDdbzlYSRizSsF5Y2dttJ+X5gskeWp sbXoPdAH7IWTm0AVCzhYJQCS0nO+Af1UT6mLSYl4v4RAmVC3wVIqvmz8lf0eRpLd JjYMsLMyHRA= =G2i7 -----END PGP SIGNATURE----- From nobody at lo14.wroc.pl Tue Sep 8 22:46:52 1998 From: nobody at lo14.wroc.pl (Anonymous) Date: Wed, 9 Sep 1998 13:46:52 +0800 Subject: Any good hacking sites? Message-ID: <4abeb8cbbcd0d664e6c810ce33e4f40f@anonymous> M I T wrote: > ... > also, any1 here into AOL hacking??? > Oh, this is almost _too_ easy... Yeah, we know about AOL hacking... First, you get a couple of million clueless fucktards like yourself together and give all of them the same 800-number to dial in... Watch what follows: bzzzt... bzzzt... bzzzt... Lamer #1: "Hey, d00d, whatcha doin?" bzzzt... bzzzt... bzzzt... Lamer #2: "I'm hacking AOL, man." bzzzt... bzzzt... bzzzt... Lamer #1: "Whoa! C00l, d00d! Can I like, watch?" bzzzt... bzzzt... bzzzt... Lamer #2: "Sure, man." ... Any questions? From nobody at replay.com Tue Sep 8 23:10:10 1998 From: nobody at replay.com (Anonymous) Date: Wed, 9 Sep 1998 14:10:10 +0800 Subject: Carl Johnson Warrant and Complaint Message-ID: <199809091908.VAA07970@replay.com> > Why would you claim only one person possessed the secret key? As you > doubtlessly know, some of the TruthMonger secret keys have been posted > to Cypherpunks anonymously. This is not authentication. Thank you. Prove it. Post the archived message where these secret keys were posted. Let's see the one which signed: http://www.inet-one.com/cypherpunks/dir.97.12.04-97.12.10/msg00356.html Note to the clueless guy at panix.com, who asks: > Entirely unexplained is how one goes from passphrase "sog" (Shit on government?) > to decrypting the PGP message. I'm impressed. You're actually stupider than Jeff Gordon, the IRS flunky. He was able to figure it out, so why don't you try. Ask your kindergarten teacher to give you a gold star once you fumble your way to the answer. From declan at well.com Tue Sep 8 23:15:46 1998 From: declan at well.com (Declan McCullagh) Date: Wed, 9 Sep 1998 14:15:46 +0800 Subject: Carl Johnson Warrant and Complaint In-Reply-To: Message-ID: Well, there's a little more to the "bomb" incident than that. Read tomorrow's Netly News report on the Nutly News bomber for more info... -Declan On Wed, 9 Sep 1998, Petro wrote: > > At 8:40 PM -0500 9/8/98, Eric Cordian wrote: > >> Thanks to anonymous we offer the arrest warrant and > >> complaint against Carl Edward Johnson: > > > >I conclude: > > > >A. There actually exist federal investigators who have nothing > > better to do with their lives than read the complete writings > > of the Performance Artists Sometimes Known as "Toto," and > > engage in endless mental masturbation over the hidden messages > > they imagine to be contained therein. > > He planted a bomb. Like Mr. Bell, > this is a very dumb thing to do, especially when the bomb didn't go off. > > > >B. When writing parody on the subject of AP, it is best not to > > employ the names of actual federal slackers, lest the clueless > > investigators actually believe them to be targeted in some fashion. > > If they had a sense of humor, they wouldn't work for the government. > > petro at playboy.com----for work related issues. I don't speak for Playboy. > petro at bounty.org-----for everthing else. They wouldn't like that. > They REALLY > Economic speech IS political speech. wouldn't like that. > > > > > From declan at well.com Tue Sep 8 23:16:59 1998 From: declan at well.com (Declan McCullagh) Date: Wed, 9 Sep 1998 14:16:59 +0800 Subject: Carl Johnson's private key In-Reply-To: Message-ID: I make that point in my article, but have not seen truthmonger's private key posted. Care to forward it to me? http://cgi.pathfinder.com/netly/0,2326,201980909-14593,00.html On Wed, 9 Sep 1998, Anonymous wrote: > Dear Mr Gordon, > > When I checked the > digital signature on the Internet death threat using the PGP software > and JOHNSON'S secret key ring, the computer identified the signature > as one of the signature keys stored in JOHNSON'S computer. Because > both the "private" and "public" portions of the "key" were stored on > JOHNSON'S computer, the message can be authenticated as having been > generated by the person who possessed this "secret key" and knew the > correct password. In other words, only the person possessing the > secret key found on JOHNSON'S computer could have generated the "death > threat" message. > > Why would you claim only one person possessed the secret key? As you > doubtlessly know, some of the TruthMonger secret keys have been posted > to Cypherpunks anonymously. This is not authentication. Thank you. > > > From petro at playboy.com Tue Sep 8 23:22:46 1998 From: petro at playboy.com (Petro) Date: Wed, 9 Sep 1998 14:22:46 +0800 Subject: Citizenship silliness. Re: e$: crypto-expatriatism Message-ID: At 11:52 AM -0500 9/9/98, William H. Geiger III wrote: >In , on 09/09/98 > at 09:58 AM, Petro said: >>At 11:25 PM -0500 9/8/98, William H. Geiger III wrote:>>>In >>, on 09/08/98 >>> at 06:17 PM, Petro said: >>>> No, more like a get off our fucking land. >>>Sure thing, and where you live, exactly who's land was it before you got >>>there? >> Point is, the "Arabs" didn't start it, the UN/European leaders (US, UK, >>FR, and RU) did. >Both the Palestinians and the Jews living in Trans-Jordan wanted their own >country. The UN resolution divided up the land based on population and >gave each group their own country. Israel declared their independence, the >Palestinians listened to the Grand Mufti and join in the holy war to wipe >out the Jews. The Arabs lost, too bad, game over. > >And interesting note to the whole palestinian "issue" is that the majority >of the population of Jordan is palestinian!! And long before the Intifada >the PLO tried to take over the government of Jordan and were embroiled in >civil war for most of the 60's and early 70's. The Jordanian Arabs finally >kick the PLO out in the early 70's (71 maybe 72). > > >> If I move you off your property at the point of a gun, should I expect >>you to _like_ it, even if I gave you what I consider "fair market value"? > >This re-wright of history might give you warm fuzzies but no one was moved >at gun point off their land (at least not until the Arabs started the >war). The Jews that emigrated to Trans-Jordan/Palestine *purchased* the >land from the Arabs that were living there. Even after the war the >majority of palestinians left on their own. Ok, I'm rewriting history, you say IN THE SAME POST: The UN resolution divided up the land based on population and gave each group their own country. --and-- The Jews that emigrated to Trans-Jordan/Palestine *purchased* the land from the Arabs that were living there. So tell me, is there a difference between being _told_ you will sell your house and move, and deciding you really would prefer to live elsewhere? Oh, and when this artifical coutry was set up, did EVERYONE have equal say in the government, or were certain Northern Europeans of jewish faith considered more equal. Of course, being given the short end of the political and economic stick couldn't be considered an incitement. >None of the current Arab countries existed until the British carved up >their conquered territory after WWI. If Israel is not "legitimate" because >of UK/UN involvement does it follow that all of the Arab states that were >formed at this time are also illegitimate? Perhaps we should should The region was carved up using an existing population, not by importing one from a different country. Like Mr. May, I have no problems with anyone who wants to live anywhere in peace and co-existence. The Israeli government is not interested in that, if it were politically possible, they'd do the same to the Palistanians as the Germans tried to do to them. >I find it quite hypocritical of Americans who see the Israelites as >occupiers and oppressors but would be outraged at calls to give back the >south-west to Mexico. Tim, you want to give your ranch to some Mexican >family since the Americans took that land from them? but then the mexicans >would have to give that land back to some deserving "native" Americans as >they took that land from them. But then again we would have to sift >through the thousands of years of tribal warfare and migration to find the >one true owners of the land. You seem to be saying that Conquest by Force Of Arms is acceptable, then the PLO is still trying to take back what they lost. petro at playboy.com----for work related issues. I don't speak for Playboy. petro at bounty.org-----for everthing else. They wouldn't like that. They REALLY Economic speech IS political speech. wouldn't like that. From bbt at mudspring.uplb.edu.ph Tue Sep 8 23:39:24 1998 From: bbt at mudspring.uplb.edu.ph (Bernardo B. Terrado) Date: Wed, 9 Sep 1998 14:39:24 +0800 Subject: question... Message-ID: What is the TEMPEST? (just an overview) What do enciphered images look like? Thank you. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Some people they might say that I'm hard to get to know. I go my own sweet way, well that maybe so. Something about the crowd that makes me walk alone. I never had a need in me to be the party's life and soul. It's me Bernie. metaphone at altavista.net `````````````````````````````````````````````````````````````````````````````` From tcmay at got.net Tue Sep 8 23:47:43 1998 From: tcmay at got.net (Tim May) Date: Wed, 9 Sep 1998 14:47:43 +0800 Subject: Cypherpunks as a Continuing Criminal Enterprise? In-Reply-To: <199809082136.VAA01195@earth.wazoo.com> Message-ID: Could our group be charged as a "continuing criminal enterprise" under the RICO statute? It occurs to me that if Carl Johnson, who is linked several times to our group/list in the court documents, is successfully prosecuted,then the Feds may be able to cite both Bell and Johnson as evidence of a conspiracy. Which probably wouldn't be too hard to prove, as many of us have admitted to conspiring mightily to undermine various institutions. (And we even use encypted e-mail, the very essence of a secret conspiracy.) It might be fun to see them try this. Would they charge some of us as ringleaders? Or would they declare the entity itself an illegal organization? (As they have done with various cultural, political, and even religous groups, like Hezbollah, the Aum religion, etc.) Interesting times. --Tim May "The tree of liberty must be watered periodically with the blood of tyrants...." ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Licensed Ontologist | black markets, collapse of governments. From CTIA_Daily_News at um2.unitymail.com Wed Sep 9 14:50:47 1998 From: CTIA_Daily_News at um2.unitymail.com (CTIA Daily News) Date: Wed, 9 Sep 1998 14:50:47 -0700 (PDT) Subject: CTIA Daily News from WOW-COM - September 9, 1998 Message-ID: <199809092038.PAA04335@revnet3.revnet.com> CTIA�s Daily News From WOW-COM was not circulated yesterday and today because of a wireline telephone system failure that is disrupting service to the Cellular Telecommunications Industry Association building in Washington, D.C. We regret the inconvenience this may have caused you and look forward to resuming the Daily News service as soon as possible. From jimg at mentat.com Wed Sep 9 00:06:11 1998 From: jimg at mentat.com (Jim Gillogly) Date: Wed, 9 Sep 1998 15:06:11 +0800 Subject: Carl Johnson's private key Message-ID: <199809092006.NAA10324@zendia.mentat.com> Declan skribis: > I make that point in my article, but have not seen truthmonger's private > key posted. Care to forward it to me? I stopped paying attention to most of Truthmonger's spew, but did collect one private key it posted, under the name "Earmonger", since I was doing PGP experiments at the time. I think this one doesn't have an associated passphrase, which would make forging with it quite simple. I sort of think more of its private keys were posted, but I didn't keep any others. This does, however, establish a pattern of behavior suggesting it didn't keep private keys strictly private. IIRC many of TM's messages were simply file-encrypted with an openly posted passphrase, which doesn't take a rocket scientist to crack. Jim Gillogly -------------------------------------------- Earmonger key, clipped last year: -----BEGIN PGP PUBLIC KEY BLOCK----- Version: PGP for Personal Privacy 5.0 mQENAzZsmI4AAAEIANHHMhV7V8WqPO6RjjfhZbeY/e6hsjAjKckU7YAYPhHiJfqG xw5+PgVjRPhIpXEE8ksmzZBzyH5KLW5GKFJZoD6YvVUSuzm+Gpxv+G78sBDBljUt BUoaB0XM4HSjEuqZtRtva+l+MAr3tFrK8FSdCsSgjQa8oOT5yFE76hgOGOkXGDKC HAISINKdduNsp4PU6HiNoKMdYpCCvK5u08lQFcByare2yaYmawYLmCzheCWLv9F/ kvnFtXCjup/pQNcOVeb/FkDx42l4vMwiWTH+AvrsjsV1njUIi9DTmcmD4doPlzBS qgbvQiTa16T2E4wJlnmATuW3QdwuBbdT2FSgj3MABRG0F0Vhck1vbmdlciA8ZW1A ZGV2Lm51bGw+iQEVAwUQNmyYjgW3U9hUoI9zAQHjNgf+KIDuWoBvfUj4H1twHvYU +IeDWIApLDnHkR7tsalLi9jY345iAolt3a/CiYxXPtjy9yedSaKoPasuvQk2cZ6e LZZwgEfDYj1GvjLC9D1rSItLLl6aDqYfhN2D2wgnB4mJssx1NP9zLQRf8aJkbDnl BMy3kfTr6ANmwe1hRGFWiuLkhnEtKzc9TFxBtx+4bx66rBBTzSUBfynH35bCLHLw hVzWGc5A0F18LG2WRLbGa/LcEXjp35jHyrJV73t2gUwVjH5qGa0B5O0dpvK9yDR9 wutFrmuhRgfqHO5Tclp470dkQFJv6HHMrSYyjRFFtyC9A+5Fvd1WkW7oLRAUxZmm HZkBogQ0i2ULEQQA17gNRCXxoQBVQVD+zukbAWtxMCio0tfXEJYPN516KNT7noeK dA4Q+TItlf8uC6VkUkUwabIueLZwvykDo83tnupSkvxEQ/EftLpm56kBIrgWprJM f0rIhFpIR0mNiT8ZH3z7OCAcQrfSCowk//4iESLLW8H0tFx5B9bPXrrrnkcAoP88 aezjfDn3DMlloJP9hNgRgvplA/0TKu4o2DNdIFAp/xeZE2R6wxrPfPfV00xNTgXe 5xXS3rCEljz48q6DEymmvA+oFuszKcrgOVDMT1TcKE1MzPjeKoe3c4Di92X+FoGa IenXHQrmfn7uUo54twYFqp8VsHgtfsg3F8KfFg/znF5BrIVq+aXQF9m/LczcObRz IXceEQQAhKvUfNYfP7NKA7sGkV38iFi8iJxsvkMk3RvlG6IxV0d3ATCRcvAFYUV3 fyap+CS0UnoBGZUmmIY5EvC2KyI9h8X+AXPymgM4JeQ2Hg7DnEXMegFwJ3iK9+Cg KlTS/R/h8qYUW5G1qYgYBU+JQ3I2wxmeaVWBBtYM0Rukppz+F5G0F0Vhck1vbmdl ciA8ZW1AZGV2Lm51bGw+iQBLBBARAgALBQI0i2ULBAsDAQIACgkQJH46DXlIPur3 KACgn/XD/dT+BvqkoDk1dOrbbdd00z0AnAqTYWdIKb1HkKf7Sfetwh/vKCXHuQIN BDSLZQsQCAD2Qle3CH8IF3KiutapQvMF6PlTETlPtvFuuUs4INoBp1ajFOmPQFXz 0AfGy0OplK33TGSGSfgMg71l6RfUodNQ+PVZX9x2Uk89PY3bzpnhV5JZzf24rnRP xfx2vIPFRzBhznzJZv8V+bv9kV7HAarTW56NoKVyOtQa8L9GAFgr5fSI/VhOSdvN ILSd5JEHNmszbDgNRR0PfIizHHxbLY7288kjwEPwpVsYjY67VYy4XTjTNP18F1dD ox0YbN4zISy1Kv884bEpQBgRjXyEpwpy1obEAxnIByl6ypUM2Zafq9AKUJsCRtMI PWakXUGfnHy9iUsiGSa6q6Jew1XpMgs7AAICCAC9H3enQ+6tZvcA5cjF3M2nTFCS IjerrQsQ5MZJ1EWYYhkgYkUQwtfuYL4NU/PelIo1TdYBr4mbNzxwJMFZ22cDNiOn J9oUhfDJyTA4yOacTxgl/wAXFD1FElzrVjlkf6TKW4+Db1elApcFbTDSvLNRPQev rtIrNRR480AtI8Um76RySrl9okI5L7TvtAXZMQnuyTtyA+YeG2/FvE3cOIY7EFXg Zm/jPGw6ijsbATKh6dsnb8f8dahB4awsTAzz0Unzx49TCUk0AdU9jbdP+8i+g9eJ uodZhd71d2o7HyhAwkVNKcsu5nqpFzwAWK5xSy5x1AprWWrTiu6uiAQ6T5Q/iQBG BBgRAgAGBQI0i2ULAAoJECR+Og15SD7qKaAAn0gbCIF0XzBifU27o9N7x4RI/IUX AJ49fXSrtX0w17W0gCe7BCvjXkRP7Q== =SVmn -----END PGP PUBLIC KEY BLOCK----- From tcmay at got.net Wed Sep 9 00:06:21 1998 From: tcmay at got.net (Tim May) Date: Wed, 9 Sep 1998 15:06:21 +0800 Subject: Citizenship silliness. Re: e$: crypto-expatriatism In-Reply-To: Message-ID: At 11:25 AM -0700 9/9/98, William H. Geiger III wrote: >After the various battles of this 50 year war large percentages of the >Palestinian population left Israelie held territory, but this had more to >do with the Arab leaders calling for them to do so (and their not wanting >to live under Israelie rule) than it did with the Jews pushing them out. Yes, many farmers and others left the war zone in 1948 to stay with relatives and friends and such in safer areas. Can anyone blame them? Ah, but now they and their children and grandchildren and great-grandchildren live in tents in refugee camps for a simple reason: they were not allowed to return to their homes and land. Did this vacation in Jordan or Egypt or Lebanon or wherever mean they lost the title to their homes and land? Apparently the newly arrived transplants from Poland and Latvia and such felt this to be the case. This is comparable to my going to Oregon to escape the Reconquista Wars in California, and returning a few months later to find the borders sealed. (Issues that those who departed may have fallen behind in mortgage payments and had their farms repossesed by banks, etc., are clearly separable...and minor, from my readings of Middle Eastern history.) "You left your land. Enjoy your life in the tent camp at the Oregon-California border. Meanwhile, your ranch is now my ranch. Oh, and could give me all of your spare keys? And how does the sprinkler system work?" Israel is based on moral bankruptcy. The supposed guilt of the West (huh? we didn't gas the Jews, and we lost millions of lives fighting Hitler) led to the "ragheads" being kicked off their land. --Tim May "The tree of liberty must be watered periodically with the blood of tyrants...." ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Licensed Ontologist | black markets, collapse of governments. From declan at well.com Wed Sep 9 00:15:29 1998 From: declan at well.com (Declan McCullagh) Date: Wed, 9 Sep 1998 15:15:29 +0800 Subject: Carl Johnson's private key In-Reply-To: <199809092006.NAA10324@zendia.mentat.com> Message-ID: Hmm. I grabbed the key below and compared it to the "death threat" post sent on Tuesday, 09 Dec 97 13:51:52 EST. Not a match. -Declan PS: Hello to my fans in domestic survelliance! On Wed, 9 Sep 1998, Jim Gillogly wrote: > Declan skribis: > > I make that point in my article, but have not seen truthmonger's private > > key posted. Care to forward it to me? > > I stopped paying attention to most of Truthmonger's spew, but did > collect one private key it posted, under the name "Earmonger", since I > was doing PGP experiments at the time. I think this one doesn't have > an associated passphrase, which would make forging with it quite > simple. I sort of think more of its private keys were posted, but I > didn't keep any others. This does, however, establish a pattern of > behavior suggesting it didn't keep private keys strictly private. > > IIRC many of TM's messages were simply file-encrypted with an openly > posted passphrase, which doesn't take a rocket scientist to crack. > > Jim Gillogly > > -------------------------------------------- > > Earmonger key, clipped last year: > > -----BEGIN PGP PUBLIC KEY BLOCK----- > Version: PGP for Personal Privacy 5.0 > > mQENAzZsmI4AAAEIANHHMhV7V8WqPO6RjjfhZbeY/e6hsjAjKckU7YAYPhHiJfqG > xw5+PgVjRPhIpXEE8ksmzZBzyH5KLW5GKFJZoD6YvVUSuzm+Gpxv+G78sBDBljUt > BUoaB0XM4HSjEuqZtRtva+l+MAr3tFrK8FSdCsSgjQa8oOT5yFE76hgOGOkXGDKC > HAISINKdduNsp4PU6HiNoKMdYpCCvK5u08lQFcByare2yaYmawYLmCzheCWLv9F/ > kvnFtXCjup/pQNcOVeb/FkDx42l4vMwiWTH+AvrsjsV1njUIi9DTmcmD4doPlzBS > qgbvQiTa16T2E4wJlnmATuW3QdwuBbdT2FSgj3MABRG0F0Vhck1vbmdlciA8ZW1A > ZGV2Lm51bGw+iQEVAwUQNmyYjgW3U9hUoI9zAQHjNgf+KIDuWoBvfUj4H1twHvYU > +IeDWIApLDnHkR7tsalLi9jY345iAolt3a/CiYxXPtjy9yedSaKoPasuvQk2cZ6e > LZZwgEfDYj1GvjLC9D1rSItLLl6aDqYfhN2D2wgnB4mJssx1NP9zLQRf8aJkbDnl > BMy3kfTr6ANmwe1hRGFWiuLkhnEtKzc9TFxBtx+4bx66rBBTzSUBfynH35bCLHLw > hVzWGc5A0F18LG2WRLbGa/LcEXjp35jHyrJV73t2gUwVjH5qGa0B5O0dpvK9yDR9 > wutFrmuhRgfqHO5Tclp470dkQFJv6HHMrSYyjRFFtyC9A+5Fvd1WkW7oLRAUxZmm > HZkBogQ0i2ULEQQA17gNRCXxoQBVQVD+zukbAWtxMCio0tfXEJYPN516KNT7noeK > dA4Q+TItlf8uC6VkUkUwabIueLZwvykDo83tnupSkvxEQ/EftLpm56kBIrgWprJM > f0rIhFpIR0mNiT8ZH3z7OCAcQrfSCowk//4iESLLW8H0tFx5B9bPXrrrnkcAoP88 > aezjfDn3DMlloJP9hNgRgvplA/0TKu4o2DNdIFAp/xeZE2R6wxrPfPfV00xNTgXe > 5xXS3rCEljz48q6DEymmvA+oFuszKcrgOVDMT1TcKE1MzPjeKoe3c4Di92X+FoGa > IenXHQrmfn7uUo54twYFqp8VsHgtfsg3F8KfFg/znF5BrIVq+aXQF9m/LczcObRz > IXceEQQAhKvUfNYfP7NKA7sGkV38iFi8iJxsvkMk3RvlG6IxV0d3ATCRcvAFYUV3 > fyap+CS0UnoBGZUmmIY5EvC2KyI9h8X+AXPymgM4JeQ2Hg7DnEXMegFwJ3iK9+Cg > KlTS/R/h8qYUW5G1qYgYBU+JQ3I2wxmeaVWBBtYM0Rukppz+F5G0F0Vhck1vbmdl > ciA8ZW1AZGV2Lm51bGw+iQBLBBARAgALBQI0i2ULBAsDAQIACgkQJH46DXlIPur3 > KACgn/XD/dT+BvqkoDk1dOrbbdd00z0AnAqTYWdIKb1HkKf7Sfetwh/vKCXHuQIN > BDSLZQsQCAD2Qle3CH8IF3KiutapQvMF6PlTETlPtvFuuUs4INoBp1ajFOmPQFXz > 0AfGy0OplK33TGSGSfgMg71l6RfUodNQ+PVZX9x2Uk89PY3bzpnhV5JZzf24rnRP > xfx2vIPFRzBhznzJZv8V+bv9kV7HAarTW56NoKVyOtQa8L9GAFgr5fSI/VhOSdvN > ILSd5JEHNmszbDgNRR0PfIizHHxbLY7288kjwEPwpVsYjY67VYy4XTjTNP18F1dD > ox0YbN4zISy1Kv884bEpQBgRjXyEpwpy1obEAxnIByl6ypUM2Zafq9AKUJsCRtMI > PWakXUGfnHy9iUsiGSa6q6Jew1XpMgs7AAICCAC9H3enQ+6tZvcA5cjF3M2nTFCS > IjerrQsQ5MZJ1EWYYhkgYkUQwtfuYL4NU/PelIo1TdYBr4mbNzxwJMFZ22cDNiOn > J9oUhfDJyTA4yOacTxgl/wAXFD1FElzrVjlkf6TKW4+Db1elApcFbTDSvLNRPQev > rtIrNRR480AtI8Um76RySrl9okI5L7TvtAXZMQnuyTtyA+YeG2/FvE3cOIY7EFXg > Zm/jPGw6ijsbATKh6dsnb8f8dahB4awsTAzz0Unzx49TCUk0AdU9jbdP+8i+g9eJ > uodZhd71d2o7HyhAwkVNKcsu5nqpFzwAWK5xSy5x1AprWWrTiu6uiAQ6T5Q/iQBG > BBgRAgAGBQI0i2ULAAoJECR+Og15SD7qKaAAn0gbCIF0XzBifU27o9N7x4RI/IUX > AJ49fXSrtX0w17W0gCe7BCvjXkRP7Q== > =SVmn > -----END PGP PUBLIC KEY BLOCK----- > > From aba at dcs.ex.ac.uk Wed Sep 9 00:38:43 1998 From: aba at dcs.ex.ac.uk (Adam Back) Date: Wed, 9 Sep 1998 15:38:43 +0800 Subject: Carl Johnson Warrant and Complaint In-Reply-To: Message-ID: <199809091912.UAA03276@server.eternity.org> Tim May writes: > As I'd been deleting nearly all of Toto's stuff unread, I missed all the > stuff about (allegedly) threatening to bomb the RCMP. I recall seeing his > "AP Bot" and "Dead Lucky" items, which came out before I was deleting all > of his stuff. It is kind of amusing that this FBI agent has been methodically analysing Toto's posts when few if any here have read them all. Particularly the one which apparently was sent to the list encrypted with the password included -- I wonder if this FBI agent was pretty near the only person who read it! (I don't recall seeing the message.) It would seem that Toto's tendency for magical thinking, and his theories on `synchronicity' are contagious, and that the FBI agent ended up being drawn into Toto's magical thinking, conspiracy theory filled world and imagining all kinds of hidden meanings in Toto's posts. Most of Toto's messages were fictional works such as `WebWorld', and the others, cynical rants, conspiracy theories, etc. No one here had the faintest idea that any of this stuff was connected with reality. One wonders about the Xenix chainsaw massacre, and the suitcase nuke... fact or fiction :-) Adam From aba at dcs.ex.ac.uk Wed Sep 9 00:40:02 1998 From: aba at dcs.ex.ac.uk (Adam Back) Date: Wed, 9 Sep 1998 15:40:02 +0800 Subject: Toto posted his keys? In-Reply-To: Message-ID: <199809091857.TAA03261@server.eternity.org> Anonymous notes: > Gordon writes in the arrest note posted to jya.com: > : [...] In other words, only the person possessing the > : secret key found on JOHNSON'S computer could have generated the "death > : threat" message. > > Why would you claim only one person possessed the secret key? As you > doubtlessly know, some of the TruthMonger secret keys have been posted > to Cypherpunks anonymously. This is not authentication. Thank you. Would you happen to recall the subject field or approximate date of this message? (It's kind of difficult to search for Toto posts on various topics because the From line is mostly forged, via a remailer, or forged as coming from a remailer. Ditto for the author, using a different nym each time: TruthMongrel, DeathMonger, etc.) The collection of Toto's keys that he did post and the date he posted might be useful to archive at jya.com so that we can see which if any of Gordon's claims of proof of authentic Toto messages are valid. (I've got a set of archives going back to May 96 in RMAIL format, btw if anyone wants to redo Ryan Lackey's `complete cpunks archive'.) Adam From mgering at ecosystems.net Wed Sep 9 00:42:02 1998 From: mgering at ecosystems.net (Matthew James Gering) Date: Wed, 9 Sep 1998 15:42:02 +0800 Subject: radio net (fwd) Message-ID: <33CCFE438B9DD01192E800A024C84A19284623@mossbay.chaffeyhomes.com> So much for "no domestic crypto restrictions." I really hate when people say that, there are plenty, and export restrictions on cryptography software and cryptography in software DOES indirectly but substantially affect the availability and cost of domestic encryption, not to mention that most people download export-grade crypto from the web for convenience. Isn't there a similar ban on encryption-capable telephones and other electronic devices (other than computers). Matt > > The FCC prohibits the transmission of encrypted data via > > analog or digital signals by amateurs. From hrook at exchange.microsoft.com Wed Sep 9 00:53:11 1998 From: hrook at exchange.microsoft.com (Harvey Rook (Exchange)) Date: Wed, 9 Sep 1998 15:53:11 +0800 Subject: question... Message-ID: <2FBF98FC7852CF11912A0000000000010D19AC9D@DINO> Hi Bernardo; TEMPEST isn't a cipher, but a technique. Essentially, your monitor is a great big RF emitter. As it's electron gun turns off and on to make the phosphor screen glow, it's emitting all kinds of radio frequencies that betray the image on the screen. A tempest attack is a receiver that can tune to a monitor, and reconstruct the image from the RF the monitor is emitting. Supposedly such equipment costs about $500.00 Harvey "Know it All" Rook. > -----Original Message----- > From: Bernardo B. Terrado [mailto:bbt at mudspring.uplb.edu.ph] > Sent: Tuesday, September 08, 1998 11:03 PM > To: cypherpunks at toad.com > Subject: question... > > > What is the TEMPEST? (just an overview) > > What do enciphered images look like? > > > > Thank you. > > > ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ > ~~~~~~~~~~~~~~~~ > Some people they might say that I'm hard to get to know. > I go my own sweet way, well that maybe so. > Something about the crowd that makes me walk alone. > I never had a need in me to be the party's life and soul. > > It's me Bernie. > metaphone at altavista.net > `````````````````````````````````````````````````````````````` > ```````````````` > > > From billh at ibag.com Wed Sep 9 00:56:45 1998 From: billh at ibag.com (William J. Hartwell) Date: Wed, 9 Sep 1998 15:56:45 +0800 Subject: radio net In-Reply-To: Message-ID: <3.0.5.32.19980909005149.0081d100@mail.xroads.com> At 02:29 PM 9/8/98 -0400, Ryan Lackey wrote: >Is anyone else interested in setting up a radio net...... I have been thinking allot about this over the last couple of months. I have subscribed to a packet radio mailing list (linux-hams at vger.rutgers.edu (majordomo at vger.rutgers.edu)) just to lurk so I could get a feel for what it took to set such a network up. Much of my family are hams and have dabbled in packet radio at one time or another. They say once set up it works well (slow but dependable) and is an ideal way to carry non-real-time traffic in an emergency. As far as a secure network, that's why I lurk in this list. :-) If such a thing should ever be outlawed or restricted most Hams I know are law abiding citizens and would more than likely conform (No Ham should take offence to this, its meant with the best intentions and respect). I think a radio network linked to the Amateur networks sending secure packets, using tunneling or maybe just encrypted traffic (There may be some FCC rules regarding this. I don't want to break any laws so am still looking into this part.) with nodes connected to the internet (or other network as well ... Remember FIDOnet) would be a good idea. The Ham networks will probably stand up well in the case of a national emergency. That's something these folks are real good at. In the off chance that the telecommunications Infrastructure becomes unavailable due to political or other reasons, some of which have been discussed quite often here. This network could break off and stand on its own carrying important traffic for those whose need to communicate with loved ones and business associates would be worth whatever risk might befall them. If Y2K turns out to be a real problem (as I believe it might) or something else happens. I plan on still being able to communicate with my loved ones; business associates, and hopefully still get this list. :-) I plan on adding another dedicated LINUX box for this in the near future and will be looking for others with the same types of concerns to link with. >I think the cost would be something like $1-5k per station, and it could >be done in a fairly turnkey fashion. I think it would be considerably less money wise, and still could be done properly. I would be interested in hearing anyone's thoughts on this and maybe communicating with other like-minded individuals off list. Since this list seems to have attracted a lot of attention from the authorities as of late. I wonder what the ratio of cypherpunks to spooks (IRS, FBI, NSA, British Intelligence, Government informants, and assorted other agent types) on this list is now :-) Would all the spooks please raise your hands? You... in the back listening quietly.... Is that you Inspector Gordon? :-) -- Bill H. billh at ibag.com -- William J. Hartwell (602)987-8436 Queencreek, Az. billh at ibag.com billh at interdem.com billh at hartwell.net From Raymond at fbn.bc.ca Wed Sep 9 01:08:48 1998 From: Raymond at fbn.bc.ca (Raymond D. Mereniuk) Date: Wed, 9 Sep 1998 16:08:48 +0800 Subject: Citizenship silliness. Re: e$: crypto-expatriatism (fwd) In-Reply-To: <199809082359.SAA12044@einstein.ssz.com> Message-ID: <199809092123.OAA17355@leroy.fbn.bc.ca> William H. Geiger IIIwrote > Once an alternative fuel source is discovered that is more economical than > oil, the arabs will slip back into obscurity. Good point! Ever wonder why a decreasing commodity non- renewable resource is becoming cheaper as the known reserves become smaller? Maybe they want to sell it all before it becomes obsolete and maximize their income from that resource. Within the oil business I have heard this mentioned in regards to natural gas. Virtually Raymond D. Mereniuk Raymond at fbn.bc.ca From guy at panix.com Wed Sep 9 01:09:56 1998 From: guy at panix.com (Information Security) Date: Wed, 9 Sep 1998 16:09:56 +0800 Subject: Cypherpunks as a Continuing Criminal Enterprise? Message-ID: <199809092110.RAA08478@panix7.panix.com> > From: Tim May > > Could our group be charged as a "continuing criminal enterprise" under the > RICO statute? OH GAWD PLEASE SOMEBODY SHUT DOWN THE MAY RANT-BOT! ---guy ;-) From bill.stewart at pobox.com Wed Sep 9 01:10:17 1998 From: bill.stewart at pobox.com (Bill Stewart) Date: Wed, 9 Sep 1998 16:10:17 +0800 Subject: Tax silliness (fwd) In-Reply-To: <199809090245.VAA13237@einstein.ssz.com> Message-ID: <3.0.5.32.19980909010417.00a5b840@idiom.com> >> not issued a royal decree absolving the perpetrator of taxes, they could >> have collected taxes on the guy who got the ball and then taxes on the guy >> who had the ball given to him. Through the miracle of multiple taxation, >> the IRS gets it all....) Of course, the guy who has the ball can argue, if he chooses to return it, that it doesn't belong to him, and he's returning it to its owner, the guy who made it worth $250K. The IRS would have a hard time arguing some legally-defined version of "finders keepers", since it was obvious at any point whose ball it might be. (Then there's the question of whether the ball really belongs to the ballpark or one or the other team, and since most professional ballparks are quasi-governmentally owned, the local government may want a large cut...) Thanks! Bill Bill Stewart, bill.stewart at pobox.com PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639 From nobody at seclab.com Wed Sep 9 01:18:55 1998 From: nobody at seclab.com (User of DOOM) Date: Wed, 9 Sep 1998 16:18:55 +0800 Subject: No Subject In-Reply-To: <3.0.5.32.19980909005149.0081d100@mail.xroads.com> Message-ID: <199809092115.XAA24879@rogue.seclab.com> >>>>> William J Hartwell writes: > I think a radio network linked to the Amateur networks sending > secure packets, using tunneling or maybe just encrypted traffic FCC regulations prohibit amateur radio services from carrying either encrypted OR commercial traffic. Either of these restrictions makes amateur radio networks useless for CP purposes. And hams are very diligent at self-enforcement, often devoting hundreds of man-hours to track down a single unlicenced operator. Anyone who wishes to establish a network that may -- at any point in its life -- have to operate outside the "law" (whatever THAT happens to be at the time) will be well advised to steer clear of the amateur radio community. From guy at panix.com Wed Sep 9 01:21:30 1998 From: guy at panix.com (Information Security) Date: Wed, 9 Sep 1998 16:21:30 +0800 Subject: Carl Johnson Warrant and Complaint Message-ID: <199809092122.RAA08765@panix7.panix.com> > From: Anonymous > > Note to the clueless guy at panix.com, who asks: > > Entirely unexplained is how one goes from passphrase "sog" (Shit on government?) > > to decrypting the PGP message. > > I'm impressed. You're actually stupider than Jeff Gordon, the IRS flunky. > He was able to figure it out, so why don't you try. Ask your kindergarten > teacher to give you a gold star once you fumble your way to the answer. Nice shot: your feet are now on fire. ---guy From melliott at ncsa.uiuc.edu Wed Sep 9 01:24:44 1998 From: melliott at ncsa.uiuc.edu (Matt Elliott) Date: Wed, 9 Sep 1998 16:24:44 +0800 Subject: radio net (fwd) In-Reply-To: <33CCFE438B9DD01192E800A024C84A19284623@mossbay.chaffeyhomes.com> Message-ID: Pig Latin or even the old 10 codes as in 10-4 are against the amateur rules. The only allowed code scheme is morse code and Q codes. Both are clasified as a well defined language. Using english and having a conversation that means something other than the standard usage is also prohibited. If you don't like it then stick to CB-Radio. At least that is the FCC's position. >So much for "no domestic crypto restrictions." I really hate when people >say that, there are plenty, and export restrictions on cryptography >software and cryptography in software DOES indirectly but substantially >affect the availability and cost of domestic encryption, not to mention >that most people download export-grade crypto from the web for >convenience. > >Isn't there a similar ban on encryption-capable telephones and other >electronic devices (other than computers). > > Matt > > >> > The FCC prohibits the transmission of encrypted data via >> > analog or digital signals by amateurs. Matt From aba at dcs.ex.ac.uk Wed Sep 9 01:35:45 1998 From: aba at dcs.ex.ac.uk (Adam Back) Date: Wed, 9 Sep 1998 16:35:45 +0800 Subject: Carl Johnson's private key In-Reply-To: <199809092006.NAA10324@zendia.mentat.com> Message-ID: <199809092125.WAA05951@server.eternity.org> Jim Gillogly writes: > I stopped paying attention to most of Truthmonger's spew, but did > collect one private key it posted, under the name "Earmonger", since > I was doing PGP experiments at the time. I think this one doesn't > have an associated passphrase, which would make forging with it > quite simple. That was just a public key, though right? Was a corresponding private key posted? > I sort of think more of its private keys were posted, but I didn't > keep any others. This does, however, establish a pattern of > behavior suggesting it didn't keep private keys strictly private. Well let's see how many Toto keys we can find which were posted to cpunks. Adam From declan at well.sf.ca.us Wed Sep 9 01:35:47 1998 From: declan at well.sf.ca.us (Declan McCullagh) Date: Wed, 9 Sep 1998 16:35:47 +0800 Subject: CP Cite In-Reply-To: <199809091318.JAA17051@camel7.mindspring.com> Message-ID: I link to I believe seven messages in my article today. The one that Gordon apparently cites is this: [Bienfait Nutly News-Sidney, Montana]A BIENFAIT CYPHERPUNKS Distributed meeting took place early this morning via an BlackBox hookup between the South 40, in Sidney, and the CoalDust Saloon, in Bienfait. The main issue of discussion was as to whether anyone was sober enough to remember where the MadBomber In Possession Of The Last False Smile had actually placed the bomb before embarking on a middle-leg of the TruthMonger SoftTarget Tour of Planet Terra. Estevan City Police, hearing rumors of the Virtual Attack on the Saskatchewan Justice System via the MeatSpace tools commonly available to those who own no firearms and don't need no stinking badges, chose to delay a search for the bomb, in order to plan what type of news spin should be put on the event in order to maximize the justification for an increased local police budget to combat international terrorism, child pornography, drug-dealing and A HorseMan -Declan On Wed, 9 Sep 1998, John Young wrote: > We're putting together copies of cpunk messages Jeff > Gordon cites in the Carl Johnson complaint and have > found all in the archives except one dated June10, 1998. > Jeff describes it: > > 15. On June 10, 1998, an anonymous message was > posted to the Cypherpunks Internet group. In the > message, it is stated that the bomber "placed the bomb > before embarking on a middle-leg of the TruthMonger > SoftTarget Tour of Planet Terra." The message also > referenced an RCMP plan to "drive a known madman > crazy enough to finally put him away turned bad, and > resulted in a backlash of death and destruction ..." I > noted that this message contained information about the > courthouse bomb incident which had not previously been > made public, and was written in a style and manner > which I recognized as being similar to other writings > which my investigation has linked to JOHNSON. In his > interview with Special Agent Sheridan, JOHNSON > acknowledged using the name TruthMonger, and also > stated he had psychological problems, both of which > correspond to this message. > > We'd appreciate getting a copy (yes, Jeff, if you would, anon ok). > > BTW, there's a brief message from Lucky Green yesterday > in the archives on CEJ which did not appear on the > cyberpass list, AFAIK, although it was sent to ssz.com. Do such > gaps happen much in CDR? > > Yeah, yeah, I post to toad, and aim to be the last one who > does, so drive me AP-mad. > > BTW2, anybody know what Linda Reed thinks of her infame? > > BTW3, we heard from TX that CJ's music/perform art is going to > be boosted in concert with his god-sent cornseed of publicity. From petro at playboy.com Wed Sep 9 01:37:57 1998 From: petro at playboy.com (Petro) Date: Wed, 9 Sep 1998 16:37:57 +0800 Subject: Cypherpunks as a Continuing Criminal Enterprise? In-Reply-To: <199809090406.VAA31614@always.got.net> Message-ID: At 12:07 AM -0500 9/9/98, Tim May wrote: >Could our group be charged as a "continuing criminal enterprise" under the >RICO statute? > >It occurs to me that if Carl Johnson, who is linked several times to our >group/list in the court documents, is successfully prosecuted,then the Feds >may be able to cite both Bell and Johnson as evidence of a conspiracy. >Which probably wouldn't be too hard to prove, as many of us have admitted >to conspiring mightily to undermine various institutions. (And we even use >encypted e-mail, the very essence of a secret conspiracy.) As far as I know, conspiring to END the government, or change the government is perfectly legal, as long as you are not planning on using violence to carry it out. We (well, as many as are, we is a difficult thing on this list) are prepared to _resist with violence_ the invasion of our homes, and (to a different extent) the removal of our rights, but those are in themselves illegal things, so defending oneself from them is the most basic "inalienable right". Then again, we are dealing with the Peoples United Soverign States Government. >It might be fun to see them try this. Would they charge some of us as Well, at least for those of you rich enough to pay for lawyers. The rest of us will either have to plea, flee, or die. >ringleaders? Or would they declare the entity itself an illegal >organization? (As they have done with various cultural, political, and even >religous groups, like Hezbollah, the Aum religion, etc.) Hmmm, if they were to do this, how bout we have a second set of servers running the distributed mailing list software under a different name, say Sinderallapunx, or OldDemocrapunks. Ok, so being a "member" of cypherpunks is illegal, change the name, let them have their "victory". >Interesting times. petro at playboy.com----for work related issues. I don't speak for Playboy. petro at bounty.org-----for everthing else. They wouldn't like that. They REALLY Economic speech IS political speech. wouldn't like that. From jimg at mentat.com Wed Sep 9 01:45:22 1998 From: jimg at mentat.com (Jim Gillogly) Date: Wed, 9 Sep 1998 16:45:22 +0800 Subject: Carl Johnson's private key Message-ID: <9809092144.AA11404@mentat.com> Adam skribis: > That was just a public key, though right? Was a corresponding private > key posted? Oh, you're right. I misremembered. This was actually two public keys, an RSA and an ElGamal. Still, I'm pretty sure there was a *Monger private key posted time. Jim Gillogly From whgiii at invweb.net Wed Sep 9 01:50:26 1998 From: whgiii at invweb.net (William H. Geiger III) Date: Wed, 9 Sep 1998 16:50:26 +0800 Subject: Citizenship silliness. Re: e$: crypto-expatriatism In-Reply-To: Message-ID: <199809092151.RAA07697@domains.invweb.net> -----BEGIN PGP SIGNED MESSAGE----- In , on 09/09/98 at 02:15 PM, Petro said: > Ok, I'm rewriting history, you say IN THE SAME POST: >The UN resolution divided up the land based on population and gave each >group their own country. > --and-- >The Jews that emigrated to Trans-Jordan/Palestine *purchased* the land >from the Arabs that were living there. > So tell me, is there a difference between being _told_ you will sell >your house and move, and deciding you really would prefer to live >elsewhere? Yes it is quite obvious that there is a difference from being *forced* to give up your land, and willingly selling it. As I said before NO ONE WAS FORCED OFF THEIR LAND until after the war that the arabs started. When war did start it was the arabs that were trying to use FORCE to push the Jews off of the land that they had legally purchased!! >Oh, and when this artifical coutry was set up, did EVERYONE >have equal say in the government, or were certain Northern Europeans of >jewish faith considered more equal. Of course, being given the short end >of the political and economic stick couldn't be considered an >incitement. Please explain why Israel is an "artificial" country while the rest of the countries from the old Ottoman Empire were not? How much say did EVERYONE have when the British set up KINGDOMS in countries like Saudi Arabia, Jordan, Egypt? Until recently Israel was the *ONLY* democracy in that region. IIRC Jordan and Egypt are the only arab countries that practice any form of democracy at all (and Jordan still has a powerfull king as its head of state). - -- - --------------------------------------------------------------- William H. Geiger III http://www.openpgp.net Geiger Consulting Cooking With Warp 4.0 Author of E-Secure - PGP Front End for MR/2 Ice PGP & MR/2 the only way for secure e-mail. OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html - --------------------------------------------------------------- Tag-O-Matic: OS/2 means...CURTAINS for Windows! -----BEGIN PGP SIGNATURE----- Version: 2.6.3a-sha1 Charset: cp850 Comment: Registered_User_E-Secure_v1.1b1_ES000000 iQCVAwUBNfb6MI9Co1n+aLhhAQEj6AQAoTIceRmxCIKd7mYwoN3mTtgWDKJWXL5V 6BRVKhamjqhBxcqroAXdxQHXD+ClMBSybT8IiSREewRW6F3JnFM9F7i3gylOHAdC w4q7KIhKUKeB9jCK5YvBqqEIqKwqNRTZvph/bMGD5QrcnetjlfOuI4pO8s9r3ffU I6Lv9GjB0lI= =ZDbu -----END PGP SIGNATURE----- From shamrock at cypherpunks.to Wed Sep 9 01:59:20 1998 From: shamrock at cypherpunks.to (Lucky Green) Date: Wed, 9 Sep 1998 16:59:20 +0800 Subject: usa-v-cej-wc.htm (fwd) In-Reply-To: <199809090053.TAA12423@einstein.ssz.com> Message-ID: On Tue, 8 Sep 1998, Jim Choate wrote: (Quoting criminal complaint) > > Internet group known as the "Cypherpunks." During the investigation of > > This guy has experience with the Internet and doesn't know the difference > between a group and a mailing list, what a maroon. I am sure he knows the difference. And in this case he was talking about a "Cypherpunks group", as in "the Cypherpunks militia", as in "criminal organization", not as in mailing list. PsyOps is in full force. -- Lucky Green PGP v5 encrypted email preferred. From gbroiles at netbox.com Wed Sep 9 02:00:36 1998 From: gbroiles at netbox.com (Greg Broiles) Date: Wed, 9 Sep 1998 17:00:36 +0800 Subject: radio net (fwd) In-Reply-To: <199809091239.HAA15369@einstein.ssz.com> Message-ID: <199809092202.PAA23854@ideath.parrhesia.com> At 07:57 AM 9/9/98 -0700, Brian W. Buchanan wrote: >On Wed, 9 Sep 1998, Jim Choate wrote: >> The FCC prohibits the transmission of encrypted data via analog or digital >> signals by amateurs. > >I'd love to see them try to enforce that. What about chaffing and >winnowing? Stego? Transmission of random noise? ;) Anyone have the text >of the actual rules concerning this? I don't know of a persistent web copy of the regs (only query-based ones, where the queries are only good for a few hours), but the regulation you're looking for is 47 CFR 97.113 - "(a) No amateur station shall transmit: . . . . (4) Music using a phone emission except as specifically provided elsewhere in this section; communications intended to facilitate a criminal act; messages in codes or ciphers intended to obscure the meaning thereof, except as otherwise provided herein; obscene or indecent words or language; or false or deceptive messages, signals, or identification" As I understand things (and I don't follow communications law, so I don't think my opinion is well-informed), the restrictions only apply to transmissions within the amateur band(s); so that's not applicable to, say, the FRS (family radio service, a band recently opened to non-licensed communications - used, for example, by the small Motorola TalkAbout radios), or cordless/cellphone frequencies. PDF copies of the FCC regs are online at ; amateur ("ham") radio is at Part 97. I'm working on a bigger rant about crypto and radio and guns and Y2K and the net; the gist of it is that amateur radio people, who are generally decent folks as individuals, have cozied up to the FCC to protect their "radio privileges" and have been rewarded with a mountain of bureacratic horseshit which outdoes even the idiotic regulations re crypto export and firearms .. and it's enforceable because the people who got licenses from the government to communicate with each other (but only in certain ways, on certain frequencies, after identifying themselves) fall over themselves to find people who *don't* think they need a license to communicate (or who think that the First Amendment *is* their license), and they rat those non-licensed folks out to the FCC. The FCC's got an army of unpaid volunteer informers who watch their fellow subjects to ensure compliance with these silly rules .. which leads to a situation where ham radios are mostly useful for talking to other people about how the weather is in some other part of the globe, and what kind of radio someone's got, and how big their antenna is. The FCC (and parallel organizations in other countries) are discussing liberalizing the regulations regarding amateur radio use, and a significant fraction of the current radio people are opposed to the liberalization, because it'll topple their little kingdoms and make their hard-earned licenses and certifications uninteresting. If you want to know what crypto regs and net use regs are going to look like in 10-20 years, look at the amateur radio regs now - we'll have citizens' committees (similar to the "block leaders" on GeoCities) who stay up late at night, unpaid, watching their fellow subjects for signs of pseudonym use, or the use of unlicensed/unapproved crypto, or "unlicensed Internet broadcasting". The citizens' committees will explain that they're dedicated volunteers devoted to keeping their communities "clean" and "orderly", and that without their intervention the FIC would be unable to ride herd on all of the wild people using programs nobody's inspected and communicating with ciphers nobody can read, saying things that just shouldn't be said because they'll make somebody upset or something. Besides, children might be reading. Everyone wants to be polite, don't they? -- Greg Broiles��������|History teaches that 'Trust us' gbroiles at netbox.com�|is no guarantee of due process. |_Kasler v. Lundgren_, 98 CDOS 1581 |(March 4, 1998) From whgiii at invweb.net Wed Sep 9 02:04:25 1998 From: whgiii at invweb.net (William H. Geiger III) Date: Wed, 9 Sep 1998 17:04:25 +0800 Subject: Citizenship silliness. Re: e$: crypto-expatriatism (fwd) In-Reply-To: <199809092123.OAA17355@leroy.fbn.bc.ca> Message-ID: <199809092205.SAA07866@domains.invweb.net> -----BEGIN PGP SIGNED MESSAGE----- In <199809092123.OAA17355 at leroy.fbn.bc.ca>, on 09/09/98 at 02:09 PM, "Raymond D. Mereniuk" said: >William H. Geiger IIIwrote >> Once an alternative fuel source is discovered that is more economical than >> oil, the arabs will slip back into obscurity. >Good point! Ever wonder why a decreasing commodity non- >renewable resource is becoming cheaper as the known reserves become >smaller? >Maybe they want to sell it all before it becomes obsolete and maximize >their income from that resource. >Within the oil business I have heard this mentioned in regards to >natural gas. Most of these countries are economically "one trick ponies" and have little export revenue outside of oil. Because OPEC has been a failure at enforcing production quotas there is a surplus of oil on the market thus driving down the cost (supply and demand). There are also large reserves of oil in Alaska, Siberia and elsewhere that are going unused along with other reserves that are too expensive to extract the oil at current market prices. The so called "oil shortage" of the 70's had more to do with Oil Companies profiteering than it did with any actual shortage. I have seen estimates in the past of our domestic oil reserves showing that we have enough oil to last another 100 years at out current rate of increased consumption if we stopped all imports today. Simple economics is that it is cheaper for us to import it than it is to produce it domestically. As much as the Greens whine and cry about alternative fuels, the simple fact is that as long as oil is cheap no one is going to switch. - -- - --------------------------------------------------------------- William H. Geiger III http://www.openpgp.net Geiger Consulting Cooking With Warp 4.0 Author of E-Secure - PGP Front End for MR/2 Ice PGP & MR/2 the only way for secure e-mail. OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html - --------------------------------------------------------------- Tag-O-Matic: Windows? Homey don't play that! -----BEGIN PGP SIGNATURE----- Version: 2.6.3a-sha1 Charset: cp850 Comment: Registered_User_E-Secure_v1.1b1_ES000000 iQCVAwUBNfb9g49Co1n+aLhhAQHHrQQAvX6z+/JeHTGzcT5PDdM+OeXOMcYDEIR3 mGm0I+R2Y0xzOgT01Z2h6DwJvy3e/bddd7+vFNUWuSCcbD33sFOO7psYWBgf2Vny xtnlNLQDjI54QLye/XIugRaUI50pSgDC/SOytIr7swB9fSHbgPYUlTulRb+EV5xE I0P5hjaPOzU= =f5ED -----END PGP SIGNATURE----- From jya at pipeline.com Wed Sep 9 02:15:25 1998 From: jya at pipeline.com (John Young) Date: Wed, 9 Sep 1998 17:15:25 +0800 Subject: A Cypherpunk Trial, Yes Message-ID: <199809092216.SAA19854@dewdrop2.mindspring.com> Adam Back wrote: >The collection of Toto's keys that he did post and the date he posted >might be useful to archive at jya.com so that we can see which if any >of Gordon's claims of proof of authentic Toto messages are valid. Yes, this is a crucial point. The innuendo of the complaint needs checking, and read with a heap of salt, although it's probable that the Feds have more than revealed so far. They've more fanciful stories to spiel of the confabulous material of the Mounties and Estevan Bombies, and SS agents and bunkered magistrates and imperiled Cindys needing protection from the Killer Bots. To hawk tickets we have added links within the complaint to all the Cpunk messages cited, but for those who don't want to download it again or search the archives, here they are chronologically: http://jya.com/jg062397.htm http://jya.com/jg090497.htm http://jya.com/jg120997.htm http://jya.com/jg121497.htm http://jya.com/jg060898.htm (not June 10, as in the complaint; thanks to jeff-anon) http://jya.com/jg072598.htm http://jya.com/jg072798.htm It was a pleasure to reread Toto(s)'s stuff while searching the cpunk amazing archives -- what a waterfall from everyone of free association, tants, jibes, potshots and richochets and self-mockery. I now believe the report from TX that Carl's got an IQ off the charts like all cpunks off the wall. It's worth keeping in mind that multiple users of pseudonyms is not unusual, at least among artists long before the Internet, and not only performance group e-mailers like the Totos, CJ Parkers, XxxMongers, Gus-Peters and endless Anonymees jostling for unrecognition. Two venerable and heavily-used nyms in Europe are Luther Bissett and Monty Cantsin. A dazzling Monty Cantsin posted here for a while. A Luther Bissett message ridiculing the recent kiddie porn sweep was posted to Cyberia a few days ago. But these pseudonyms and others are frequently used to taunt uptight authoritarians by substantial numbers of people, sometimes acting in concert but most often acting alone. An exemplary case of acting up like the Totos and other performance pseudo-Feynmann's here, is that of Dario Fo, the Italian artist who recently won the Nobel Prize. His off the chart genius, too, was in mixing the real and imaginary to challenge, and to frighten, authority into revealing their treacherous deception of the real and imaginary to maintain state and religious control century after century, culture after culture. He, too, was regularly condemned by those obsesses with holding onto power, and sometimes arrested, for his imitations of them at their most buffoonish and serious. Fo is from an earlier generation, though, and what more agressively offensive form is suitable for those younger we may be witnessing in the Jim Bells, Unknown Arrestees, and those here not yet projected onto the world stage but working the crowd most effectively. Black Unicorn, step up to the mike. Show magic. In any, case, I'm delighted to see Cypherpunks get credit in the Johnson pseudo-complaint for hosting transgressive art appropriate for the age of widespreading disinformation. A tumultous trial to amplify this forum's mayhemic virtues and vices would be magnificently chaotic and hopefully anarchic to the max. Pray for CJ to get an equally mad attorney to demand his day, and our day, in court. This under-recognized witness is eager for a highly offensive part to play, a gibbering idiot like Toto(s), you bet, I admire their style of spleen and threat to the fools of seriousness. From wwalker at netcom.com Wed Sep 9 02:48:58 1998 From: wwalker at netcom.com (Wayne Walker) Date: Wed, 9 Sep 1998 17:48:58 +0800 Subject: SSZ is Down Message-ID: <199809092250.PAA25688@netcom6.netcom.com> I'm sending this for Jim (ravage at ssz.com) as he is a bit too busy just now. He just arrived at home to find the dog pinned under the tree that fell and took out the phones and the ISDN. The dog is apparently uninjured (though only two feet from certain death). Don't know which dog. The ISDN is hurt and probably won't be up till sometime tomorrow. Later, Wayne -- Wayne Walker Austin, Texas E-mail wwalker at pobox.com "Real Programmers don't document, if it was hard to program it should be hard to use" From petro at playboy.com Wed Sep 9 03:06:55 1998 From: petro at playboy.com (Petro) Date: Wed, 9 Sep 1998 18:06:55 +0800 Subject: Citizenship silliness. Re: e$: crypto-expatriatism (fwd) In-Reply-To: <199809090416.AAA25585@domains.invweb.net> Message-ID: At 5:09 PM -0500 9/9/98, Raymond D. Mereniuk wrote: >William H. Geiger IIIwrote > >> Once an alternative fuel source is discovered that is more economical than >> oil, the arabs will slip back into obscurity. > >Good point! Ever wonder why a decreasing commodity non- >renewable resource is becoming cheaper as the known reserves >become smaller? Could it be that certain large players (say, the U.K, U.S. Soviet Union &etc) have a vested interest in cheap oil as long as possible, so they do things (like create the state of israel, and give it lots of economic aid) to destablize the region, keep the people of that area at each others throats &etc. so that OPEC can't agree to control prices... Nah, I'm just paranoid. petro at playboy.com----for work related issues. I don't speak for Playboy. petro at bounty.org-----for everthing else. They wouldn't like that. They REALLY Economic speech IS political speech. wouldn't like that. From aba at dcs.ex.ac.uk Wed Sep 9 03:33:45 1998 From: aba at dcs.ex.ac.uk (Adam Back) Date: Wed, 9 Sep 1998 18:33:45 +0800 Subject: A Cypherpunk Trial, Yes In-Reply-To: <199809092216.SAA19854@dewdrop2.mindspring.com> Message-ID: <199809092321.AAA07068@server.eternity.org> John Young writes: > Adam Back wrote: > > >The collection of Toto's keys that he did post and the date he posted > >might be useful to archive at jya.com so that we can see which if any > >of Gordon's claims of proof of authentic Toto messages are valid. > > Yes, this is a crucial point. The innuendo of the complaint needs > checking, and read with a heap of salt, although it's probable that > the Feds have more than revealed so far. I've been searching through looking at posts containing BEGIN PGP MESSAGE (ignoring the pgp-mime signatures which use the BEGIN PGP MESSAGE). Looky here, here's a "TruthMonger ", posted back in Sept. 97 (Toto's post below, so you can search for it in your cpunks mail folder/search engines/web based cpunks archives [1]). You were right Jim. Is this key the one used to sign any of the Toto rants, especially the ones the IRS agent has been poring over and referring to in the warrant? It has a sig on it from 0x66FB8C65. Any one fancy working out the set of Toto public keys which are cross certified? There are quite a few keys I think. Adam [1] ====================================================================== Date: Tue, 23 Sep 1997 01:58:52 +0200 (MET DST) Subject: Persistent Persona To: cypherpunks at toad.com From: nobody at REPLAY.COM (Anonymous) -----BEGIN PGP MESSAGE----- Version: 2.6.2 lQHgA4dN5oIAAAEEAM/3b3wHc1iQEmtk9NQhmrHmZmlCdZH4T3kf2APlwA/NRsfU pAa++0pBdgMMOr9QBMWNWuRuZriEUE/jH9cdMkgBeOrvsviFSe2wN074LrCZSugO 6KabPwokodYl8+R8xY5NC1pZUD4sYf49L6xOwpjiXukrRKqwABp0s99tXiQlAAUR ARwSOk76t7D7A/0n7XVeJ5qLKatxrzKZ1+U9PLhEeeQkknETkj9aFmRNrj/I4n/Y TgxKh74zK1/kM4y6bunTNU6+pBDPrvYJgqoq4kMlS3jXNdGBFn0Tw0j2klSZpXzA Tb593tKD66dztQXiYbYYhydQixUp22NwjruiIfwjFdtU7tOhKfLgZ+dGJQIAH40N 9Gpt3oSQ+ua6I1mOEYzWXdH8HdaNQKxGVRYVH71Wi2TpDLuZbbYq6RB9LDQ0VJO0 6DumKr1OSG32zda+kwIAvjPYd8xEOyCo2NJfL2ZUBh9/GC9nb9UTxdwFP7AFx0F7 DTA+prGb672ly3NAa7/gje2W4isd3NN+T6T13WHmcAH+MnnMDMclF/hNKrhR39aB 1ZvVEBh8yz8xWCm5BQOqp55KyJGgDY0kAcwqejE0PHV8dMG6TVteVvOu7D7GDFcB 4KXvtAtUcnV0aE1vbmdlcg== =HBLx -----END PGP MESSAGE----- -----BEGIN PGP PUBLIC KEY BLOCK----- Version: 2.6.2 mQENAzOCm1EAAAEIANB5WCFbEjUhNaZ2cEWuh9xcP48QBixzJpxPqGc0Sogj9W1L ezM5GDF0tZp5ksNbWf5+ErNxXo0yOM7LjDl+sRrEmcbuTkjqPJxG/q4JZ7Al3/FF h1SFGWpQNz9BPewgHS8/Lp9Ywl+ELeau+FPrr/xmktYifBBaaPUTS5oNMhn4Ih0r yez6WFn6lRYz+FLsXchjkg+I22tC1aD6iKv/BxCM//GzJ8UNkE7Vx94jZxJ/0vqE 3msqN1coj99okoggWzR5xe/wcLjUjXBw4Z208zhKNEC1AemkJV5HSbztfOgpZOqX 4dwsSDREfFcerM3gusIv3Gz+oU5WPTNSVeg5/HkABRG0GVRydXRoTW9uZ2VyIDx0 bUBkZXYubnVsbD6JARUDBRAzgptRPTNSVeg5/HkBAXUeB/4y3/VlUzua8TVbAiTW KPXvqTq28XHrhNrTiDWXX7KaFmRyZC20OLbRNtJH1XJUeZv7yhxXkIO2jW6e1i95 MWcx0JAheNjdqKAdNFUVaqs6R2+ySAU7PtfbfVx/RUxsTW8jLfppI7ajTf3E9z3u nO6NpN/z74DO659tiwfNjT8YoRH3EEomSKNZ3yIGhbyTHv+FOrJs8sQ3jhqmFb37 nr0er1+BWi9Sr2LS7aK+iCK/ZKhUqaofkoo6S/M6nTWKU7RiDhvK0wm40Lassb83 z3NjwN2NNZDwCPYM3d12LjxWA70qljx/qsSRptvkDmnLKXnEUvTsnf9dErhpYLtg yGBFiQCVAwUQM4LW/7BfjJBm+4xlAQEbJAP/RsKZ/khOS+4nD7JfPnKMKMVjDOif x0enjzf7kW//GnMsi70yaYi6QeoT0YUYVNQ+wWwGUPgAejs2PLk1VIbn4GIvRU+1 Uj6xTTfHkIibUtvz7LtC/JmNafWSETDnJOlqszgzTnE0duDwZ83ISWdzHkhEXnfC BxcPay75u1zC6FQ= =j6da -----END PGP PUBLIC KEY BLOCK----- From nobody at anon.olymp.org Wed Sep 9 04:04:01 1998 From: nobody at anon.olymp.org (Anonymous) Date: Wed, 9 Sep 1998 19:04:01 +0800 Subject: No Subject Message-ID: Dear Mr Gordon, When I checked the digital signature on the Internet death threat using the PGP software and JOHNSON'S secret key ring, the computer identified the signature as one of the signature keys stored in JOHNSON'S computer. Because both the "private" and "public" portions of the "key" were stored on JOHNSON'S computer, the message can be authenticated as having been generated by the person who possessed this "secret key" and knew the correct password. In other words, only the person possessing the secret key found on JOHNSON'S computer could have generated the "death threat" message. Why would you claim only one person possessed the secret key? As you doubtlessly know, some of the TruthMonger secret keys have been posted to Cypherpunks anonymously. This is not authentication. Thank you. From p60850v6 at auto.sixdegrees.com Wed Sep 9 04:06:39 1998 From: p60850v6 at auto.sixdegrees.com (sixdegrees) Date: Wed, 9 Sep 1998 19:06:39 +0800 Subject: Your new password Message-ID: <199809091043.DAA16307@toad.com> Name: Joe Cypherpunk sixdegrees password: tapesilk Congratulations Joe. You're well on your way to becoming a full sixdegrees(tm) member. Here is your member password: tapesilk. Use it to log-in on the home page at the sixdegrees Web site, http://www.sixdegrees.com. We'll ask you for a little more information to complete your registration, and then you'll be ready to start networking. It's important that you return to the site and log-in. Your membership will not be complete until you do so. Once you've successfully logged in with your password, just go to Personal Profile and you'll be able to choose your own password. Thanks for becoming part of sixdegrees. We're looking forward to seeing you at the site. ==================================================================== PLEASE NOTE: All replies to this address are processed by a computer. If you believe you received this e-mail in error, and it was not your intention to become a sixdegrees member, or if you have any problems, questions or requests send an e-mail to issues at sixdegrees.com and someone will get back to you as soon as possible. ==================================================================== E.SI.BAM.1 From aba at dcs.ex.ac.uk Wed Sep 9 04:17:22 1998 From: aba at dcs.ex.ac.uk (Adam Back) Date: Wed, 9 Sep 1998 19:17:22 +0800 Subject: more keys Message-ID: <199809100002.BAA07374@server.eternity.org> OK here's some more keys: [1] for "Magic Circle" [2] for "Necessarily Knott, ME" Again were these keys used to sign anything interesting? Key [1] was preceeded, perhaps meaningfully by this text in the long (22k) Epilogue 5: : Now: : : Go home, kick your fucking door in, place a disk in the floppy drive, and : type 'pgp -kxa "My KeyID" a:\secring.asc secring.pgp'. : Mail the disk to Louis J. Freeh : : Does your copy of PGP ask for a password before spitting out the KeyID : to any one of a thousand monkeys who sits at your keyboard and : randomly types in the above? : : My copy doesn't. : : Below is a copy of a key pulled off of my computer by 19 different people. : : It was pulled off of my hard drive by the first individual, who : proceeded to inform a second individual of the method used, and : challenged them to do the same thing, using a different method. The : second did so, and passed all the information along to a third person, : etc., etc. : : Nineteen people, nineteen different methods. if Toto apparently speaks in parables, and via fiction etc. is he saying that the RCMP or someone else pulled his keys off his computers? How does this correlate with his posts on the subject of hassles with the RCMP, and confiscation of some of his machines? Adam [1] ====================================================================== This one has userid: Magic Circle -----BEGIN PGP MESSAGE----- Version: 2.6.2 lQHgAzHiUJEAAAEEAP1slPSwrVd90NVBqfsw6+JP64icmuSrztzyCgaPcXHRiy/J Kbgi9/gy1iCnWcQh1ATaSzblATSU24Xw+4Ow4s5xOvdxFGoIop6EXwTNfwRa2EZr 6ZZ41Glr9g1g9H0RJwJlkldUcunVNekXel1MYA8VJJynvtZVuntA11SbF0AdAAUT Ab7sJWrM/6azA/vV2wq4sdyfngUgUHq8Hlo5NHvEjyh2cSoMMNxnpKR3+XYRbYTd HhwfbOvji1cWnVJF6GBxe3nLvbkbHJU+K3hNNYOT9JKMahu+5wKMbHkwToSsLzyQ kgn2JlKDJugoycdjInlQs7NiyoOrIYWQzSi4yGbhl2t1Au+67UY/r57J9AIA8V/6 J5x1wH7MACSWU91jXXxpJvSud053nrSgnupEUbFX3dXm0GXf6vdhbQW9eYsIJmCI pZLrqwBcFe2GWhk9AAIActyoxAgCvFyGSJHHzJVVoKfWk/gjmKs/r7+J9vWnBAkc Pg0wqUn66Hmq0op28gEXU3qKJiJ8rAQETAxBhfpnJgH83CrrEZDcBY8IKsFI2A19 KahohyDXmsEHIWqKZLSwzjsYcf049RCUxNDPJZchuoMEPkK9414KyPqlJbStsFaE YZ6itAxNYWdpYyBDaXJjbGU=3D =3DGEo6 -----END PGP MESSAGE----- and it was posted in a message dated 20 Oct. 97 with Subject: InfoWar Epilogue 5 / TEXT ====================================================================== [2] ====================================================================== -----BEGIN PGP MESSAGE----- Version: 2.6.2 lQD4AzRmZWoAAAECAMnJrqd/TERCLeFscdgNvwVxrVG4tRm0VThMEXXkctCGMaUD jcETxcV0ZseRUcyUKfqlLd3CRsIwClozlWHHR7EABREAAfwJ5D1Ecilit/Mwsn4N GcWZXWpg3mM6/Epzs2pEhi3I926ZiWPB1DKmdZR4nVemsnwv47SWLJyCnE4sben5 h8oHAQDTFaJDJSN7+9NToOE4NFiruAXXMIHEQ6ZH21oW1sYSiwEA9LmhvfahDVKo 1/CMtxxozAtG8rWycBYVIVrkDKiVgjMBAKeB2VY/f7tzmv7KxUUtN9607+CQlWPp E3HBLTlwtuRAUxC0FU5lY2Vzc2FyaWx5IEtub3R0LCBNRQ== =caeb -----END PGP MESSAGE----- posted in a message dated 10 Nov. 97 with Subject: Key Signing ====================================================================== Adam From Jrjeffro at aol.com Wed Sep 9 19:18:46 1998 From: Jrjeffro at aol.com (Jrjeffro at aol.com) Date: Wed, 9 Sep 1998 19:18:46 -0700 (PDT) Subject: No Subject Message-ID: <199809100227.TAA19261@emke.com> HaCkaZ OnlY Da EliTe HelLO YaLL DiS is Da MaDD AAOOLL HaCka Ima startin a GreWp fOR HaCs Only So In OthA WerDS yA gOttA KnOw The WAreZ anD HoW toO UsEr FaTe AnD AOL So MaIl Or Im Me FoR Da TeTaIls If YeR LeeTo K Pe at CE FrOmE The LeeTs HacK JeFFrO) > From cicho at free.polbox.pl Wed Sep 9 05:01:23 1998 From: cicho at free.polbox.pl (cicho) Date: Wed, 9 Sep 1998 20:01:23 +0800 Subject: Text Analysis and Shakespeare In-Reply-To: <199809040233.TAA29401@netcom13.netcom.com> Message-ID: <35f66746.1781792@193.59.1.1> Vladimir Z. Nuri wrote: >a friend gave me a book called "the cryptographic >shakespeare" in which he found some patterns in >shakespearean texts that might tend to suggest >some codes were embedded in it. In what sense? Most of the time, plain old lit analysis is looking for "keys" and then applying them to "unlock" the "hidden message". An allegory is a simple substitution cipher, and then it goes all the way up to lit equivalents of one time pads and steganography (say, 'Lolita' or Frank O'Hara's poetry). Concerning Shakespeare, I thought those involved in this discussion might be amused by the following. I would have posted it earlier but didn't have the book at hand, and then Lem's prose isn't particularly friendly for the translator. It's all taken out of context, but will speak for itself, I am sure. -------------- STANISŁAW LEM DIARY FOUND IN A BATHTUB (chapter IV, excerpt) �Here goes,� I said at last, opening my eyes. �My ears have yet not drunk a hundred words of that tongue's utterance, yet I know the sound. Art thou not Romeo?� �Fine.� The captain punched keys briskly, typing in the line I offered. A slot that looked like an ancient letterbox began spitting out paper ribbon which spun slowly in the air. Captain Prandtl held it gently and handed it to me. I held the tip of the ribbon, waiting patiently. The paper snaked out of the slot inch by inch and when I tugged at it carefully I could feel the feeding mechanism vibrate. Suddenly, the barely perceptible tremor ceased and the ribbon spun on, blank. I held it to my eyes. �BAS TARD MAT HEWS BAS TARD DRAW HIM & QUARTER WITH HOLY DE LIGHT MAT HEWS PIG SEED MATH HEWS MATH�. �And what is this?� I asked, not even trying to conceal my dismay. The captain nodded. �I presume that when he wrote the scene, Shakespeare was unfavourably disposed towards a man named Mathews. . . and encoded the sentiment in the lines of his play.� �You expect me to believe that? Do you mean to say that he deliberately filled this wondrous, lyrical passage with crude interjections at some Mathews person?� �I never said he did so deliberately. A code is a code, no matter what the author�s intent.� �Do you mind?� I asked. I approached the control panel and keyed in the freshly obtained plaintext myself. The ribbon moved again, twisting into a spiral. I caught a brief, peculiar smile on Prandtl�s lips, but he didn�t say a word. �THAT ASS YEAH HER ASS FUN FAT ASS FUN FAT YEAH ASS HER ASS HEY THAT FAT ASS� - read the tidily printed syllables. �What is this?� I demanded. �What is it?!� �Another layer. Well, what did you expect? We�ve exposed a deeper layer of the psyche of a 17th century Englishman, plain and simple.� �This cannot be! You�re telling me this beautiful poem is nothing but a vessel to conceal some pigs and asses?! And that if you feed the most sublime literary achievements, pinnacles of human genius, immortal epics, sagas - it will all come out hodgepodge?� �Hodgepodge it is, mister. Art... literature... do you realise what their purpose is? To divert attention!� �From what?� �You don�t know?� �I don�t.� �That�s too bad. You ought to know. What are you doing here, then?!� I didn�t answer. With skin on his face taut like a tent�s canvas stretched over sharp rocks, he continued in monotone: �A broken code remains a code. Under the eye of a professional cryptographer it will shed one moult after another. It is inexhaustible. It has no end nor bottom. You can delve into progressively deeper, progressively more arcane strata, but this journey never terminates.� -------------- (This 1960 novel is available in English translation, hopefully better than my attempt here, as "Diary Found in a Bathtub", though i *really* should be called The (Original) Puzzle Palace, 'coz that's what it's about. It's Kafka plus David Lynch plus TCMay rolled in one :) .marek -- General Frenetics, Discorporated: http://www.lodz.pdi.net/~eristic/ From 661850g1 at auto.sixdegrees.com Wed Sep 9 05:09:49 1998 From: 661850g1 at auto.sixdegrees.com (sixdegrees) Date: Wed, 9 Sep 1998 20:09:49 +0800 Subject: Joe Cypherpunk Message-ID: <199809091200.IAA18283@www.video-collage.com> Name: Ivan Cypherpunk E-Mail Address: cypherpunks at algebra.com sixdegrees Password: listhome Hi. You've been sponsored as "Significant Other" by Joe Cypherpunk as part of something called sixdegrees, one of the fastest growing phenomena on the Web, located at http://www.sixdegrees.com You may have already heard of the six degrees of separation concept - where everyone on the planet is connected to each other through fewer than 6 people. Well, we haven't quite connected the whole world yet, but there are over a million people participating, and over 900,000 of them are connected in one giant chain. And, just by confirming your relationship with Joe, you can instantly tap into this interconnected community of interesting people from all over the world. So what? Well, by getting connected, you can come to the Web site (which is completely FREE) and use a whole variety of valuable, fun and intriguing services that make use of this massive chain of connections. You can come see who's logged on the site right now and when you find someone interesting, we'll show you exactly how you're connected no matter how many degrees it takes, and then you can instant message them. You can also find out how you're connected to that head of personnel at the big firm where you've been trying to get your foot in the door. You can chat with people from around the globe and then see who you know in common. You can post burning questions on your own personalized bulletin board and get valuable answers from your "circle" (your friends and friends of friends). You can even get Movie recommendations from the people you're connected to. So, stop by the site at http://www.sixdegrees.com to learn more and give it a try. (You can log in with this password: listhome). ==================================================================== You can also get things started and get yourself connected right from this e-mail: ** To confirm your relationship with Joe, just send a reply that says only CONFIRM on the first line of the message body * To deny this particular relationship (but keep open the possibility of joining sixdegrees if the concept intrigues you) send a reply that says only DENY * And, if you'd like to make sure you don't hear from us again (even if somebody else you know lists you as a contact) then simply send a reply which says REMOVE in the SUBJECT LINE so we can process your request right away Thanks, and we look forward to seeing you at sixdegrees. ==================================================================== And, if you're really ambitious, you can get your network of connections growing right away. Just list the people you think might be interested in participating in sixdegrees and we'll contact them with an e-mail like this one which mentions your name and invites them to join. Just follow these directions: * Click your mail program's REPLY button. * On the FIRST line of the message body of the reply e-mail that opens, type only the word CONFIRM to let us know that you are in fact Joe's Significant Other. * On the next line of the message body list the first and last names and e-mail addresses of the people you'd like to invite (you can list as many as you'd like - but we recommend you list at least two), and the relationship numbers that correspond with how those people are related to you. MAKE SURE: * That the first name, last name, e-mail address and relationship number are separated by SEMI-COLONS. * You follow the format of these examples: John; Smith; jsmith at fakeplace.com; 12 Jane; Doe; superjane at fakeplace.com; 3 * And that you define each relationship by choosing a number from this list: 1=wife 2=husband 3=life partner 4=significant other 5=mother 6=father 7=sister 8=brother 9=daughter 10=son 11=other family member 12=friend 13=employer 14=employee 15=co-worker 16=client 17=service provider 18=business contact 19=fellow alum 20=acquaintance We look forward to hearing from you! =================================================================== PLEASE NOTE: All replies to this address are processed by a computer. If you have any problems, questions or requests send an e-mail to issues at sixdegrees.com and you'll receive a prompt and courteous response. And, if you'd like to review our privacy statement just visit http://www.sixdegrees.com/Public/About/Privacy.asp ==================================================================== sixdegrees is Registered in the U.S. Patent and Trademark Office. E.DB.ANB.1 From aba at dcs.ex.ac.uk Wed Sep 9 05:19:16 1998 From: aba at dcs.ex.ac.uk (Adam Back) Date: Wed, 9 Sep 1998 20:19:16 +0800 Subject: Toto `PLP' a key? Message-ID: <199809100105.CAA07777@server.eternity.org> Then there is this `key', which appears to be fabricated, though the armor checksum checks if you modify it as follows.... -----BEGIN PLP PRIVATE KEY----- Version: Pretty Lousy Privacy v6.66 Comments: No Comment UPghm21YcptuKTiUHPwTn4xSjMKfsfVDRKwKWtx1teuauHiM/IBzWMH5+nhxhVjO gOuUIXkcJXcjr1yG2QVGWLJndKBHC3wI/eRC5zYaQGwtz97hpQ9iAJl9hpIYoeKi R/Qe8eC8vQnyOCx7Gare+OuoqLRJj5IvvS3BDShb1mr3s3U1LVEhmI9kS5br6NWY V1J3l2hCk8cdqDRZmgjUoq32mAwK/vTbijCg5Yk1CCkXO3mvia3rNeVdrYJ3/Pv9 t2jHIlAL0qAyJQMdz2qFcmvLOxB3ZiZhA+VYDaeXZ5TZNEz/K+TSU8brMInfaUKi P/R/4YerdYjN8/10xz/j/gJjgIkEddToUYjt2VQDv8E/xcXT0YJZhNWIT/u+MHVF ns9RWIH5J+UxcKPUPjDB7WvuO4+WvoT5xCtPbQhUlpuJrDfWLCjUd6orzovr6yZx HcxBSl8EGy4oULWi5ztrw1fyXm4AmpDB5QNgmWcILIbWNDOAePqxvrAjJEhLHQar y6eHYoL/nuOQonZsB66DhXnlXSghBGp+sNs3XXIOkKHtbPk1jqT9MHg9oe7OwiA4 mcQUpM3XKOPUXcMwEtRzDJnIaeZo3xbwRnmdSaGAyPujFJdz58QLHOte2pcSAkrA Jtrs+SrhZw== =zXsO -----END PLP PRIVATE KEY----- (Posted in message Subject: Re: EFF $10,000,0000 Challenge, Date: 6 Sep 97). Now, change the ----- lines to the correct, and the first 5 chars are the same on PGP public key blocks 'mQENAz' (though this claims to be a SECRET KEY BLOCK) -----BEGIN PGP PUBLIC KEY BLOCK----- Version: Pretty Lousy Privacy v6.66 Comments: No Comment mQENAz1YcptuKTiUHPwTn4xSjMKfsfVDRKwKWtx1teuauHiM/IBzWMH5+nhxhVjO gOuUIXkcJXcjr1yG2QVGWLJndKBHC3wI/eRC5zYaQGwtz97hpQ9iAJl9hpIYoeKi R/Qe8eC8vQnyOCx7Gare+OuoqLRJj5IvvS3BDShb1mr3s3U1LVEhmI9kS5br6NWY V1J3l2hCk8cdqDRZmgjUoq32mAwK/vTbijCg5Yk1CCkXO3mvia3rNeVdrYJ3/Pv9 t2jHIlAL0qAyJQMdz2qFcmvLOxB3ZiZhA+VYDaeXZ5TZNEz/K+TSU8brMInfaUKi P/R/4YerdYjN8/10xz/j/gJjgIkEddToUYjt2VQDv8E/xcXT0YJZhNWIT/u+MHVF ns9RWIH5J+UxcKPUPjDB7WvuO4+WvoT5xCtPbQhUlpuJrDfWLCjUd6orzovr6yZx HcxBSl8EGy4oULWi5ztrw1fyXm4AmpDB5QNgmWcILIbWNDOAePqxvrAjJEhLHQar y6eHYoL/nuOQonZsB66DhXnlXSghBGp+sNs3XXIOkKHtbPk1jqT9MHg9oe7OwiA4 mcQUpM3XKOPUXcMwEtRzDJnIaeZo3xbwRnmdSaGAyPujFJdz58QLHOte2pcSAkrA Jtrs+SrhZw== =zXsO -----END PGP PUBLIC KEY BLOCK----- and the armor checksum checks, and pgp5 reports (the garbled): Adding keys: Key ring: 'p1.asc' Type Bits KeyID Created Expires Algorithm Use pub 37916 00000000 2002-08-13 2079-10-29 (null) uid *** This key is unnamed *** 1 matching key found which looks to be garbage; perhaps it is is just garbage with a valid public key checksum? This seems like it would require writing some software to acheive? The probability of a random checksum success on a garbled file, as the armor checksum is a 24 bit checksum is 1/2^24... quite unlikely. Ideas? Adam From aba at dcs.ex.ac.uk Wed Sep 9 05:20:17 1998 From: aba at dcs.ex.ac.uk (Adam Back) Date: Wed, 9 Sep 1998 20:20:17 +0800 Subject: Toto describing a visit from SS agents Message-ID: <199809100035.BAA07635@server.eternity.org> Again while searching for keys, another encrypted message (Subject: Secret Service With A Smile - SAHMD!!! / Pwd: lco, Date: 31 Jul 98) this message appears to refer to a visit from US Secret Service agents, apparently due to their imputing some kind of threat to US president(?) in one of Toto's rants. Decrypted copy below [1]. Adam [1] ====================================================================== Secret Service With A Smile - SPACE ALIENS HIDE MY DRUGS!!! ___________________________________________________________ It was only natural for me to wonder what it was about the Secret Service Agents who visited me today that enabled them to act like decent, pleasant people during the course of the personal interview portion of their investigation into my life and psyche. The question was answered, to my satisfaction, at the point when the more veteran of the two agents explained that, despite my rugged handsomeness and my delightful personality, they would have to CrushMeLikeABug if it became apparent to them that my already tentative physical and mental existence came into conflict with their official duty to protect the President of the United States. I realized that they were professionals, with a high degree of integrity, and that their concern probably went far beyond the fact that if the Nation lost the CommanderInChief on their shift, they could pretty much kiss their Christmas Bonus goodbye... It was also apparent that their ability to be quite reasonable and pleasant human beings--while making it plain that informing me that putting me away for observation in Springfield, Missouri, could easily take away a full year of my life, was *meant* to be a threat--without having to engage in a heavy-handed affectation of MachoAuthority, was the result of their actually *having* the authority to decide, here and now, whether or not my life would instantly become a living hell. The Secret Service Agents were also extremely intelligent, not even blinking before passing on my offer to testify against myself, in return for immunity from prosecution. (When I made the same offer to RCMP OffalSlurs, they had to contact their superiors, who held a meeting with OffalSchills behind the closed doors of the Canadian Justice Apartment, before finally declining my offer.) I was able to relax and be cooperative in dealing with the Agents, since, when your fate is in the hands of someone with GenuineAuthority, whether their intentions are GoodOrEvil (TM) is not nearly as important as to whether or not they happen to be StupidFucks (TM) who can ruin your life over something as simple as misunderstanding your request that they make their questions more 'lucid.' ("That's it, you sick, fucking pervert! Jim, get the kilo of heroin out of the trunk...") Wrong Question #29 When Dealing With StupidFucks: "Excuse me, but do your employers *know* that you carry a gun? I mean, have they ever met you, or were you hired by mail? Can you actually shoot a gun without moving your lips?" Although the Secret Service Agents were in possession of an email I had sent a few minutes or hours previously, from Pima College --> (who I immediately tried to Rat Out as the leader of a ChildSexRingDedicatedToTheViolentOver ThrowOfTheUSGovernment, in order to save my own skin), the agents seemed much more interested in a chapter of SAHMD!!! which contains notification of an OfficialDeathThreat to pretty much DoGodAndEverybodyOnTheFaceOfTheEarth. I tried to placate them by reaching over with a pen and adding an 'Un' in front of the word 'Official,' but they were not really impressed, informing me that the point they were trying to make had to do with it being unacceptable, from their point of view, for me to use the words 'Death,' 'Threat,' and 'President' all in the same paragraph, let alone all in the same sentence. {"Well, excuuusssee *me*!"} Realizing that it was probably not an opportune moment to try to hit them up for a donation toward the maintenance of my planned PresidentialDeathThreatAnonymousRemailer, I casually turned the donation jar so that they couldn't see the label, and I set it down. Actually, I couldn't be certain that I had actually written the chapter, or portion thereof, with which the agents seemed most concerned, since I find it difficult to distinguish between the work that is mine alone, and the work that is a collage of various participants in the writing and dissemination of 'The True Story of the InterNet' manuscripts, if I don't have access to the files on the computer on which they were created and stored. Nonetheless, I refrained from pointing out that the phrase that indicates that the writer "might" conceivably "whack" someone or another GovernmentPersonage, might equally apply to the stance taken by the Secret Service Agents, themselves, if the Founding Fathers were to be believed when they indicated that it is the right and the duty of the citizenry to take up arms against their rulers, if need be, in the interest of Democracy, Freedom, Justice, or in DivineRetribution against the High&Mighty if they take a drink out of your beer while you're in the restroom, having a leak. (I'm not certain about that last example, but I have no doubt that the Founding Fathers *meant* to include that...) I refrained from attempting to engage the Agents in philosophical debate in regard to some of the finer points surrounding the issues of Freedom of Speech, since the purpose of their visit was obviously geared toward impressing upon me the duties encompassed by their job description, their professional competence in doing their job, and the fact that the necessity of making a return visit would very likely be an indication that Uncle Sam was about to become my new landlord. To tell the truth, I was in a pretty scattered state of mind at the time of their visit, and I undoubtedly failed to adequately understand a good portion of the dialogue which took place, but they were very clear in explaining that, given my current state of unwelcomeness in Canada, I am running out of countries to go to, and that I should give serious consideration as to whether or not I wanted my next Literary Spamology to be titled, "Midnight Express II." Hhhmmm...decisions, decisions... Since my reading of the Secret Service Agents is that they are highly ethical professionals, with little need to persecute an individual out of thin-skinned, personal vindictiveness, I guess it wouldn't hurt to mention that, minutes after their departure, Linda Lou arrived home, announcing that there was yet another Tarantula in the driveway, headed toward the house... The obvious conclusion, of course, is that the Secret Service Agents are actually Reptilian Nazis, who are deeply involved in the WorldWidePlotAgainstMe. This, in turn, leads to the dilemma of whether or not I should, on the occasion of a return visit, jump them and drive wooden stakes through their hearts, turning them into quivering pools of smoking, green slime. (Or is that Vampires? Shit! I'd better check, first, or it could lead to a really embarassing situation.) On the other hand, since they were quite civil and reasonable in their dealings with me, and they apparently didn't eat any of the dogs, while here (although it might have been a different story, if we had poodles), then perhaps their is a chance that we and the Reptilian Nazis can live together in peace...unless it is a SneakyTrick (TM), of course...and they are trying to *confuse* me, so that I don't warn TheOthers...and they were only so pleasant because they were inwardly laughing at me for not realizing that, starting tomorrow, they are going to take control of the whole face of the globe, turning all humans into LobotomizedSlaves who exist only to serve their ReptilianNaziMasters! QUICK, EVERYBODY! ARM YOURSELVES AND RUN FOR YOUR LIVES!!! PREPARE TO ENGAGE THE REPTILIAN NAZIS IN VIOLENT, BLOODY STRUGGLE! START BY WHACKING OUT THE LAWYERS, AND THEN... Hold it! What the fuck am I ranting on about? The Masses are *already* LobotomizedSlaves who exist only to serve their ReptilianNaziMasters... Maybe the agents were just here to see whether or not Baby is a poodle. That makes more sense, since the Reptilian Nazis don't really give a FatRat'sAss about the Jews, but they *do* want to round up all of the poodles shortly before the arrival of their Reptilian Nazi Relatives, so that there is plenty of barbeque at their PicnicToCelebrateTheConquestOfEarth. Yeah, that's gotta be it... Actually, I'm rather glad that the Secret Service Agents dropped around to meet me in person, since people reading my copious literary effluvia sometimes mistakenly get the impression that I am some kind of Dogamned Weirdo, or something. Still, I wish I had been able to refrain from going, "Cuckoo-Cuckoo" on the hour and the half-hour during their vist. But, what the hell...I bet that a *lot* of the people they visit do that... ====================================================================== From aba at dcs.ex.ac.uk Wed Sep 9 05:20:22 1998 From: aba at dcs.ex.ac.uk (Adam Back) Date: Wed, 9 Sep 1998 20:20:22 +0800 Subject: RCMP hate page still around? Message-ID: <199809100017.BAA07580@server.eternity.org> Toto's web pages at sympatico are I think gone (or at least disabled). Whilst searching for more Toto private keys I found this encrypted message (Subject: Prologue 14/0 -- Passoword: cypherpunks), posted 26 Mar. 98. You have to use a passphrase in all CAPS to get it to decrypt. Text below (seems to be a rant about police abuse, I presume some local news item in Canada). Hardly one thinks worthy of receiving the attentions of the RCMP... Wonder why the RCMP decided to confiscate Toto's computers (and get his account at sympatico first monitored and one presumes then cancelled). Adam ====================================================================== The Official Royal Canadian Mounted Police HATE Page Kudos of the week go to Constable Dave Voller, who legally murdered a gun-toting Wagon-Burner and the nine year old future glue-sniffer clinging to her skirt. Congrats, Dave. A hundred points for the woman, and five hundred for the kid... This is a good time to remind RCMP Officers across Canada that, despite our long history of exercising a strong hand (and an even stronger nightstick ;?) in keeping the Wagon-Burners from storming the gates of white society, current social and legal trends make it necessary for us to take every step necessary to cover our ass when we take those measures needed to keep them in their proper physical place (the reservation) and to keep them in their proper attitudinal place even when they remain in their proper physical place. Remember that the procedures that we have put in place are for your protection, and that if you stay within our guidelines, you can pretty much waste as many Wagon-Burners as you wish, without suffering legal consequences. Constable Voller followed proper procedure in charging right into a volatile situation with no backup, so that there would be no possibility of conflicting stories from other officers invited to participate in the adrenaline high involved. He also had the foresight to waste the bitch with a shotgun, so that a wide enough target area would be covered to take care of any potential witnesses whose stories would not be subject to government pressure as to their content. Rest assured that if you murder a Wagon-Burner according to proper procedure, that the members we claim not to be able to spare to supervise a potentially deadly encounter with Wagon-Burners will suddenly become available to pore over the murder site and absolve you of any wrongdoing. A host of spin-doctors will also suddenly appear to remind the head Wagon-Burners that 'good relations' with the Federal Government are conditional on 'going along to get along.' The RCMP Officers of the Wild, Wild West continue to lead the way in keeping the Wagon-Burners constantly on the run, no matter how far they run to try to escape. The Estevan Detachment of the RCMP is living up to their long tradition of effectively using other arms of law enforcement to effectively harass Wagon-Burners while using a minimum of Federal resources. You undoubtedly remember last year's article about the member of the City of Estevan Police Department who was successful in getting the courts to uphold his own brand of Frontier Justice for decades, until he made the mistake of using a 'real' informant, thus making his cases vulnerable to conflicting testimony as to his questionable activities. As we reported, the prosecutor was able to railroad a couple of kids who were represented by incompetent legal aide lawyers, by having the arresting officer help to mentally muscle them outside the presence of legal counsel, but the #1 Wagon-Burner on the local yokel's list was not able to be railroaded at that time. We reported with pride on the Estevan Detachment of the RCMP helping that same local officer to once again set up the Wagon-Burner by helping in the operation while staying out of the main action, so that the Wagon-Burner and his White-Whore Wife were financially broken to the point where they had to cop a plea. Due to the Estevan Detachment's foresight, they didn't "get any on 'em" when the local yokel finally got his chain yanked on bogus grounds that protected the City of Estevan from taking any responsibility for his years of abuse of authority. To bring you up to date, not only is the Wagon-Burners oldest little glue-sniffer currently being railroaded on criminal charges, but the Estevan RCMP are once again setting a fire under the Wagon-Burner's ass by supporting the Provincial Game Warden's persecution of the Wagon-Burner for daring to hunt on the land that we stole from him, once again saving Federal dollars from having to be used to finance their dirty work. Today's Humor: "First they came for the Wagon-Burners, but I was not a Wagon-Burner, so I didn't speak up. Then they came for the Revisionists, but I was not a Revisionist, so I didn't speak up. Then they came for the Freedom of Speech Advocates, but I was not a Freedom of Speech Advocate, so I did not speak up. "Then they came for the Jews, and I got to put pepper-spray in their Jesus-Killing eyes..." ~ Constable Hettinga "I *love* this country!" ====================================================================== From ravage at einstein.ssz.com Wed Sep 9 05:22:20 1998 From: ravage at einstein.ssz.com (Jim Choate) Date: Wed, 9 Sep 1998 20:22:20 +0800 Subject: radio net (fwd) Message-ID: <199809091239.HAA15369@einstein.ssz.com> Forwarded message: > Date: Wed, 09 Sep 1998 00:51:49 -0700 > From: "William J. Hartwell" > Subject: Re: radio net > I think a radio network linked to the Amateur networks sending secure > packets, > using tunneling or maybe just encrypted traffic (There may be some FCC > rules regarding this. The FCC prohibits the transmission of encrypted data via analog or digital signals by amateurs. ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From ravage at einstein.ssz.com Wed Sep 9 05:32:02 1998 From: ravage at einstein.ssz.com (Jim Choate) Date: Wed, 9 Sep 1998 20:32:02 +0800 Subject: NEW TRAVEL INFO -- Worldwide Caution (fwd) Message-ID: <199809091244.HAA15435@einstein.ssz.com> Forwarded message: >From owner-travel-advisories at stolaf.edu Wed Sep 9 03:16:16 1998 Date: Fri, 4 Sep 1998 16:22:27 -0400 From: owner-travel-advisories Subject: NEW TRAVEL INFO -- Worldwide Caution Sender: "U.S. Department of State" <76702.1202 at compuserve.com> To: travel-advisories at stolaf.edu Message-ID: <199809041625_MC2-5871-DEBE at compuserve.com> MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Precedence: bulk X-List-Info: LN=travel-advisories WHOM=76702.1202 at compuserve.com STATE DEPARTMENT TRAVEL INFORMATION - Worldwide Caution ============================================================ PUBLIC ANNOUNCEMENT - WORLDWIDE CAUTION September 4, 1998 U.S. DEPARTMENT OF STATE Office of the Spokesman In light of the bombings of the U.S. Embassies in Nairobi, Kenya and Dar es Salaam, Tanzania on August 7, 1998 and the U.S. air strikes in Afghanistan and Sudan on August 20, 1998, the potential for retaliatory acts against Americans and American interests exists. In addition, terrorists, including Osama Bin Ladin, continue their threats against the United States and have not distinguished between military and civilian targets. We take these threats seriously. The U.S. has increased security at United States Government facilities worldwide and a number of our posts have suspended or limited services to the public. The Department of State reminds Americans to maintain a high level of vigilance and to take appropriate steps to increase their security awareness to lessen their vulnerability. Americans should maintain a low profile, vary routes and times for all required travel, and treat mail from unfamiliar sources with suspicion. American citizens traveling abroad should contact the nearest U.S. embassy or consulate by telephone or fax for up-to-date information on security conditions. Current information on post operations is also available on the Internet at http://travel.state.gov. In addition, U.S. citizens planning to travel abroad should consult the Department of State's Public Announcements, Travel Warnings, Consular Information Sheets, and regional travel brochures. This Public Announcement replaces the August 20, 1998, Public Announcement Worldwide Caution and expires on December 4, 1998. ----- ----- ----- ----- ----- ----- ----- ----- ----- ----- ----- ----- ----- The "travel-advisories at stolaf.edu" mailing list is the official Internet and BITNET distribution point for the U.S. State Department Travel Warnings and Consular Information Sheets. To unsubscribe, send a message containing the word "unsubscribe" to: travel-advisories-request at stolaf.edu Archives of past "travel-advisories" postings are available at the URL: "http://www.stolaf.edu/network/travel-advisories.html" or via Gopher: gopher.stolaf.edu, Internet Resources/US-State-Department-Travel-Advisories From Housh at johnsonfood.com Wed Sep 9 06:13:41 1998 From: Housh at johnsonfood.com (Gregg Housh) Date: Wed, 9 Sep 1998 21:13:41 +0800 Subject: Any good hacking sites? Message-ID: any1 not1ce th4t jun0 1s ju5t a5 b4d a5 aol? Gregg "If your going to use the net, might as well exploit little children." - Anonymous > -----Original Message----- > From: kamikaze23 at juno.com [SMTP:kamikaze23 at juno.com] > Sent: Tuesday, September 08, 1998 5:22 PM > To: cypherpunks at toad.com > Subject: Any good hacking sites? > > hey all, > > any1 know of any good hacking sites that teach u the basics and stuff? > > also, any1 here into AOL hacking??? > > thanx, > ~Fallen Angel > > _____________________________________________________________________ > You don't need to buy Internet access to use free Internet e-mail. > Get completely free e-mail from Juno at http://www.juno.com > Or call Juno at (800) 654-JUNO [654-5866] From vznuri at netcom.com Wed Sep 9 06:28:23 1998 From: vznuri at netcom.com (Vladimir Z. Nuri) Date: Wed, 9 Sep 1998 21:28:23 +0800 Subject: IP: Casual Talk Can Produce Wealth of Corporate Intelligence Data Message-ID: <199809100229.TAA03175@netcom13.netcom.com> From: Richard Sampson Subject: IP: Casual Talk Can Produce Wealth of Corporate Intelligence Data Date: Tue, 08 Sep 1998 22:42:21 -0400 To: "ignition-point at majordomo.pobox.com" Casual Talk Can Produce Wealth of Corporate Intelligence Data Sep. 6 (The Record/KRTBN)--"Spies are the most important element in war, " Sun Tzu wrote in "The Art of War," "because upon them depends an army's ability to move." The man in this story is one such spy, but his battlefield isn't a blood-soaked Third World country, and his army wears no uniforms and carries no guns. His battlefield is the grand panorama of world commerce, his army a well-known, high-tech company in North Jersey. This man -- he spoke on condition of anonymity -- for four years has been the company's director of competitor intelligence. His job is to study competitors and gather information his company can use to make strategic decisions on everything from mergers to new-product launches to pricing. Unlike covert operatives -- who engage in all sorts of skulduggery to gather information, from phone taps to undercover work -- he relies on public sources: the Internet, government documents, published reports, and trade shows. Beyond that, his greatest resource is the eyes and ears of company employees: the salesman who regularly encounters competitors on the plane, the executive who hobnobs with officers from other high-tech companies, the company spokesman who deals with the media, the secretary who answers the phone. "Eighty percent of what you need to know about your competition is already in your company," he said. "You just don't know where it is." On the Internet, this corporate spy will monitor competitors' Web sites, and also his company's own, using software tools that allow him to determine who is visiting the site and which pages they're viewing. Since many competitors use aliases, additional research is necessary to determine who is targeting the site. He also monitors chat groups on the Web to determine who is discussing his company in cyberspace. Within the company itself, "several dozen" people are assigned competitive intelligence functions, including human resources personnel, secretaries, and press officers. But everybody is in on it. Airline tickets issued to employees carry a suggestion to be "competitor aware," a subtle reminder to keep eyes and ears open at all times and to make sure they don't inadvertently leave documents where competitors can find them. And, according to the spy, it works. Here's how: In one instance, a salesperson preparing to demonstrate a product for a customer was asked if any special equipment was needed. When the salesperson requested a specific type of monitor, the customer said it wouldn't be a problem, since a competing high-tech company had recently requested the identical monitor. >From that bit of information, the salesperson was able to determine which product his competitor was pitching and to tailor his presentation to point out the weaknesses in the competitor's product, allowing him to close the sale. In another instance, a salesperson called up a customer and discovered that another company had begun offering a deep discount on a competing product. The move was initially interpreted as a "full court press" to gain market share, and the company began contemplating deep discounts of its own. But within 24 hours, the competitive intelligence unit -- using media reports and the Internet -- was able to determine that the competitor was trying to decide whether to discontinue the product. Salespeople were dispatched with instructions to inform customers of that fact -- a so-called FUD mission, since it instills "fear, uncertainty, and doubt" in customers -- and a potentially devastating price war was averted. "It was a bullet avoided," he said. The corporate spy's true forte, however, is the trade show, where dozens of companies gather to hawk their wares, and schmoozing is the order of the day. As many as a dozen operatives will be employed to gather information at a trade show, each one assigned to a specific exhibition booth, panel discussion, or press conference. One might sidle up to a human resources representative at a competitor's exhibition booth, start a conversation about the difficulty of finding good employees, and walk away minutes later with the number of employees the company hired for a specific unit. Another might collar a reporter for the trade press and pump him for information. Another might be assigned to stake out the restaurant where the executives from a competing company gather for breakfast every morning. Another might hurl questions at a competing executive who is speaking at a panel discussion. "A lot of times you can ask them a question from the floor," he said. "You never hear them say, 'Who do you work for again?' " Within 24 to 48 hours, all the operatives will write down what they have learned, which is then analyzed and condensed into a document for distribution within the company. The corporate spy says his operatives adhere to a strict ethics code that prohibits them from misrepresenting who they are and what they are doing. The code also prohibits theft, trespassing, and other illegal acts. But he said the inability of most people to refrain from casual conversation with a friendly stranger makes such tactics unnecessary. What remains vitally necessary, however, is making the best use of the information at one's disposal. "You're not seeing Reds under the bed," he said, an allusion to Cold War-era spying that targeted Communists. "You're trying to extend your product cycle by six months. And you have to be aware that information can sink you in a hurry." By Louis Lavelle -0- Visit The Record, Hackensack, N.J., on the World Wide Web at http://www.bergen.com (c) 1998, The Record, Hackensack, N.J. Distributed by Knight Ridder/Tribune Business News. END!A$9?HK-BIZ-SPY News provided by COMTEX. [!WALL+STREET] [ARMY] [ART] [COMMERCE] [CONFERENCE] [CORPORATE] [GOVERNMENT] [INTERNET] [KRT] [MARKET] [MARKET+SHARE] [MEDIA] [NEWS] [NEWSGRID] [RESEARCH] [SOFTWARE] [TRADE] [USA] [WAR] -- ----------------------- NOTE: In accordance with Title 17 U.S.C. section 107, this material is distributed without profit or payment to those who have expressed a prior interest in receiving this information for non-profit research and educational purposes only. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml ----------------------- ********************************************** To subscribe or unsubscribe, email: majordomo at majordomo.pobox.com with the message: (un)subscribe ignition-point email at address ********************************************** www.telepath.com/believer ********************************************** From vznuri at netcom.com Wed Sep 9 06:28:27 1998 From: vznuri at netcom.com (Vladimir Z. Nuri) Date: Wed, 9 Sep 1998 21:28:27 +0800 Subject: IP: FTC: Internet merchant barred for life from "net-based" commerce Message-ID: <199809100229.TAA03186@netcom13.netcom.com> From: Richard Sampson Subject: IP: FTC: Internet merchant barred for life from "net-based" commerce Date: Wed, 09 Sep 1998 15:10:43 -0400 To: "ignition-point at majordomo.pobox.com" FTC: Internet merchant barred for life from "net-based" commerce SEP 9, 1998, M2 Communications - An Internet "entrepreneur" who advertised low priced computers in online auction houses and collected the sales price but never delivered the goods would be barred for life from conducting any Internet commerce, under the terms of a settlement with the Federal Trade Commission. The defendant, who did business as Experienced Designed Computers and C&H Computer Services, would be prohibited from advertising, marketing or selling goods or services via the Internet, from making misrepresentations about any goods or services he sells and from violating the Mail or Telephone Order Merchandise Rule. The defendant, Craig Lee Hare, also known as Danny Hare, operates from Lake Worth, Florida. In April, 1998, the FTC alleged that Hare had used online auction houses to offer new and used computers for sale. After "successful bidders" paid as much as $1,450 per computer, Hare provided them with neither the computer nor a refund. At the request of the FTC, a federal district judge issued a temporary restraining order and froze Hare's assets, pending trial. The agency asked the court to issue an injunction permanently barring Hare from violating the FTC Act and the Mail or Telephone Order Merchandise Rule. The stipulated permanent injunction and final judgment announced today would settle those charges. The settlement would permanently bar Hare from participating in any online commerce. It also would bar him from misrepresenting his identity in commercial e-mail and misrepresenting any fact that is material to a consumer's decision to purchase any goods or services in any form of commerce. In addition, the order would prohibit future violations of the Mail or Telephone Order Merchandise Rule. Finally, the order provides record keeping provisions to allow the FTC to monitor compliance. Stephanie J. Herter, also known as Stephanie Branham, also entered in a settlement with the Commission. She was named in the FTC complaint against Hare as a relief defendant because checks Hare received from consumers were deposited in her checking account. In settlement of the charges against her, Herter will release Hare's funds in that account to be used for consumer redress, or, if that is impractical, to be deposited into the U.S. Treasury. The stipulated permanent injunctions were filed in the U.S. District Court, Southern District of Florida, West Palm Beach Division. NOTE: These consent judgments are for settlement purposes only and do not constitute an admission by the defendants of a law violation. Consent judgments have the force of law when signed by the judge. Copies of the complaint, Stipulated Final Judgment and Orders and a consumer alert, "Online Auctions: Going, Going Gone!" are available from the FTC's web site at http://www.ftc.gov and also from the FTC's Consumer Response Center, Room 130, 6th Street and Pennsylvania Avenue, N.W., Washington, D.C. 20580; 202-FTC-HELP (202-382-4357); TDD for the hearing impaired 202-326-2502. To find out the latest news as it is announced, call the FTC NewsPhone recording at 202-326-2710. -0- (C)1994-98 M2 COMMUNICATIONS LTDCONTACT: Claudia Bourne Farrell, Office of Public Affairs Tel: +1 202-326-2181 *M2 COMMUNICATIONS DISCLAIMS ALL LIABILITY FOR INFORMATION PROVIDED WITHIN M2 PRESSWIRE. DATA SUPPLIED BY NAMED PARTY/PARTIES.* News provided by COMTEX. [!BUSINESS] [!HIGHTECH] [!INFOTECH] [!WALL+STREET] [ADVERTISING] [BUSINESS] [COMMERCE] [COMPUTER] [CONSUMER] [E-MAIL] [FLORIDA] [INTERNET] [MARKETING] [MTO] [NEWS] [NEWSGRID] [ONLINE] [PENNSYLVANIA] [SALES] [TRADE] [TRIAL] [USA] [WASHINGTON] -- ----------------------- NOTE: In accordance with Title 17 U.S.C. section 107, this material is distributed without profit or payment to those who have expressed a prior interest in receiving this information for non-profit research and educational purposes only. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml ----------------------- ********************************************** To subscribe or unsubscribe, email: majordomo at majordomo.pobox.com with the message: (un)subscribe ignition-point email at address ********************************************** www.telepath.com/believer ********************************************** From jya at pipeline.com Wed Sep 9 06:35:31 1998 From: jya at pipeline.com (John Young) Date: Wed, 9 Sep 1998 21:35:31 +0800 Subject: CP Cite Message-ID: <199809091318.JAA17051@camel7.mindspring.com> We're putting together copies of cpunk messages Jeff Gordon cites in the Carl Johnson complaint and have found all in the archives except one dated June10, 1998. Jeff describes it: 15. On June 10, 1998, an anonymous message was posted to the Cypherpunks Internet group. In the message, it is stated that the bomber "placed the bomb before embarking on a middle-leg of the TruthMonger SoftTarget Tour of Planet Terra." The message also referenced an RCMP plan to "drive a known madman crazy enough to finally put him away turned bad, and resulted in a backlash of death and destruction ..." I noted that this message contained information about the courthouse bomb incident which had not previously been made public, and was written in a style and manner which I recognized as being similar to other writings which my investigation has linked to JOHNSON. In his interview with Special Agent Sheridan, JOHNSON acknowledged using the name TruthMonger, and also stated he had psychological problems, both of which correspond to this message. We'd appreciate getting a copy (yes, Jeff, if you would, anon ok). BTW, there's a brief message from Lucky Green yesterday in the archives on CEJ which did not appear on the cyberpass list, AFAIK, although it was sent to ssz.com. Do such gaps happen much in CDR? Yeah, yeah, I post to toad, and aim to be the last one who does, so drive me AP-mad. BTW2, anybody know what Linda Reed thinks of her infame? BTW3, we heard from TX that CJ's music/perform art is going to be boosted in concert with his god-sent cornseed of publicity. From nobody at sind.hyperreal.art.pl Wed Sep 9 06:54:35 1998 From: nobody at sind.hyperreal.art.pl (HyperReal-Anon) Date: Wed, 9 Sep 1998 21:54:35 +0800 Subject: Exported PGP Message-ID: <501945eb2c5615fb70017a1fb5b2d1e3@anonymous> I've never heard this anywhere else but I was browsing www.infowar.com and I saw this quote Question the priorities Private sector intellectual property deserves pride of place Data integrity and system survivability are the priorities Unencumbered encryption is vital for national competitiveness Protecting all private sector data is more important than a marginal enhancement to our government�s ability to catch criminals and terrorists ****PGP is not good enough�"exported PGP" has Soviet back doors Lotus reported to have given away half the key to NSA�Swedes are pissed Does anyone have info on this? I assume that since the source code for PGP is publicly available someone would have questioned this already... The full url I was using: http://www.infowar.com/class_1/class1_083198a_j.shtml From Raymond at fbn.bc.ca Wed Sep 9 07:35:49 1998 From: Raymond at fbn.bc.ca (Raymond D. Mereniuk) Date: Wed, 9 Sep 1998 22:35:49 +0800 Subject: Citizenship silliness. Re: e$: crypto-expatriatism (fwd) In-Reply-To: <199809092123.OAA17355@leroy.fbn.bc.ca> Message-ID: <199809100350.UAA17882@leroy.fbn.bc.ca> Petro wrote >Could it be that certain large players (say, the U.K, U.S. Soviet >Union &etc) have a vested interest in cheap oil as long as possible, >sothey do things (like create the state of israel, and give it lots of > economic aid) to destablize the region, keep the people of that area at > each others throats &etc. so that OPEC can't agree to control prices... > > Nah, I'm just paranoid. "William H. Geiger III" wrote >Most of these countries are economically "one trick ponies" and >have little export revenue outside of oil. Because OPEC has >been a failure at enforcing production quotas there is a surplus of >oil on the market thus driving down the cost (supply and demand). As William stated most of the OPEC nations are economic "one trick ponies" whose leaders don't see the big picture and the benefits of a cartel where all members co-operate. Israel was part of the justification for screwing the world for more money in the so called 70s oil crisis. I would think that if the Arabs didn't have Israel to hate they would find some other group. If you go back to the late 40s you will find many political deals done by the British which didn't make a lot of sense. The British walking out of Burma and turning political control over to whoever the goofs are that ruined that country made no sense whatsoever. The British turned political control of Malaysia over to the ethnic Malays where the Malays are not the original people of that region. The Malays were immigrants much like most of the Chinese, they just got there 300 years earlier. Falling oil prices probably hurt the USA and Soviet governments more than any possible benefit. The Soviets export oil so they are hurting. The US and most other western style democracies tax oil products based on its wholesale cost and retail selling pricing so they would see reduced revenues. >There are also large reserves of oil in Alaska, Siberia and >elsewhere that are going unused along with other reserves that are >too expensive to extract the oil at current market prices. The so >called "oil shortage" of the 70's had more to do with Oil Companies >profiteering than it did with any actual shortage. I have seen >estimates in the past of our domestic oil reserves showing that we >have enough oil to last another 100 years at out current rate of >increased consumption if we stopped all imports today. Simple >economics is that it is cheaper for us to import it than it is to >produce it domestically. You can add possible large reserves in the Canadian Arctic. The oil companies started to find it and they tried to think of a way to transport it. The Canadian gov't vetoed all the transportation alternatives so the oil companies stopped exploration. The middle east countries do have the oil reserves with the lowest cost of production. Most reserves in North American are moderate to high cost of production. Now if you want to be paranoid.... Before the 70s energy crisis we all drove big cars which had no problem doing the 65 MPH speed limit and back then we used to pass on two-lane highways. The energy crisis came and we all accepted gutless foreign made small cars which consumed less energy and had a problem with the 55 MPH speed limit and passing was impossible on a two-lane highway even if we found a section which was not double-lined. Now we have cheap oil. Big powerful vehicles are back and we are not embarrassed to consume energy any more. I have no idea where society is heading but I do like have a more powerful vehicle which capable of passing a vehicle already doing 65 MPH. >As much as the Greens whine and cry about alternative fuels, the >simple fact is that as long as oil is cheap no one is going to switch. The whole Greens or tree-hugger thing is a bit hypocritical. Ask them if they have electrical appliances in their home and the answer is always yes. For a number of years the Greenpeace fundraisers would show up at the door asking for money to battle the forest industry and the evil pulp mills which used chlorine in their bleaching process and they would have white paper in their clipboards. Virtually Raymond D. Mereniuk Raymond at fbn.bc.ca From ravage at einstein.ssz.com Wed Sep 9 07:37:19 1998 From: ravage at einstein.ssz.com (Jim Choate) Date: Wed, 9 Sep 1998 22:37:19 +0800 Subject: CP Cite (fwd) Message-ID: <199809091442.JAA15831@einstein.ssz.com> Forwarded message: > Date: Wed, 09 Sep 1998 09:12:28 -0400 > From: John Young > Subject: CP Cite > BTW, there's a brief message from Lucky Green yesterday > in the archives on CEJ which did not appear on the > cyberpass list, AFAIK, although it was sent to ssz.com. Do such > gaps happen much in CDR? I've noticed such discrepencies in the past as well. Unfortunately I have been unable to figure out exactly why a particular remailer (I've seen every one do this at one time or another) will drop the resend. I don't know whether it's a time out in the various time-to-lives or what. I've noticed that the various remailers will sometimes change message id's causing multiple copies as well. I don't believe it's important since it doesn't happen very often, as near as I can determine. As long as any archives subscribe to all the lists and use some sort of duplicate filtering it shouldn't be a real issue. I do know that SSZ holds messages at least 4 days and my ISP holds them for 5 days so I don't think it's a connection problem resulting in dropped traffic. ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From bd1011 at hotmail.com Wed Sep 9 08:08:16 1998 From: bd1011 at hotmail.com (Nobuki Nakatuji) Date: Wed, 9 Sep 1998 23:08:16 +0800 Subject: MISTY encryption algorithm source code Message-ID: <19980910035745.18097.qmail@hotmail.com> MISTY source code posted by me at long ago had many mistake. Attachment file are revised MISTY source code and revised readme. Thanks. ______________________________________________________ Get Your Private, Free Email at http://www.hotmail.com misty.zip -------------- next part -------------- A non-text attachment was scrubbed... Name: zip00000.zip Type: application/octet-stream Size: 2793 bytes Desc: "" URL: From brian at smarter.than.nu Wed Sep 9 08:12:05 1998 From: brian at smarter.than.nu (Brian W. Buchanan) Date: Wed, 9 Sep 1998 23:12:05 +0800 Subject: radio net (fwd) In-Reply-To: <199809091239.HAA15369@einstein.ssz.com> Message-ID: On Wed, 9 Sep 1998, Jim Choate wrote: > > Date: Wed, 09 Sep 1998 00:51:49 -0700 > > From: "William J. Hartwell" > > Subject: Re: radio net > > > I think a radio network linked to the Amateur networks sending secure > > packets, > > using tunneling or maybe just encrypted traffic (There may be some FCC > > rules regarding this. > > The FCC prohibits the transmission of encrypted data via analog or digital > signals by amateurs. I'd love to see them try to enforce that. What about chaffing and winnowing? Stego? Transmission of random noise? ;) Anyone have the text of the actual rules concerning this? -- Brian Buchanan brian at smarter.than.nu Never believe that you know the whole story. From Raymond at fbn.bc.ca Wed Sep 9 08:13:02 1998 From: Raymond at fbn.bc.ca (Raymond D. Mereniuk) Date: Wed, 9 Sep 1998 23:13:02 +0800 Subject: Spot The Fed Message-ID: <199809100428.VAA17926@leroy.fbn.bc.ca> About a week ago I sent a message the list regarding Toto and how I found it hard to believe he was a country & western artist. I mentioned a tribute to Toto and an URL pointing to a web page on a data security product at a web site which is total spoof. The URL lead to a page touting a data security product called PUP, Pretty Useless Privacy. I shamelessly plagiarized Toto's concept, and even some of sentences, from a post on Pretty Lousy Privacy. I even managed to get most of the characteristics of Snake Oil in one sentence. The graphics on the page is a Snake Charmer. Now you figure the Feds will visit for sure, just try and spot them. Resolve the IP addresses to a domain name might work but if they had a clue they would use dummy domains. I would like to nominate the folks at IP address 204.249.179.54, or better yet the whole Class C as possible Feds. The IP address does not resolve to a domain name, actually all the IP address in the Class C plus the 204.249.178 Class C. I didn't bother to try any other neighbouring Class Cs. I can understand a few IP addresses of isolated machines not resolving to a domain name but not the whole Class C. You should also be able to see the default gateway's domain name. Seems like this may be the site of some paranoid privacy loving folks. If I have slandered any Cypherpunk and their company, who may be at least privacy loving, please accept my apologies in advance but please let me know if I made a mistake. From ian.sparkes at 17.dmst02.telekom400.dbp.de Wed Sep 9 08:13:16 1998 From: ian.sparkes at 17.dmst02.telekom400.dbp.de (Sparkes, Ian, ZFRD AC) Date: Wed, 9 Sep 1998 23:13:16 +0800 Subject: Archives? What archives? (fwd) Message-ID: <000001b000000184*/c=de/admd=dbp/prmd=telekom400/o=dmst02/ou=17/s=sparkes/g=ian/@MHS> Here's the deal... if someone gets a copy of the archives to me somehow, I pledge that I will get them burned and will distribute them for cost price. I assume there will be two CDs as the data is apparently around 1GB. I have already checked, and for a run of 300 (should be enough to cover all the non-apathetic CP list members) the costs are: DM1,67 = 92 cents each = $1,84 + VAT = $2,15. Add postage onto this. A really great idea would be to include the coderpunks archive on any space that were left over. But first of all, I'll keep the focus as the greatest enemy of 'good' is 'great'. Note: IMPORTANT: The rep was emphatic - you shouldn't forget that this price includes *2 color* labelling! Makes the offer kind of irresistable doesn't it? Why am I doing this? Because just as Tim pointed out, this has been discussed more than once but there have been no results. At least none that I have heard of in the last year. One point - I am outside of the US. Good for europeans, but perhaps a little expensive for US-CPs. Maybe someone would like to take over the US distribution. (WHGIII?) I could get 50% to the states for distribution. Anyone wants to arrange this with me, contact me off-list. If no one does, then I'll start bugging people until something happens ... Ian At 14:28 04.09.98 -0500, you wrote: >In , on 09/04/98 > at 09:02 PM, Asgaard said: > >>Ray Arachelian wrote: > >>>It was done... Remo Pini (www.rpini.org or some such) was the dude > >>www.rpini.com > >>Crypto CD Vol 1 has lots of stuff on it but I never found any archive of >>the CP list(s). Perhaps I didn't look enough. > >I didn't find any either. > >Also someone mentioned previously of pre-1995 online archives. Anyone have >a pointer to these? > >There is a local company here that does CD duplication and Harddrive >archiving to CD. I can check and see how much they would want to burn a CD >with the CP archives on it. I would imagine that list members would prefer >RockRidge extensions? OS/2 supports both Joliet & Rockridge so it does not >matter to me one way or the other. :) > >-- >---------------------------------------------------------- ----- >William H. Geiger III http://www.openpgp.net >Geiger Consulting Cooking With Warp 4.0 > >Author of E-Secure - PGP Front End for MR/2 Ice >PGP & MR/2 the only way for secure e-mail. >OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html >---------------------------------------------------------- ----- > > > From petro at playboy.com Wed Sep 9 08:28:15 1998 From: petro at playboy.com (Petro) Date: Wed, 9 Sep 1998 23:28:15 +0800 Subject: Citizenship silliness. Re: e$: crypto-expatriatism (fwd) In-Reply-To: <199809082359.SAA12044@einstein.ssz.com> Message-ID: At 11:22 PM -0500 9/8/98, William H. Geiger III wrote: >-----BEGIN PGP SIGNED MESSAGE----- > >In <199809082359.SAA12044 at einstein.ssz.com>, on 09/08/98 > at 06:59 PM, Jim Choate said: > >>Forwarded message: > >>> Date: Tue, 8 Sep 1998 18:17:45 -0500 >>> From: Petro >>> Subject: Re: Citizenship silliness. Re: e$: crypto-expatriatism > >>> planet and take all that fucking oil with them. > >>I wonder how the new realization that the calthrate deposits in the ocean >>bottem off the continental shelf make fine fuel and it's replenishable >>and may be of a larger quantity than the oil reserves will effect the >>power balance. > >Once an alternative fuel source is discovered that is more economical than >oil, There already are several, the problem is the cannot be centralized the way oil is. Alcohol is acceptable (and in some ways better) than gasoline for cars and motorcycles, but anyone can set up a still and compete with RDS & Standard. A mix of solar, wind, coal, hydroelectric, nuclear and other sources can provide most of the rest of the power we need. It is just a matter of being willing to make the investment in the changeover. > the arabs will slip back into obscurity. Yeah, and the US will suddenly find that there is no longer an reason to provide Isreal with HOW MUCH military support per year? petro at playboy.com----for work related issues. I don't speak for Playboy. petro at bounty.org-----for everthing else. They wouldn't like that. They REALLY Economic speech IS political speech. wouldn't like that. From mmotyka at lsil.com Wed Sep 9 08:39:21 1998 From: mmotyka at lsil.com (Michael Motyka) Date: Wed, 9 Sep 1998 23:39:21 +0800 Subject: radio net In-Reply-To: Message-ID: <35F6A0C6.76D3@lsil.com> Ryan Lackey wrote: > > Is anyone else interested in setting up a radio net (probably packet radio > relay) to relay small quantities of data in the event the telecommunications > infrastructure becomes unavailable (either technically or legally/politically/ > militarily)? There are existing packet relay nets, but in my experience > amateur radio people, especially in the US, are very willing to roll over > for the government at the slightest cause. > > I think the cost would be something like $1-5k per station, and it could > be done in a fairly turnkey fashion. Exactly how to handle routing and > what protocol to use on the network is kind of an open question -- there > are a lot of solutions, none of them optimal. This is a very nice idea but tread carefully here. RF communications is one area in which the no-domestic-crypto law IS established. The idea of spies with shortwaves in their cigar boxes may seem hopelessly outdated but I think the law still stands. Talk to some packet radio guys - I think some have had trouble just sending unknown file formats. This was a while back though - who knows - progress may have been made. Mike From tcmay at got.net Wed Sep 9 08:42:18 1998 From: tcmay at got.net (Tim May) Date: Wed, 9 Sep 1998 23:42:18 +0800 Subject: usa-v-cej-wc.htm (fwd) In-Reply-To: <199809090053.TAA12423@einstein.ssz.com> Message-ID: At 1:56 AM -0700 9/9/98, Lucky Green wrote: >On Tue, 8 Sep 1998, Jim Choate wrote: >(Quoting criminal complaint) >> > Internet group known as the "Cypherpunks." During the investigation of >> >> This guy has experience with the Internet and doesn't know the difference >> between a group and a mailing list, what a maroon. > >I am sure he knows the difference. And in this case he was talking about >a "Cypherpunks group", as in "the Cypherpunks militia", as in "criminal >organization", not as in mailing list. Who told him about the Cypherpunks Militia? Does he know about the Jihad to Liberate the Encrypted Places? Do they know about Cypherpunks Target Practice? (BTW, the use of the terms "group" and "mailing list" semi-interchangeably is a natural one. I do it all the time. Check the archives.) --Tim May "The tree of liberty must be watered periodically with the blood of tyrants...." ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Licensed Ontologist | black markets, collapse of governments. From ravage at einstein.ssz.com Wed Sep 9 08:45:13 1998 From: ravage at einstein.ssz.com (Jim Choate) Date: Wed, 9 Sep 1998 23:45:13 +0800 Subject: Citizenship silliness. Re: e$: crypto-expatriatism (fwd) Message-ID: <199809091556.KAA16265@einstein.ssz.com> Forwarded message: > Date: Wed, 9 Sep 1998 10:03:25 -0500 > From: Petro > Subject: Re: Citizenship silliness. Re: e$: crypto-expatriatism (fwd) > There already are several, the problem is the cannot be centralized > the way oil is. That's not really the problem... > Alcohol is acceptable (and in some ways better) than gasoline for > cars and motorcycles, but anyone can set up a still and compete with RDS & > Standard. The problem with alcohol is that there isn't enough free land in order grow enough plant material to provide the necessary quantities without seriously restricting the amount of land available for actual foodstuffs and living space (unless you want everyone to move to Black Rock desert or live on the top of a mountain). Alcohol is also much more of a fire hazard than gas. It burns hotter, isn't put out by water spray easily, and burns invisibly (well all right in the near-UV). > A mix of solar Again not enough land to make it feasible, not to mention the low efficiency of even the best panels. > wind Not enough places in the US (or anywhere else for that matter) where the wind blows with sufficient force 18 hours a day to make it economical. > coal Coal isn't an acceptable substitute, mainly because there isn't enough low-sulphur deposits in the world to supply the US, let alone the rest of the world. Plus it isn't renewable. > hydroelectric Not enough rivers with sufficient hydrodynamic head to make this work for the US let alone the rest of the planet. > nuclear I'll buck the general consensus because I like nuclear energy, however there is a single MAJOR caveat, we need fussion and not fission reactors to make it economical. The waste problem with fission reactors is enough to vote in the negative on them. > and other sources cop-out. The reality is that the clathrate deposits occur across the entire ocean. The existing Magnesium Nodule treaties could be extended to cover the countries that don't have coastlines. They are the first renewable, occurring in sufficient quantity, and with realizable and economicly feasible methods for mining, processing, and distributing to have been put on the table. As to the gas and oil folk being against them, they're about the only ones with an existing infrastructure (ie extracting oil and gas from the sea floor) to take advantage of the source, implying that existing changes in the infrastructure would be minor. ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From mmotyka at lsil.com Wed Sep 9 08:54:10 1998 From: mmotyka at lsil.com (Michael Motyka) Date: Wed, 9 Sep 1998 23:54:10 +0800 Subject: Zooko on JYA, cpunks, and surveillance (was: Re: Can't tell the kooks without a scorecard? Re: Monkey Wrenching the Echelon Engine) In-Reply-To: <2C396693FBDED111AEF60000F84104A721BFA5@indyexch_fddi.indy.tce.com> Message-ID: <35F6A1BF.559A@lsil.com> Fisher Mark wrote: > I've had some dealings with > local government people on real estate issues (who have generally been > reasonably helpful), and the set of people who like practical jokes has a > (nearly?) null intersection with the set of people who go into government > service. > Heard a good Jefferson quote on cpsan - "Literalism is a hobgoblin of small minds" -Thomas Jefferson From bbt at mudspring.uplb.edu.ph Wed Sep 9 08:54:22 1998 From: bbt at mudspring.uplb.edu.ph (Bernardo B. Terrado) Date: Wed, 9 Sep 1998 23:54:22 +0800 Subject: Forwarded mail.... Message-ID: Do you have the same mail? ---------- Forwarded message ---------- Date: Wed, 9 Sep 1998 19:27:05 -0700 (PDT) From: Jrjeffro at aol.com HaCkaZ OnlY Da EliTeHelLO YaLL DiS is Da MaDD AAOOLL HaCka Ima startin a GreWp fOR HaCs Only So In OthA WerDS yA gOttA KnOw The WAreZ anD HoW toO UsEr FaTe AnD AOL So MaIl Or Im Me FoR Da TeTaIls If YeR LeeTo K Pe at CE FrOmE The LeeTs HacKJeFFrO) > From tcmay at got.net Wed Sep 9 08:56:37 1998 From: tcmay at got.net (Tim May) Date: Wed, 9 Sep 1998 23:56:37 +0800 Subject: Misty bot (Re: MISTY encryption algorithm source code) In-Reply-To: <19980910035745.18097.qmail@hotmail.com> Message-ID: At 8:57 PM -0700 9/9/98, Nobuki Nakatuji wrote: >MISTY source code posted by me at long ago had many mistake. >Attachment file are revised MISTY source code and revised readme. >Thanks. > Does this guy have any life besides popping up every several weeks and making a stupid comment about "MISTY"? He never engages in debate, he never comments on things going on in Japan, he never comments on export issues, he doesn't even defend himself from our criticisms. He must be a bot...the Misty bot. "My name Nobuki-san. You send money, I send source. Chop-chop, you go now. I go read Misty Manga. " (This last paragraph thrown in to make sure the various folks redolent with "Caucasian guilt" will snort and sniff and claim I am a racist...because Nobuki Nakatuji, with his suspicious "hotmail.com" address, sure won't step forward.) --Tim May (This space left blank pending determ. of acceptability to the gov't.) ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, ComSec 3DES: 831-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Licensed Ontologist | black markets, collapse of governments. From declan at well.com Wed Sep 9 09:10:24 1998 From: declan at well.com (Declan McCullagh) Date: Thu, 10 Sep 1998 00:10:24 +0800 Subject: Toto describing a visit from SS agents In-Reply-To: <199809100035.BAA07635@server.eternity.org> Message-ID: I mention the alleged threats against the president in my article today, and link to the email. -Declan On Thu, 10 Sep 1998, Adam Back wrote: > > Again while searching for keys, another encrypted message (Subject: > Secret Service With A Smile - SAHMD!!! / Pwd: lco, Date: 31 Jul 98) > this message appears to refer to a visit from US Secret Service > agents, apparently due to their imputing some kind of threat to US > president(?) in one of Toto's rants. > > Decrypted copy below [1]. > > Adam > > [1] > ====================================================================== > Secret Service With A Smile - SPACE ALIENS HIDE MY DRUGS!!! > ___________________________________________________________ > > It was only natural for me to wonder what it was about the Secret > Service Agents who visited me today that enabled them to act like > decent, pleasant people during the course of the personal interview > portion of their investigation into my life and psyche. > > The question was answered, to my satisfaction, at the point when > the more veteran of the two agents explained that, despite my > rugged handsomeness and my delightful personality, they would have > to CrushMeLikeABug if it became apparent to them that my already > tentative physical and mental existence came into conflict with > their official duty to protect the President of the United States. > I realized that they were professionals, with a high degree of > integrity, and that their concern probably went far beyond the > fact that if the Nation lost the CommanderInChief on their shift, > they could pretty much kiss their Christmas Bonus goodbye... > It was also apparent that their ability to be quite reasonable > and pleasant human beings--while making it plain that informing me > that putting me away for observation in Springfield, Missouri, > could easily take away a full year of my life, was *meant* to be > a threat--without having to engage in a heavy-handed affectation > of MachoAuthority, was the result of their actually *having* the > authority to decide, here and now, whether or not my life would > instantly become a living hell. > > The Secret Service Agents were also extremely intelligent, not > even blinking before passing on my offer to testify against myself, > in return for immunity from prosecution. > (When I made the same offer to RCMP OffalSlurs, they had to > contact their superiors, who held a meeting with OffalSchills > behind the closed doors of the Canadian Justice Apartment, > before finally declining my offer.) > > I was able to relax and be cooperative in dealing with the > Agents, since, when your fate is in the hands of someone with > GenuineAuthority, whether their intentions are GoodOrEvil (TM) > is not nearly as important as to whether or not they happen to > be StupidFucks (TM) who can ruin your life over something as > simple as misunderstanding your request that they make their > questions more 'lucid.' > ("That's it, you sick, fucking pervert! Jim, get the kilo of > heroin out of the trunk...") > > Wrong Question #29 When Dealing With StupidFucks: > "Excuse me, but do your employers *know* that you carry a gun? > I mean, have they ever met you, or were you hired by mail? Can > you actually shoot a gun without moving your lips?" > > Although the Secret Service Agents were in possession of an > email I had sent a few minutes or hours previously, from Pima > College --> (who I immediately tried to Rat > Out as the leader of a ChildSexRingDedicatedToTheViolentOver > ThrowOfTheUSGovernment, in order to save my own skin), the > agents seemed much more interested in a chapter of SAHMD!!! > which contains notification of an OfficialDeathThreat to pretty > much DoGodAndEverybodyOnTheFaceOfTheEarth. > I tried to placate them by reaching over with a pen and adding > an 'Un' in front of the word 'Official,' but they were not really > impressed, informing me that the point they were trying to make > had to do with it being unacceptable, from their point of view, > for me to use the words 'Death,' 'Threat,' and 'President' all > in the same paragraph, let alone all in the same sentence. > {"Well, excuuusssee *me*!"} > Realizing that it was probably not an opportune moment to try to > hit them up for a donation toward the maintenance of my planned > PresidentialDeathThreatAnonymousRemailer, I casually turned the > donation jar so that they couldn't see the label, and I set it > down. > > Actually, I couldn't be certain that I had actually written the > chapter, or portion thereof, with which the agents seemed most > concerned, since I find it difficult to distinguish between the > work that is mine alone, and the work that is a collage of various > participants in the writing and dissemination of 'The True Story > of the InterNet' manuscripts, if I don't have access to the files > on the computer on which they were created and stored. > Nonetheless, I refrained from pointing out that the phrase that > indicates that the writer "might" conceivably "whack" someone or > another GovernmentPersonage, might equally apply to the stance > taken by the Secret Service Agents, themselves, if the Founding > Fathers were to be believed when they indicated that it is the > right and the duty of the citizenry to take up arms against their > rulers, if need be, in the interest of Democracy, Freedom, Justice, > or in DivineRetribution against the High&Mighty if they take a drink > out of your beer while you're in the restroom, having a leak. > (I'm not certain about that last example, but I have no doubt that > the Founding Fathers *meant* to include that...) > > I refrained from attempting to engage the Agents in philosophical > debate in regard to some of the finer points surrounding the issues > of Freedom of Speech, since the purpose of their visit was obviously > geared toward impressing upon me the duties encompassed by their job > description, their professional competence in doing their job, and > the fact that the necessity of making a return visit would very > likely be an indication that Uncle Sam was about to become my new > landlord. > To tell the truth, I was in a pretty scattered state of mind at > the time of their visit, and I undoubtedly failed to adequately > understand a good portion of the dialogue which took place, but > they were very clear in explaining that, given my current state > of unwelcomeness in Canada, I am running out of countries to go > to, and that I should give serious consideration as to whether or > not I wanted my next Literary Spamology to be titled, "Midnight > Express II." > Hhhmmm...decisions, decisions... > > Since my reading of the Secret Service Agents is that they are > highly ethical professionals, with little need to persecute an > individual out of thin-skinned, personal vindictiveness, I guess > it wouldn't hurt to mention that, minutes after their departure, > Linda Lou arrived home, announcing that there was yet another > Tarantula in the driveway, headed toward the house... > > The obvious conclusion, of course, is that the Secret Service > Agents are actually Reptilian Nazis, who are deeply involved in > the WorldWidePlotAgainstMe. > This, in turn, leads to the dilemma of whether or not I should, > on the occasion of a return visit, jump them and drive wooden stakes > through their hearts, turning them into quivering pools of smoking, > green slime. > (Or is that Vampires? Shit! I'd better check, first, or it could > lead to a really embarassing situation.) > > On the other hand, since they were quite civil and reasonable > in their dealings with me, and they apparently didn't eat any of > the dogs, while here (although it might have been a different > story, if we had poodles), then perhaps their is a chance that > we and the Reptilian Nazis can live together in peace...unless it > is a SneakyTrick (TM), of course...and they are trying to *confuse* > me, so that I don't warn TheOthers...and they were only so pleasant > because they were inwardly laughing at me for not realizing that, > starting tomorrow, they are going to take control of the whole face > of the globe, turning all humans into LobotomizedSlaves who exist > only to serve their ReptilianNaziMasters! > > QUICK, EVERYBODY! ARM YOURSELVES AND RUN FOR YOUR LIVES!!! > PREPARE TO ENGAGE THE REPTILIAN NAZIS IN VIOLENT, BLOODY STRUGGLE! > START BY WHACKING OUT THE LAWYERS, AND THEN... > > Hold it! What the fuck am I ranting on about? > The Masses are *already* LobotomizedSlaves who exist only to serve > their ReptilianNaziMasters... > > Maybe the agents were just here to see whether or not Baby is a > poodle. > That makes more sense, since the Reptilian Nazis don't really > give a FatRat'sAss about the Jews, but they *do* want to round up > all of the poodles shortly before the arrival of their Reptilian > Nazi Relatives, so that there is plenty of barbeque at their > PicnicToCelebrateTheConquestOfEarth. > Yeah, that's gotta be it... > > Actually, I'm rather glad that the Secret Service Agents dropped > around to meet me in person, since people reading my copious literary > effluvia sometimes mistakenly get the impression that I am some kind > of Dogamned Weirdo, or something. > Still, I wish I had been able to refrain from going, "Cuckoo-Cuckoo" > on the hour and the half-hour during their vist. > But, what the hell...I bet that a *lot* of the people they visit > do that... > ====================================================================== > > > > From brownrk1 at texaco.com Wed Sep 9 13:12:27 1998 From: brownrk1 at texaco.com (Brown, R Ken) Date: Thu, 10 Sep 1998 04:12:27 +0800 Subject: PEDIATRIC ADVISE - FREE WEBSITE Message-ID: <896C7C3540C3D111AB9F00805FA78CE2013F840A@MSX11002> > Oh and the language they use! It's all > f*** this and f*** that -- if only their Mothers could hear them. Who's to say they can't? Mothers can read mailing lists too you know :-) Ken From stevem at tightrope.demon.co.uk Wed Sep 9 13:24:48 1998 From: stevem at tightrope.demon.co.uk (Steve Mynott) Date: Thu, 10 Sep 1998 04:24:48 +0800 Subject: Carl Johnson's private key In-Reply-To: <199809092006.NAA10324@zendia.mentat.com> Message-ID: <19980910102249.B27659@tightrope.demon.co.uk> On Wed, Sep 09, 1998 at 10:25:15PM +0100, Adam Back wrote: > Well let's see how many Toto keys we can find which were posted to > cpunks. Type Bits KeyID Created Expires Algorithm Use pub 2048 0xE839FC79 1997-05-21 ---------- RSA Sign & Encrypt uid TruthMonger -----BEGIN PGP PUBLIC KEY BLOCK----- Version: PGPfreeware 5.0i for non-commercial use mQENAzOCm1EAAAEIANB5WCFbEjUhNaZ2cEWuh9xcP48QBixzJpxPqGc0Sogj9W1L ezM5GDF0tZp5ksNbWf5+ErNxXo0yOM7LjDl+sRrEmcbuTkjqPJxG/q4JZ7Al3/FF h1SFGWpQNz9BPewgHS8/Lp9Ywl+ELeau+FPrr/xmktYifBBaaPUTS5oNMhn4Ih0r yez6WFn6lRYz+FLsXchjkg+I22tC1aD6iKv/BxCM//GzJ8UNkE7Vx94jZxJ/0vqE 3msqN1coj99okoggWzR5xe/wcLjUjXBw4Z208zhKNEC1AemkJV5HSbztfOgpZOqX 4dwsSDREfFcerM3gusIv3Gz+oU5WPTNSVeg5/HkABRG0GVRydXRoTW9uZ2VyIDx0 bUBkZXYubnVsbD6JAJUDBRM00a/ErW/ok9nGnfkBAcRtBACrvPVTRqpDGpb9xn97 Km69dtRfrbObvBDpcMwu1iQrYfuBfoqaMgxq8SCMjtstbTwWpZE26xzpgLQ36VBk Zjwv/5qPJMutaImDEriulrJPy6LtqHQ13tOu1WK3q/tYSeW3rJUz+5vgKDhpkEIH RJEc9CVkn4nIQvH/WXwEmAXX2okBFQMFEDOCm1E9M1JV6Dn8eQEBdR4H/jLf9WVT O5rxNVsCJNYo9e+pOrbxceuE2tOINZdfspoWZHJkLbQ4ttE20kfVclR5m/vKHFeQ g7aNbp7WL3kxZzHQkCF42N2ooB00VRVqqzpHb7JIBTs+19t9XH9FTGxNbyMt+mkj tqNN/cT3Pe6c7o2k3/PvgM7rn22LB82NPxihEfcQSiZIo1nfIgaFvJMe/4U6smzy xDeOGqYVvfuevR6vX4FaL1KvYtLtor6IIr9kqFSpqh+SijpL8zqdNYpTtGIOG8rT CbjQtqyxvzfPc2PA3Y01kPAI9gzd3XYuPFYDvSqWPH+qxJGm2+QOacspecRS9Oyd /10SuGlgu2DIYEWJAJUDBRAzgtb/sF+MkGb7jGUBARskA/9Gwpn+SE5L7icPsl8+ cowoxWMM6J/HR6ePN/uRb/8acyyLvTJpiLpB6hPRhRhU1D7BbAZQ+AB6OzY8uTVU hufgYi9FT7VSPrFNN8eQiJtS2/Psu0L8mY1p9ZIRMOck6WqzODNOcTR24PBnzchJ Z3MeSERed8IHFw9rLvm7XMLoVA== =fA4n -----END PGP PUBLIC KEY BLOCK----- -- pgp 1024/D9C69DF9 1997/10/14 steve mynott From mok-kong.shen at stud.uni-muenchen.de Wed Sep 9 13:32:16 1998 From: mok-kong.shen at stud.uni-muenchen.de (Mok-Kong Shen) Date: Thu, 10 Sep 1998 04:32:16 +0800 Subject: MISTY encryption algorithm source code In-Reply-To: <19980910035745.18097.qmail@hotmail.com> Message-ID: <35F79AEE.1F8CAB7@stud.uni-muenchen.de> Nobuki Nakatuji wrote: > > MISTY source code posted by me at long ago had many mistake. > Attachment file are revised MISTY source code and revised readme. > Thanks. Can you give good literature references to MISTY? M. K. Shen From proff at iq.org Wed Sep 9 14:10:42 1998 From: proff at iq.org (Julian Assange) Date: Thu, 10 Sep 1998 05:10:42 +0800 Subject: cypherpunks archive Message-ID: <19980910100541.10897.qmail@iq.org> I'm looking for a/the cypherpunks archive, particularly one that covers 92-present. infinity.nus.sg doesn't seem to work anymore. Cheers, Julian. From sorens at workmail.com Wed Sep 9 14:53:39 1998 From: sorens at workmail.com (Soren) Date: Thu, 10 Sep 1998 05:53:39 +0800 Subject: Packet Radio In-Reply-To: <3.0.5.32.19980909005149.0081d100@mail.xroads.com> Message-ID: <35F7B0DA.CBD0CC07@workmail.com> What about SSB? User of DOOM wrote: > >>>>> William J Hartwell writes: > > > I think a radio network linked to the Amateur networks sending > > secure packets, using tunneling or maybe just encrypted traffic > > FCC regulations prohibit amateur radio services from carrying either > encrypted OR commercial traffic. Either of these restrictions makes > amateur radio networks useless for CP purposes. And hams are very > diligent at self-enforcement, often devoting hundreds of man-hours to > track down a single unlicenced operator. > > Anyone who wishes to establish a network that may -- at any point in > its life -- have to operate outside the "law" (whatever THAT happens > to be at the time) will be well advised to steer clear of the amateur > radio community. From support at connectfree.net Wed Sep 9 16:15:19 1998 From: support at connectfree.net (Connectfree Admins) Date: Thu, 10 Sep 1998 07:15:19 +0800 Subject: Error. Message-ID: <00e7c5250110a98WEB@www.telinco.net> We are experiencing some technical difficulties with our software. Please ignore this message. From billp at nmol.com Wed Sep 9 17:00:28 1998 From: billp at nmol.com (bill payne) Date: Thu, 10 Sep 1998 08:00:28 +0800 Subject: Official comment Message-ID: <35F7C9BB.7B5E@nmol.com> http://csrc.nist.gov/encryption/aes/aes_home.htm#comments OFFICIAL Comments - Anyone may provide NIST with OFFICIAL public comments on the AES candidate algorithms. NOTE THAT ALL COMMENTS RECEIVED SHALL BE MADE PART OF THE PUBLIC RECORD. A comment may be submitted by sending an e-mail message to AESFirstRound at nist.gov. OFFICIAL Comment http://www.aci.net/kalliste/bw1.htm to appear at http://zolatimes.com/ Title: Black and White Test of Cryptographic Algorithms Black and White Test of Cryptographic Algorithms by William H. Payne The purpose of this article is to explain the underlying principles of cryptography by examples, and to show some criteria that should be met by cryptographic algorithms before they are seriously considered for adoption. Cryptography is the art or science of scrambling plaintext into ciphertext with a key so that it cannot be read by anyone who does not possess the key. Digital information is stored in the form of 1s and 0s, called BINARY. Binary Numbers Let�s count from DECIMAL 0 to 15 in BINARY by adding 1 to the previous number. decimal: 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 binary: 0 1 10 11 100 101 110 111 1000 1001 1010 1011 1100 1101 1110 1111 Notice that first we start with a single number position, which can be 0 or 1 in BINARY. This number position is a bit. Call this first bit b0. Notice that b0 is either 0 or 1. That is, b0 = 0 or b0 = 1. To get to DECIMAL 2, we have to introduce a second BINARY bit--call it b1. We have b1b0 = 10. Next, for DECIMAL 3, we have BINARY b1b0 = 11. binary: 0 1 10 11 100 101 110 111 1000 1001 1010 1011 1100 1101 1110 1111 numbered bits: b0 b0 b1b0 b1b0 b2b1b0 b2b1b0 b2b1b0 b2b1b0 b3b2b1b0 b3b2b1b0 b3b2b1b0 b3b2b1b0 b3b2b1b0 b3b2b1b0 b3b2b1b0 b3b2b1b0 Notice that the bit subscript represents a power of 2. That is, b0 really means b0*2^0, where * is multiplication, and ^ exponentiation (for example, 2^0 = 1, 2^1 = 2, 2^2 = 4, 2^3 = 8). The subscript on b is the same as the power on 2. If we had b26, we would know its meaning was b26*2^26. If b26 = 0, then this value is 0. If b26 = 1, then this value is 2^26. Now look at "1111" (which in BINARY is equal to DECIMAL 15). In this case, b3b2b1b0 = 1111. The right-most BIT (b0) is the least-significant bit, because it corresponds to the lowest power of 2. Converting Binary Numbers to Decimal Numbers To convert a BINARY number ...b3b2b1b0 to a DECIMAL number Y, we simply write Y = b0 + b1 * 2 + b2 * 2^2 + b3 * 2^3 + ... The bits b0, b1, b2, b3 are limited to the values 0 and 1 ONLY. Performing the exponentiation of powers of 2 and reversing the bits gives Y = . . . + b3 * 8 + b2 * 4 + b1 * 2 + b0 . Most of us were brought-up to understand that the most significant digits are to the LEFT of the previous digit. For sake of economy of writing and easy conversion, binary numbers are frequently represented in base 16, or HEXADECIMAL, abbreviated HEX. Hexadecimal Numbers BinaryweightsHEXDECIMAL 8 4 2 1 0 0 0 1 1 1 1 0 2 2 1 1 3 3 1 0 0 4 4 1 0 1 5 5 1 1 0 6 6 1 1 1 7 7 1 0 0 0 8 8 1 0 0 1 9 9 1 0 1 0 A 10 1 0 1 1 B 11 1 1 0 0 C 12 1 1 0 1 D 13 1 1 1 0 E 14 1 1 1 1 F 15 Conversion from binary to hexadecimal or hexadecimal to binary is easy if you remember 1010 is A 1100 is C 1110 is E B is one greater than A, 1011. D is one greater than C, 1101. And F is one greater than E, 1111. Computer Memory Computer memory is frequently organized as BYTEs which are eight bits. Since one hexadecimal digit represents 4 bits, it takes two hexadecimal digits to represent one byte. There are 2^8 = 256 different binary values that can be represented in a byte. These 256 values (written in HEX for brevity) are: 00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F 10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F 20 21 22 23 24 25 26 27 28 29 2A 2B 2C 2D 2E 2F 30 31 32 33 34 35 36 37 38 39 3A 3B 3C 3D 3E 3F 40 41 42 43 44 45 46 47 48 49 4A 4B 4C 4D 4E 4F 50 51 52 53 54 55 56 57 58 59 5A 5B 5C 5D 5E 5F 60 61 62 63 64 65 66 67 68 69 6A 6B 6C 6D 6E 6F 70 71 72 73 74 75 76 77 78 79 7A 7B 7C 7D 7E 7F 80 81 82 83 84 85 86 87 88 89 8A 8B 8C 8D 8E 8F 99 91 92 93 94 95 96 97 98 99 9A 9B 9C 9D 9E 9F A0 A1 A2 A3 A4 A5 A6 A7 A8 A9 AA AB AC AD AE AF B0 B1 B2 B3 B4 B5 B6 B7 B8 B9 BA BB BC BD BE BF C0 C1 C2 C3 C4 C5 C6 C7 C8 C9 CA CB CC CD CE CF D0 D1 D2 D3 D4 D5 D6 D7 D8 D9 DA DB DC DD DE DF E0 E1 E2 E3 E4 E5 E6 E7 E8 E9 EA EB EC ED EE EF FF F1 F2 F3 F4 F5 F6 F7 F8 F9 FA FB FC FD FE FF Representing Language on a Computer The problem of how to represent characters in a computer has been solved several ways. One way is the American Standard Code of Information Interchange (ASCII). ASCII represents characters as 7 bits. Here is table modified from a web site ( http://members.tripod.com/~plangford/index.html). Hex Char Description Hex Char Hex Char Hex Char ---------------------- --------- ---------- ---------- 00 NUL (null) 20 40 @ 60 ` 01 SOH (start of heading) 21 ! 41 A 61 a 02 STX (start of text) 22 " 42 B 62 b 03 ETX (end of text) 23 # 43 C 63 c 04 EOT (end of transmission) 24 $ 44 D 64 d 05 ENQ (enquiry) 25 % 45 E 65 e 06 ACK (acknowledge) 26 & 46 F 66 f 07 BEL (bell) 27 ' 47 G 67 g 08 BS (backspace) 28 ( 48 H 68 h 09 TAB (horizontal tab) 29 ) 49 I 69 i 0A LF (line feed, new line) 2A * 4A J 6A j 0B VT (vertical tab) 2B + 4B K 6B k 0C FF (form feed, new page) 2C , 4C L 6C l 0D CR (carriage return) 2D - 4D M 6D m 0E SO (shift out) 2E . 4E N 6E n 0F SI (shift in) 2F / 4F O 6F o 10 DLE (data link escape) 30 0 50 P 70 p 11 DC1 (device control 1) 31 1 51 Q 71 q 12 DC2 (device control 2) 32 2 52 R 72 r 13 DC3 (device control 3) 33 3 53 S 73 s 14 DC4 (device control 4) 34 4 54 T 74 t 15 NAK (negative acknowledge) 35 5 55 U 75 u 16 SYN (synchronous idle) 36 6 56 V 76 v 17 ETB (end of trans. block) 37 7 57 W 77 w 18 CAN (cancel) 38 8 58 X 78 x 19 EM (end of medium) 39 9 59 Y 79 y 1A SUB (substitute) 3A : 5A Z 7A z 1B ESC (escape) 3B ; 5B [ 7B { 1C FS (file separator) 3C < 5C \ 7C | 1D GS (group separator) 3D = 5D ] 7D } 1E RS (record separator) 3E > 5E ^ 7E ~ 1F US (unit separator) 3F ? 5F _ 7F DEL Now let us take two different one-word messages we might wish to cipher: "black" and "white". We can use the preceding table to find the ASCII codes for the characters in "black" and "white". messagecharacterASCII (Hex)Binary Message 1black62 6C 61 63 6B0110 0010 0110 1100 0110 0001 0110 0011 0110 1011 Message 2white77 68 69 74 650111 0111 0110 1000 0110 1001 0111 0100 0110 0101 But before doing this, we must understand the general "cipher problem." The Cipher Problem We have three elements in the encryption process: 1. The plaintext message 2. The key 3. The ciphertext Let�s start REAL SIMPLE. Let's consider a situation where the plaintext message, the key, and the ciphertext are all the same length. To make it even simpler, let's make each one only one bit long. So the key can be one of two possibilities (0 or 1), and so can the plaintext and the ciphertext. So, in all, there are 2*2*2 = 8 total possible encipherment circumstances. Let�s enumerate ALL 8 POSSIBILITIES. Possibilities Table PossibilityKeyPlaintextCiphertext 1000 2001 3010 4011 5100 6101 7110 8111 That�s it! There are no more possibilities than these 8. What does this mean for the encryption process--the "algorithm"? An ALGORITHM is a deterministic processes that accepts inputs and transforms them into outputs. "Deterministic" is important in that the same inputs ALWAYS produce the same output. Consider ANY algorithm which takes as its inputs the key values of 0 or 1 and the plaintext message values of 0 or 1. ANY algorithm can only produce one of the ciphertext outputs seen above. Image the following hypothetical but REAL SIMPLE algorithm: Hypothetical Algorithm: Find the value of the Key in column 2 of the Possibilities Table and the Plaintext message in column 3; then chose as the Ciphertext output whatever number is found in column 4 of that row. But there, of course, is a catch with a valid CRYPTOGRAPHIC ALGORITHM. Given the Key and the Ciphertext, one must be able to get back the Plaintext! A cryptographic algorithmic should have an INVERSE. So a cryptographic algorithm could not produce ALL of the eight combinations seen above for the reason that it is impossible to invert some of the possibilities. For example, some of the mappings are incompatible from an inverse standpoint, because same values of the key and ciphertext can lead to two different values of the plaintext. Notice how the following pairs of possibilities conflict: 1 and 3; 2 and 4; 5 and 7; 6 and 8. PossibilityKeyPlaintextCiphertext 1000 3010 2001 4011 5100 7110 6101 8111 But there two different cryptographic algorithms that could be made from the Possibilities Table, both of which have inverses: Cryptographic Algorithm 1 PossibilityKeyPlaintextCiphertext 1000 4011 6101 7110 Cryptographic Algorithm 2 PossibilityKeyPlaintextCiphertext 2001 3010 5100 8111 Of course, the output of Algorithm 2 is merely the same as the output of Algorithm 1, with 0s and 1s switched. (This is called a logical NOT operation.) Logic and Its Electronic Representation Logic, sometimes called Boolean logic when it is dealing with 0s and 1s, has several elementary rules. In computers, TRUE is usually represented by a 1. FALSE is represented by a 0. Electrically a 1 is usually, but not always, represented by a HIGH VOLTAGE. A zero by a LOW VOLTAGE. The three basic operations in logic are NOT, AND, and OR: Logical OperationInput(s)Output NOT0 1 1 0 AND000 010 100 111 OR 000 011 101 111 A derivative operation called an EXCLUSIVE-OR, abbreviated XOR, is defined as follows: Logical OperationInput(s)Output XOR000 011 101 110 In XOR, if the two input bits have the the same value, they sum to 0. If they have different values, they sum to 1. Now look back at Cryptographic Algorithm 1. It is, in fact, the exclusive-or (XOR) of the key and plaintext. Algorithm 1: Ciphertext Output = Key XOR Plaintext. Cryptographic Algorithm 2, meanwhile, is just the NOT of Algorithm 1. Algorithm 2: Ciphertext Output = NOT (Key XOR Plaintext). The REALLY IMPORTANT property of the XOR is THAT IT HAS AN INVERSE. By contrast, logical AND does not have an inverse for the reason that if the Key and (Key AND Plaintext) are both 0, then the Plaintext itself is ambiguously either 0 or 1. Logical OperationKey InputPlaintext InputKey AND Plaintext AND000oops 010oops 100 111 Likewise, logical OR does not have an inverse for the reason that if the Key and (Key OR Plaintext) are both 1, then the Plaintext itself is ambiguously either 0 or 1. Logical OperationKey InputPlaintext InputKey OR Plaintext OR 000 011 101oops 111oops So logical AND and OR don�t work well for a crypto algorithm, but the XOR does because it has an inverse. How to Create Two Keys for Deniability The XOR works even better from a legal standpoint. Imagine the following conversation: Ciphercop: We have the ciphertext 0 and we CAUGHT you with the key with a bit value of 1, so you sent a plaintext 1. Citizen: No I did not! You PLANTED the key with bit value 1. The real key bit is a 0, and I sent 0 as the plaintext. Let�s generate a key for the REAL WORLD crypto messages "black" and "white", messagecharacterASCII (Hex)Binary Message 1black62 6C 61 63 6B0110 0010 0110 1100 0110 0001 0110 0011 0110 1011 Message 2white77 68 69 74 650111 0111 0110 1000 0110 1001 0111 0100 0110 0101 and see if we can produce a REAL EXAMPLE of a SECOND KEY. Here�s a key, which we will call key 1: key 1: 1010 0101 1100 0011 1110 0111 1111 0000 0110 1001 Key 1 doesn�t look too random. Each group of four bits is followed by its logical NOT (e.g. NOT(1010) = 0101, etc.). Which leads to another lesson. To claim that a sequence of 0s and 1s is random requires statistical testing. Otherwise, the state of the sequence is UNKNOWN. Here's another key, which we will call key 2: key 2: 1011 0000 1100 0100 1110 1111 1110 0111 0110 0111 These two keys produce the same ciphertext for the two different messages "black" and "white". black0110 0010 0110 1100 0110 0001 0110 0011 0110 1011 key 11010 0101 1100 0011 1110 0111 1111 0000 0110 1001 ciphertext (XOR)1100 0111 1010 1100 1000 0110 1001 0011 0000 0010 white0111 0111 0110 1000 0110 1001 0111 0100 0110 0101 key 21011 0000 1100 0100 1110 1111 1110 0111 0110 0111 ciphertext (XOR)1100 0111 1010 1100 1000 0110 1001 0011 0000 0010 So when the ciphercops FALSELY accuse you of encrypting "black", you SCREAM "Bull pucky!", and produce key 2 to show that you, IN FACT, encrypted "white". Then sue the government--pro se, of course. (See http://jya.com/whpfiles.htm.) The recipe for producing the second key in this example is simple. Take two plaintext messages of the same length. Encrypt one of them with an arbitrary key that yields a ciphertext of the same length. XOR the ciphertext with the second plaintext message. The result is the second key. Store this one for plausible deniability. So from the standpoint of plausible deniability it is BEST to have TWO KEYS for any given encryption: 1. The REAL KEY 2. The key you can CLAIM was the REAL KEY. Just in case you get caught. "Have we gone beyond the bounds of reasonable dishonesty?" --CIA memo (The CIA quote is from Weird History 101, by John Richard Stephens, page 55.) None of us want to get caught going beyond the bounds of reasonable dishonesty. Thus far two criteria of a worth candidate for cryptographic algorithm have been established. Criterion 1: The ciphertext is invertible with the help of a key back into the plaintext. Criterion 2: There is ALWAYS a second key. Just in case you get caught. Plaintext and Ciphertext Sizes The plaintext and ciphertext should be the same size. First, note that if the plaintext is longer than the ciphertext, then the ciphertext is not invertible. For example, let�s suppose that the plaintext is two bits long and the ciphertext is one bit long. PlaintextCiphertext 0 00 or 1 0 11 or 0 1 0oops 1 1oops After the first two ciphertext bits have been assigned to plaintext pairs, the next two plaintext pairs (10,11) must conflict with this assignment. The ciphertext thus correspondents to more than one plaintext possibility. We run into problems for the reason that we cannot establish a one-to-one correspondence between the plaintext and cipher text and, therefore, can�t possibly have an inverse. Second, if the plaintext is shorter than the ciphertext, then the ciphertext can't be trusted. It may include too much information. For example, let�s suppose that the plaintext is one bit long, the key is one bit long, and the cipher text is two bits long. Iran Cryptographic Algorithm KeyPlaintextCiphertext 0 0 00 0 1 10 1 0 11 1 1 01 Not only is the above algorithm invertible, but now the crypto key has been sent along with the ciphertext in the second bit position! That is, the first bit in the ciphertext is is the value of (key XOR plaintext). The second bit is the key itself. So if you XOR the two ciphertext bits with each other, you recover the plaintext bit. You might ask who would be audacious enough to pull such stunt. The Great Satan, of course. For the story of how the National Security Agency (NSA) bugged the encryption equipment that was sold by a Swiss company to 140 nations around the world, see the following links: http://www.aci.net/kalliste/speccoll.htm http://caq.com/cryptogate http://www.qainfo.se/~lb/crypto_ag.htm http://jya.com/whpfiles.htm And the Great Satan got caught. No plan B. Or in crypto parlance, no second key. So we have a third criterion for a cryptographic algorithm we might wish to adopt. Criterion 3: The length of the plaintext equals the length of the ciphertext. In simple terms, if more bits come out of a crypto algorithm than go in, WATCH OUT! Otis Mukinfuss and the Advanced Encryption Standard Bruce Hawkinson (BHAWKIN at sandia.gov) WAS Sandia National Laboratories Lab News editor some years ago. In one editorial, Hawkinson wrote that while we was traveling for Sandia, he spent his motel time looking up strange names in the phone book. One name I recall mentioned was Steely Gray who was a government office furniture salesman. Hawkinson concluded his article by writing his all-time favorite name was Otis Mukinfuss. Hawkinson was no longer editor of Sandia�s Lab News shortly thereafter. J. Orlin Grabbe has done an excellent job writing about cryptographic algorithms in Cryptography and Number Theory for Digital Cash. One inescapable conclusion from Grabbe�s internet article is that from a layman�s standpoint public key cryptography is an incomprehensible mess. A Muckinfuss. The National Institute of Standards and Technology (NIST) is holding a CONTEST to select an Advanced Encryption Standard to replace the current Data Encryption Standard (DES). Click through the candidates to view some additional examples of Mukinfusses. So another criterion has been established for a cryptographic algorithm to be considered for adoption. Criterion 4: The crypto algorithm must be simple and CONVINCE EVERYONE that it is ONLY PERFORMING ITS SIMPLE INTENDED FUNCTION. While we are at the NIST web site, the NIST Advanced Encryption Standard contest reminds me of a the plot of a recent movie, The Game, starring Michael Douglas and Sean Penn: The film is a thriller directed by David Fincher (Se7en). "The Game" is what begins when a high-powered businessman named Nicholas Van Orton (Douglas) receives the birthday gift of a lifetime from his brother he alienated years ago (Penn). What Nicholas gets is entry into a mysterious new form of entertainment provided by C.R.S. (Consumer Recreational Services) simply called "The Game." It proves to be an all-consuming contest with only one rule: there are no rules. By the time Van Orton realizes he is in, it is too late to get out. ... (See http://www.movietunes.com/soundtracks/1997/game/.) NIST does not appear to publish any criteria for winning the AES contest! Look at http://www.nist.gov/public_affairs/confpage/980820.htm and decide for yourself. Perfect Cryptography Here we have described a process of encrypting a plaintext by XORing it with a key of the same length. This encryption technique is called a "one-time pad", or Vernam cipher. Just as long as each key is only used once, the encryption technique is perfectly secure. The one-time pad described here satisfies all criteria mentioned so far: 1. The ciphertext is invertible with the help of a key back into the plaintext. 2. There is ALWAYS a second key. Just in case you get caught. 3. The length of the plaintext equals the length of the ciphertext. 4. The crypto algorithm must be simple and CONVINCE EVERYONE that it is ONLY PERFORMING ITS SIMPLE INTENDED FUNCTION. I add Criterion 5: The length of the key must equal the length of the plaintext. Extensive mathematics or complication fails Criterion 4. Public key cryptograpy that uses the RSA algorithm MAY fail Criterion 1 if the message divides the product of the two prime numbers, p and q, used in the modulus. Most crypto algorithms are designed so that the key cannot be recovered from a plaintext-ciphertext pair. Therefore, they fail Criterion 2. Criterion 3 is much more difficult to ensure against. Black and White Hats American western movie producers used to aid their audiences in identification of the heroes and villains. The heroes wore white hats. The villains, black hats. US government agencies adopted the term �black hatter� to describe an employee whose job it is to break into THINGS. Or screw them up: http://www.jya.com/whp1.htm A �white hatter� is one who analyzes THINGS to make sure they cannot be broken into. And they can�t be screwed up. But the empirical fact is that the �black hatters� can figure-out methods to transmit the key on a covert channel, tell the �white hatters� they did this. And the �white hatters� can�t find out how they did it. Algorithmic Processes Suppose the key is five bits: 1 0 1 0 1 Suppose the plaintext is six bits: 1 1 1 1 1 1 And the ciphertext is also six bits: 1 0 1 1 0 1 Ask the cryptographer give you a key which changes ONLY the sixth bit of the ciphertext, as in the following: 1 0 1 1 0 0 You like the other 5 bits just fine. If the cryptographer can�t, then you might look for another algorithm to adopt. Conclusion We have five criteria to judge the outcome of the NIST Advanced Encryption Standard contest. If none of the algorithms pass the five tests, we will not be discouraged. We know that Gilbert S. Vernam and Joseph O. Mauborgne solved the crytptography problem in 1918, when they created the one-time pad. (See "What is a One-Time Pad?".) William H. Payne P.O. Box 14838 Albuquerque, New Mexico 87191 505-292-7037 Embedded Controller Forth. Generalized Feedback Shift Registers Here are some links to some of my students: Ted Lewis (Friction-Free Economy) John Sobolewski (HPCERC) -30- From jya at pipeline.com Wed Sep 9 17:11:43 1998 From: jya at pipeline.com (John Young) Date: Thu, 10 Sep 1998 08:11:43 +0800 Subject: CJ Key Check Message-ID: <199809101303.JAA31885@camel8.mindspring.com> Bear in mind that that information on this matter may be used to hammer or help Carl Johnson if not others. As Adam Back has proposed: To check the validity of the allegations made by the IRS about Toto(s)'s messages in the Carl Johnson complaint, a review is underway of archived messages to see if there are any signatures by a key before the private key has been posted, especially if the post in question has been (or may be later) cited by the IRS. If there are none, then the IRS "authentication" of the claimed Toto posts evaporates. Even if there are some, the `authentication' becomes more suspect if there are others which are made after the key post. To assist checking messages an initial list of candidate keys is available (none of the anonymous keys show a link to Carl Johnson of the IRS complaint): http://jya.com/anon-keys.htm Additional candidates and findings of message checks are welcomed, with a nod to the opening caution. From declan at well.com Wed Sep 9 17:26:30 1998 From: declan at well.com (Declan McCullagh) Date: Thu, 10 Sep 1998 08:26:30 +0800 Subject: Netly News article on Toto/Johnson PART II Message-ID: http://cgi.pathfinder.com/netly/0,2326,201980910-14595,00.html From CTIA_Daily_News at um2.unitymail.com Thu Sep 10 08:40:02 1998 From: CTIA_Daily_News at um2.unitymail.com (CTIA Daily News) Date: Thu, 10 Sep 1998 08:40:02 -0700 (PDT) Subject: CTIA Daily News from WOW-COM - September 10, 1998 Message-ID: <199809101601.LAA02273@revnet3.revnet.com> ========================================== Welcome to today's edition of the CTIA Daily News from WOW-COM. Please click on the icon / attachment for the most important news in wireless communications today. The future of your company will be announced October 12 @ Wireless I.T.� Will you be there? CLICK HERE NOW TO SIGN UP AND SAVE http://www.wirelessit.com/portal.htm Team WOW-COM wowcom at ctia.org =========================================== -------------- next part -------------- A non-text attachment was scrubbed... Name: bin00014.bin Type: application/octet-stream Size: 8367 bytes Desc: "_CTIA_Daily_News_19980910a.htm" URL: From lists at ticm.com Wed Sep 9 17:40:33 1998 From: lists at ticm.com (Technical Incursion Countermeasures) Date: Thu, 10 Sep 1998 08:40:33 +0800 Subject: CFP: The Insider December 1998 edition Message-ID: <3.0.3.32.19980910213019.009f3250@localhost> Call for Papers The Insider - December 1998 edition The Insider (http://www.ticm.com/info/insider/index.html) has been in publication since November 1997. Since then it has gone trough a number of changes - all for the better :}. The latest change is to move from a newletter containing just the musing of its editor to a "learned journal". Yes, the papers will be refereed and the editorial board has some weight in the IT security world. On that note this is the first Call for papers. We are looking for papers on Information Technology Security and fitting within the following broad areas: Audit, Design and Maintenance of IT Security. The Papers can be from 1000 to 2500 words. We may accept papers of down to 600 words or up to 5000 words but they will have to be of the utmost quality. For more information see http://www.ticm.com/info/insider/current.html Yours Bret Watson - Editor Technical Incursion Countermeasures consulting at TICM.COM http://www.ticm.com/ ph: (+61)(041) 4411 149(UTC+8 hrs) fax: (+61)(08) 9454 6042 The Insider - a e'zine on Computer security - August Edition out http://www.ticm.com/info/insider/index.html From EpicTeU at aol.com Wed Sep 9 17:41:57 1998 From: EpicTeU at aol.com (EpicTeU at aol.com) Date: Thu, 10 Sep 1998 08:41:57 +0800 Subject: Forwarded mail.... Message-ID: In a message dated 98-09-10 01:11:05 EDT, you write: << Date: Wed, 9 Sep 1998 19:27:05 -0700 (PDT) From: Jrjeffro at aol.com HaCkaZ OnlY Da EliTeHelLO YaLL DiS is Da MaDD AAOOLL HaCka Ima startin a GreWp fOR HaCs Only So In OthA WerDS yA gOttA KnOw The WAreZ anD HoW toO UsEr FaTe AnD AOL So MaIl Or Im Me FoR Da TeTaIls If YeR LeeTo K Pe at CE FrOmE The LeeTs HacKJeFFrO) >> What the hell is this? No wonder why AOLers have a bad name Im going to Flame this guy From bill.stewart at pobox.com Wed Sep 9 19:01:09 1998 From: bill.stewart at pobox.com (Bill Stewart) Date: Thu, 10 Sep 1998 10:01:09 +0800 Subject: computer implant in 1997 In-Reply-To: Message-ID: <3.0.5.32.19980909144109.00c57ac0@idiom.com> Nothing surprising about it - just implant your basic lost-pet ID chip, and set up a detector to read it. All commercially available except perhaps the computer interface to the detector, which isn't all that complex either. The more interesting journalism question isn't the lack of archive-checking by the journalist or this year's claimant to firstness, but what political spin the professor tried to push with his press release and interviews and whether it was accepted blithely or skeptically. >> > READING, England -- Professor Kevin Warwick claimed Tuesday to be the >> > first person in the world to have a computer chip surgically implanted >> > into his body. >> [...] >> > Warwick demonstrated the chip in action by walking through the front >> > door of his department. "Good morning, Professor Warwick. You have five >> > new emails," said a computerized voice activated by the inserted chip. >> [...] > >Kac implanted a computer chip in his body last year [...] >i wonder to what extent journalists fact-check these "firsts". Thanks! Bill Bill Stewart, bill.stewart at pobox.com PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639 From bill.stewart at pobox.com Wed Sep 9 19:03:00 1998 From: bill.stewart at pobox.com (Bill Stewart) Date: Thu, 10 Sep 1998 10:03:00 +0800 Subject: Computer hard disc scanning by HM Customs & Excise In-Reply-To: <33CCFE438B9DD01192E800A024C84A192845C6@mossbay.chaffeyhomes.com> Message-ID: <3.0.5.32.19980909143613.00c51da0@idiom.com> >> > Just set the BIOS not to boot to floppy, >> If the customs people have any clue, the first thing they do >> is hit DEL at the appropriate BIOS prompt >I think you give them WAY too much credit, not to mention many systems >give no such prompt. But highly suspect if anything they will check the >BIOS *after* first not being able to boot to floppy successfully. Any tax-collector who's illiterate enough to ask "Do you have Internet on your computer" is probably not going to know what's happening, especially given the disparity of system boot behaviour. Some things may get their attention, like the sound card yelling "Begin destruct sequence! 10, 9, 8, 7....." or, more politely, "Stop, thief! Help, someone is stealing this computer!" or "Virus detected. Please remove the infected diskette and contact corporate security for further instructions" but your basic subtleties like a Linux boot screen and copying the diskette to backup and then wiping it are beyond the typical border guard's technical training, and don't smell interesting enough to get his dog's attention (unless there's a good high-pitched tone as well.) I may post a more thoughtful article about the offensiveness of this practice or the technical cluelessness, but for now I'll just rant about the sheer folly of allowing anybody to touch your computer whose primary training is in Shouting and looking for people who match profiles, like Irish accents or obvious wealth or obvious poverty. Thanks! Bill Bill Stewart, bill.stewart at pobox.com PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639 From sunder at brainlink.com Wed Sep 9 19:21:42 1998 From: sunder at brainlink.com (Ray Arachelian) Date: Thu, 10 Sep 1998 10:21:42 +0800 Subject: Archives and such - I can host these... Message-ID: <35F7EE0B.C3E97955@brainlink.com> If the folks that run or ran archives need a mirror site to host their mirrors, I can happily provide space for them on sundernet. I've plenty of space on the drive, and if not I can get more spindles for it... If you have already written perl scripts to archive incoming mail I'd put those up too... -- =====================================Kaos=Keraunos=Kybernetos============== .+.^.+.| Ray Arachelian |Prying open my 3rd eye. So good to see |./|\. ..\|/..|sunder at sundernet.com|you once again. I thought you were |/\|/\ <--*-->| ------------------ |hiding, and you thought that I had run |\/|\/ ../|\..| "A toast to Odin, |away chasing the tail of dogma. I opened|.\|/. .+.v.+.|God of screwdrivers"|my eye and there we were.... |..... ======================= http://www.sundernet.com ========================== From Raymond at fbn.bc.ca Wed Sep 9 19:29:15 1998 From: Raymond at fbn.bc.ca (Raymond D. Mereniuk) Date: Thu, 10 Sep 1998 10:29:15 +0800 Subject: Spot The Fed In-Reply-To: <199809100428.VAA17926@leroy.fbn.bc.ca> Message-ID: <199809101544.IAA18377@leroy.fbn.bc.ca> "Kevin J. Stephenson" wrote > A lot of companies that get Net access never setup the reverse DNS entries > out of sheer laziness on their assigned class C, and their upstream > provider doesn't care. Feds probably have Class A and B addresses anyways. Traceroute doesn't use DNS, it doesn't need to as it already has the IP numbers. DNS is a system which provides IP numbers when you give it a domain name. Reverse DNS provides a host name to an IP address but Traceroute doesn't use it. Traceroute works at the router level. Traceroute is like Ping but provides information on every hop including IP number and assigned device name. With Traceroute if a host name is not received, when requested of course, it is because the equipment was not assigned a host name or it is deliberately suppressed. I don't use Traceroute a lot but this is the first time I have seen host names suppressed. A lot of routers have ICM suppressed and will not provide a device name. If an end user site wants to provide better security they will turn off ICM packets. At that point Traceroute doesn't work at all. Virtually Raymond D. Mereniuk Raymond at fbn.bc.ca From ulf at fitug.de Wed Sep 9 19:38:51 1998 From: ulf at fitug.de (Ulf =?iso-8859-1?Q?M=F6ller?=) Date: Thu, 10 Sep 1998 10:38:51 +0800 Subject: cypherpunks archive In-Reply-To: <19980910100541.10897.qmail@iq.org> Message-ID: <199809101539.RAA59090@public.uni-hamburg.de> > I'm looking for a/the cypherpunks archive, particularly one that > covers 92-present. infinity.nus.sg doesn't seem to work anymore. I don't there is a complete archive on the web at the moment. http://calvo.teleco.ulpgc.es/listas/cypherpunks at infonex.com has an archive for 1997 and 1998. From sunder at brainlink.com Wed Sep 9 19:44:47 1998 From: sunder at brainlink.com (Ray Arachelian) Date: Thu, 10 Sep 1998 10:44:47 +0800 Subject: oil, greens, recycling, and poly-ticks. In-Reply-To: <199809092123.OAA17355@leroy.fbn.bc.ca> Message-ID: <35F7F329.E4836699@brainlink.com> Raymond D. Mereniuk wrote: > Now we have cheap oil. Big powerful vehicles are back and we are > not embarrassed to consume energy any more. I have no idea > where society is heading but I do like have a more powerful vehicle > which capable of passing a vehicle already doing 65 MPH. What pisses me off is that in NYC the gas prices are ridiculous high... $1.35/Gal is the regular gas, drive just a few miles over a tunnel or bridge to n NJ, it's $1.00 or $.99 depending on which pump you hit... go a bit south, say VA, and in some areas it drops as low as $0.87 a gallon! Shit, if it weren't for the tolls and the drive, I'd be getting my gas out of NYC all the time, but doing so wastes enough and costs enough in tolls to not make it worth the effort... Just out of curiosity what are prices around where you guys live? > The whole Greens or tree-hugger thing is a bit hypocritical. Ask > them if they have electrical appliances in their home and the answer > is always yes. For a number of years the Greenpeace fundraisers > would show up at the door asking for money to battle the forest > industry and the evil pulp mills which used chlorine in their bleaching > process and they would have white paper in their clipboards. Yep... saw one at Barnes & Noble a while ago bitching about how he got a plastic bag. We'll, if he's worried that plastic is bad for the environment, he should worry about the murdered tree in his hand that he just purchased... Ditto for militant vegans... it's one thing to do it for health reasons, it's another to be an asshole about killing fuzzy animals.. hey veggies are alive too. If you're gonna murder veggies to live, (whose growth results in the death of millions of insects who would devour the veggies if not for insecticides) you may as well quit being a hypocrite and murder animals too... The only way for a consciencious objecting vegan to not be a hypocrite is to simply stop eating and drinking and breathing... after all, every time he does so, he inhales, ingests, or otherwise murders billions of microbes... :) (Whenever someone asks if I have special dietary needs, I say "I'm a carnivore, make sure you've got plenty of red meat!") :) By far the worst is the recycling law in NYC. If you don't recycle your trash, you get fined. If a homeless bum sticks his hand in a recycling bin and grabs a paper he gets arrested for theft of government property, etc... If someone throws a can of soda in your trash bins infront of your house, you pay a $50 fine... A while back some may remeber the "Toilet Escrow" thread... yep that too has hit New York. Every toilet in our apt building was exchanged for one that supposedly saves water... Whatever the political and economic kickbacks were, it now takes an average of three flushes to sink a bowlful of turds... My math says that's a lot more wasted water than the single flush of the old toilet. -- =====================================Kaos=Keraunos=Kybernetos============== .+.^.+.| Ray Arachelian |Prying open my 3rd eye. So good to see |./|\. ..\|/..|sunder at sundernet.com|you once again. I thought you were |/\|/\ <--*-->| ------------------ |hiding, and you thought that I had run |\/|\/ ../|\..| "A toast to Odin, |away chasing the tail of dogma. I opened|.\|/. .+.v.+.|God of screwdrivers"|my eye and there we were.... |..... ======================= http://www.sundernet.com ========================== From ravage at einstein.ssz.com Wed Sep 9 19:47:50 1998 From: ravage at einstein.ssz.com (Jim Choate) Date: Thu, 10 Sep 1998 10:47:50 +0800 Subject: SSZ down (whatta story!)... Message-ID: <199809092353.SAA17964@einstein.ssz.com> Hi, Sorry for the downtime but a big (40ft.) tree fell and took out the phone lines, nearly squished one of my dogs, and had the power lines under some considerable tension. If you're receiving this then everything should be back up and operating normaly. No further downtime is expected. Now back to your normal bat channel... ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From ravage at einstein.ssz.com Wed Sep 9 19:49:16 1998 From: ravage at einstein.ssz.com (Jim Choate) Date: Thu, 10 Sep 1998 10:49:16 +0800 Subject: Citizenship silliness. Re: e$: crypto-expatriatism (fwd) Message-ID: <199809100116.UAA18005@einstein.ssz.com> Forwarded message: > Date: Wed, 9 Sep 1998 11:29:14 -0500 > From: Petro > Subject: Re: Citizenship silliness. Re: e$: crypto-expatriatism (fwd) > There are lots of things you can make alcohol out of. Seaweed, etc. True, but the amount of land needed to replace the oil reserves is a tad excessive... > for importation into the US. Why? It's in their best interest to use the product in their own country. > And what would you need to add to it to "color" the flame? Indy racers add various things to make it burn (usualy a orange) but I don't have any references at hand and don't remember. Sorry I can't answer that one specificaly. > Put about 2% detergent (just about any grade will do) into that > "water spray", and the fire goes out quicker, and stays out longer. That'll work for gasoline because soap and gasoline are soluble. I doubt it would work very well for alcohol but once I get this mess with the tree straightened out I'll do a little backyard experiment. What I had in mind was to pour some alcohol on the concrete drive way and light it. Then use a waterbottle with a water/soap mix. Do you think that would be a suitable simulation? > There are plenty of unused roof tops here in Chicago bouncing free > energy off into the air. Yep, use the roof of every 10+ houses to power a single house... > Again, there are a lot of tall buildings here where the wind is > constantly moving. Also, we have this large, flat, relatively undeveloped > area just to the east of chicago where the wind is constantly at least 10 > m.p.h. (from (admittedly imperfect memory) 7 m.p.h. is necessary to run an > electric generator from a windmill) and where no one lives. Ok, so you have acres and acres of power turbines on towers around Chicago, where does Chicago move to? What about the rest of the country? The issue after all is what happens when a renewable *replacement* for oil based fuels is found? This is a much more global issue than Chicago. Besides putting a wind generator on a building wouldn't even power the building. > It's called Lake Michigan. Ok, something got lost here... > No, but it is PART of the solution. Actualy it's not, if anything the pollution of mining, production, byproducts of use such as acid rain, and some I've probably left out are only an extension of the problem. The ignorance of long term costs of disposal and ecological impact is one of my personal pet peeves with traditional economic theory and why I pretty much think it's a pile of shit and economist in general are idiots. > Again, PART of the solution. Ok, so we let PART of the people starve and die in the dark. > The waste problem goes away of you build a decently stable launch > platform and drop the shit into the sun. We don't have engines at this point that can do that. The fact is that it takes more energy to get to the sun than it does to leave the solar system. Nope, not the answer. (I do experimental, ie big bird, rockets for grins and giggles) > "power sats" into orbit (altho I am not real clear on how the energy gets > back down, something about using microwaves ) Microwaves, and god help you if you happen to fly through one. I won't even talk about the costs of development, control, maintenance, etc. This won't fly any time in the next couple of hundred years at least. What about the heating of the water in the air, can you say global warming on a scale that would make the current issues irrelevant. > Also, you ignored, or didn't see the "mix of" statement. Oil CAN be > replaced, and should be. There are plenty of ways to replace the energy Absolutely, I want to replace it. I want to replace it with something that is renewable, won't have the ecological impact of the others, won't squeeze the small countries out, etc. If it requires killing a single salamander then it's the wrong choice simply to make a profit. > for clean air as much as the next guy, and I guess trees are kinda nice to > look at, but I'd like to see far more diversity in energy sources, and > investigation into more long term, renewable sources. I love trees. The problem is that there aren't that many renewable resources that won't break the bank or create a have/have-not situation that would be rife with conflict potential. > Actually it looks like something that could be made in a factory. > Take a methane source (sewage, rotting plant matter) pump it into really > cold water under pressure, and blam. You need pressure as well. But yes, this is a possibility as well. I haven't seen the energy costs on this approach. The largest producers of methane on the planet are cows. Perhaps we should shove a hose up the hinney of all the cows...:) > Depends on what you want it to replace. The one of the largest uses > of oil is in the transportation sector, and "they" have been pushing > Natural Gas there for years to little effect. Absolutely, there is a hurdle to jump. One of the main issues with the traditional natural gas deposits are that they are expensive because of the drilling requirements, non-renewable, and not evenly distributed to potential users. Something deep-ocean clathrates and potentialy your industrial process idea don't have. ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From ravage at einstein.ssz.com Wed Sep 9 19:49:20 1998 From: ravage at einstein.ssz.com (Jim Choate) Date: Thu, 10 Sep 1998 10:49:20 +0800 Subject: Citizenship silliness. Re: e$: crypto-expatriatism (fwd) Message-ID: <199809100135.UAA00119@einstein.ssz.com> Forwarded message: > Date: Wed, 9 Sep 1998 09:58:16 -0500 > From: Petro > Subject: Re: Citizenship silliness. Re: e$: crypto-expatriatism > >Sure thing, and where you live, exactly who's land was it before you got > >there? > > Point is, the "Arabs" didn't start it, the UN/European leaders (US, > UK, FR, and RU) did. Actualy the tension between followers of Allah and Yahwe split long before us poor westerners were doing much more than getting naked, painting oursleves blue, and stabing each other with bronze and iron rods. While it is true the modern political scene has exacerbated the situation, it is untrue that it was the causation. ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From mixmaster at remail.obscura.com Wed Sep 9 19:55:55 1998 From: mixmaster at remail.obscura.com (Mixmaster) Date: Thu, 10 Sep 1998 10:55:55 +0800 Subject: radio net (fwd) Message-ID: "Brian W. Buchanan" writes: >I'd love to see them try to enforce that. What about chaffing and >winnowing? Stego? Transmission of random noise? ;) Anyone have the text >of the actual rules concerning this? I found what you're looking for. I failed in my search at the FCC and ARRL web-sites, except for offers to purchase the applicable regulations in hardcopy. C.F.R. 47, Part 97 covers the Amateur Radio Service. The full set of regs is available at: http://www.mv.com/ipusers/simons/al/radio/part97.html The specific regulation you're looking for is at: http://www.mv.com/ipusers/simons/al/radio/part97_b.html#97.113 S 97.113 Prohibited transmissions. (a) No amateur station shall transmit: ... (4) Music using a phone emission except as specifically provided elsewhere in this Section; communications intended to facilitate a criminal act; messages in ^^^^^^^^^^^ codes or ciphers intended to obscure the meaning ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ thereof, except as otherwise provided herein; ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ obscene or indecent words or language; or false or deceptive messages, signals or identification; ... The exception clause probably makes reference to an allowed "code", that being morse code. From mixmaster at remail.obscura.com Wed Sep 9 19:57:40 1998 From: mixmaster at remail.obscura.com (Mixmaster) Date: Thu, 10 Sep 1998 10:57:40 +0800 Subject: No Subject In-Reply-To: Message-ID: <3859418bc3deb43600e8455d83581c55@anonymous> >>>>> Brian W Buchanan writes: > I'd love to see them try to enforce that... Anyone have > the text of the actual rules concerning this? This is enforced very strictly, with the diligent help of the amateur radio community itself. CFR47 says: 97.113 Prohibited transmissions. (a) No amateur station shall transmit: (1) Communications specifically prohibited elsewhere in this part; (2) Communications for hire or for material compensation, direct or indirect, paid or promised, except as otherwise provided in these rules; (3) Communications in which the station licensee or control operator has a pecuniary interest... (4) Music using a phone emission except as specifically provided elsewhere in this section; communications intended to facilitate a criminal act; messages in codes or ciphers intended to obscure the meaning thereof, except as otherwise provided herein; obscene or indecent words or language; or false or deceptive messages, signals or identification; (5) Communications, on a regular basis, which could reasonably be furnished alternatively through other radio services. (b) An amateur station shall not engage in any form of broadcasting... [...] 97.117 International communications. Transmissions to a different country, where permitted, shall be made in plain language and shall be limited to messages of a technical nature relating to tests, and, to remarks of a personal character for which, by reason of their unimportance, recourse to the public telecommunications service is not justified. From Marita.Nasman-Repo at DataFellows.com Thu Sep 10 11:05:18 1998 From: Marita.Nasman-Repo at DataFellows.com (Marita =?iso-8859-1?Q?N=E4sman=2DRepo?=) Date: Thu, 10 Sep 1998 11:05:18 -0700 (PDT) Subject: PRESS RELEASE: Data Fellows Introduces F-Secure NameSurfer Version 2.0 Message-ID: <3.0.32.19980910174328.009258c0@smtp.datafellows.com> For your information: ####################################################### Data Fellows Introduces F-Secure NameSurfer Version 2.0 SAN JOSE, CA -- Data Fellows, the global leader in Internet security solutions, has today announced the new version 2.0 of its F-Secure NameSurfer DNS (Domain Name System) management tool. DNS translates host names to IP addresses and is a critical component of any IP based network. F-Secure NameSurfer provides network managers an easy- to-use Web interface for DNS administration, saving time and maintenance resources. Its intuitive graphical user interface and automatic error checking prevent network managers from generating faulty DNS data. Faulty DNS data can bring down the entire IP network, so correctness of DNS data is essential for reliable and secure Internet and intranets. F-Secure NameSurfer 2.0 has been extensively restructured to achieve peerless performance in the markets, especially in large DNS installations. The new version also makes it possible to prevent the network manager from creating address records whose IP address falls outside his own network. Thus, ISPs can give their customers the permission to change addresses and still be sure that customers stay in their own network zone. F-Secure NameSurfer translates into significant savings in network management. The intuitive graphical user interface saves network managers' time in doing DNS configurations. The configurations can be done remotely and by multiple network managers with personal administration rights. The routine tasks can be delegated to clerical staff. Ultimately even end-users or ISP customers can administer their own DNS data, with a Web browser, as a self-service. Prime target customer groups for F-Secure NameSurfer are telecommunication operators, Internet Service Providers (ISP), and other organizations that need the best tool in the markets to manage Internet or intranet security. Among F-Secure NameSurfer customers are ISPs like US WEST INTERACT, Concentric Network Corporation, and The Finnish University and Research Network, as well as international corporate customers such as Barclays Bank PLC, Motorola Semiconductor Product Services, and UPM-Kymmene. F-Secure NameSurfer 2.0 is now available from Data Fellows' resellers around the world. The product is available for all the popular Unix platforms. Pricing starts at $990. With offices in San Jose, CA, and Helsinki, Finland, privately-owned Data Fellows is the leading technology provider of data security solutions for computer networks and desktop computers. The company's F-Secure data security product line includes the groundbreaking F-Secure Anti-Virus, which facilitates two of the world's best scanning engines, F-PROT Professional and AVP, within the same system for unparalleled virus detection rates; F-Secure SSH for securing all popular TCP/IP applications; and F-Secure VPN for creating secure virtual private networks. The company's products are relied on by many of the world's largest companies, governments, universities and institutions. The products are available world-wide in more than 80 countries through Data Fellows and its business partners. For more information, please contact USA: Data Fellows Inc. Mr. Pirkka Palomaki, Product Manager Tel. +1 408 938 6700 Fax +1 408 938 6701 E-mail: Pirkka.Palomaki at DataFellows.com Europe: Data Fellows Oy Mr. Petri Nyman, Director of Sales PL 24 FIN-02231 ESPOO Tel. +358 9 859 900 Fax +358 9 8599 0599 E-mail: Petri.Nyman at DataFellows.com All media inquiries: Open City Communications, 212-714-3575 or Opencity at aol.com ########################################################### Kind regards Marita Nasman-Repo Communicator, Media Relations -- marita.nasman-repo at DataFellows.com, World-Wide Web http://www.DataFellows.com From mmotyka at lsil.com Wed Sep 9 20:20:58 1998 From: mmotyka at lsil.com (Michael Motyka) Date: Thu, 10 Sep 1998 11:20:58 +0800 Subject: radio net (fwd) In-Reply-To: <33CCFE438B9DD01192E800A024C84A19284623@mossbay.chaffeyhomes.com> Message-ID: <35F7FCC0.30D4@lsil.com> Matthew James Gering wrote: > > Isn't there a similar ban on encryption-capable telephones and other > electronic devices (other than computers). > Not that I've ever heard of. Besides, what's the difference between a crypto telephone and a computer? None that is significant. > Matt I suspect that the reason that there aren't any $99 cryptophones at Wal-Mart is that there really is not a significant market. The average person just doesn't care. And the consumer electronics business is so competitive and cost-sensitive that adding cost as a matter of principle is just not going to happen. Oh, I suppose it's possible that anyone trying to introduce a product like this could run into LEA interference - endless audits, supplier problems, FCC approvals, you name it but lack of market is probably the simplest explanation. Mike From sunder at brainlink.com Wed Sep 9 20:24:12 1998 From: sunder at brainlink.com (Ray Arachelian) Date: Thu, 10 Sep 1998 11:24:12 +0800 Subject: Spot The Fed / ICMP, UDP, and traceroute In-Reply-To: <199809100428.VAA17926@leroy.fbn.bc.ca> Message-ID: <35F7FC76.44C31F86@brainlink.com> Raymond D. Mereniuk wrote: > Traceroute doesn't use DNS, it doesn't need to as it already has the > IP numbers. DNS is a system which provides IP numbers when you > give it a domain name. Reverse DNS provides a host name to an IP > address but Traceroute doesn't use it. > > Traceroute works at the router level. Traceroute is like Ping but > provides information on every hop including IP number and > assigned device name. With Traceroute if a host name is not > received, when requested of course, it is because the equipment > was not assigned a host name or it is deliberately suppressed. I > don't use Traceroute a lot but this is the first time I have seen host > names suppressed. > > A lot of routers have ICM suppressed and will not provide a device > name. If an end user site wants to provide better security they will > turn off ICM packets. At that point Traceroute doesn't work at all. Not quite true. traceroute does use DNS. If you do traceroute www.joe.com it will use dns to resolve it to an ip. If you do traceroute 10.0.0.1, it will use dns to resolve it to a name. At every hop, it will use reverse DNS to resolve the ip's to names. If a hop doesn't have a reverse, you see it's ip. Traceroute under unix uses UDP on some high random port. Traceroute on NT (TRACERT.EXE) uses ICMP. In both cases, it sets the TTL field to 1, and sends a message. The router dropping the message responds with ICMP telling your host, "packet dropped due to ttl" -- this returns that router's ip address to you. (For non TCP heads - each packet has a TTL - time to live field that gets decreased as the packet "hops" across a router. When the TTL reaches zero, the next router to receive it drops it and returns an error to the sender. This mechanism is used to prevent router loops from brining down all the networks in the loop among other things like tracing a route...) One can hide routers by making them ignore ICMP or not respond to ICMP. In such cases, you simply get time outs (a line with 3 *'s)... A good test is to use traceroute from NT/95 and another from unix so you can tell what's filtered. -- =====================================Kaos=Keraunos=Kybernetos============== .+.^.+.| Ray Arachelian |Prying open my 3rd eye. So good to see |./|\. ..\|/..|sunder at sundernet.com|you once again. I thought you were |/\|/\ <--*-->| ------------------ |hiding, and you thought that I had run |\/|\/ ../|\..| "A toast to Odin, |away chasing the tail of dogma. I opened|.\|/. .+.v.+.|God of screwdrivers"|my eye and there we were.... |..... ======================= http://www.sundernet.com ========================== From Raymond at fbn.bc.ca Wed Sep 9 20:35:00 1998 From: Raymond at fbn.bc.ca (Raymond D. Mereniuk) Date: Thu, 10 Sep 1998 11:35:00 +0800 Subject: oil, greens, recycling, and poly-ticks. In-Reply-To: <35F7F329.E4836699@brainlink.com> Message-ID: <199809101649.JAA18487@leroy.fbn.bc.ca> Ray Arachelian wrote > Just out of curiosity what are prices around where you guys live? In the Vancouver BC area they are trying to raise the price and the new standard is CAN$0.549 per litre, or US$1.37 per US gallon. Not difficult to find CAN$0.454/l or US$1.14/g. For the last few weeks you could find CAN$0.399/l or US$1.00/g. I often go to Blaine WA and the lowest available there is US$1.059. Gas in Seattle WA is at least US$1.199. > Ditto for militant vegans... it's one thing to do it for health reasons, it's > another to be an asshole about killing fuzzy animals.. hey veggies are alive > too. If you're gonna murder veggies to live, (whose growth results in the > death of millions of insects who would devour the veggies if not for > insecticides) you may as well quit being a hypocrite and murder animals too... > > The only way for a consciencious objecting vegan to not be a hypocrite is to > simply stop eating and drinking and breathing... after all, every time he does > so, he inhales, ingests, or otherwise murders billions of microbes... :) Have you ever tried using this argument on a Vegetarian? I have and they squirm in all directions attempting to rationalize their irrational position. Basically some living things are more living than others. Sort of reminds you of some politicians where it is obvious from their actions that some people are more equal than other people. Virtually Raymond D. Mereniuk Raymond at fbn.bc.ca From mmotyka at lsil.com Wed Sep 9 20:38:31 1998 From: mmotyka at lsil.com (Michael Motyka) Date: Thu, 10 Sep 1998 11:38:31 +0800 Subject: oil, Re: Citizenship silliness. Re: e$: crypto-expatriatism (fwd) In-Reply-To: <199809082359.SAA12044@einstein.ssz.com> Message-ID: <35F8010C.35E5@lsil.com> Raymond D. Mereniuk wrote: > > oil, the arabs will slip back into obscurity. > Can't wait. > Good point! Ever wonder why a decreasing commodity non- > renewable resource is becoming cheaper as the known reserves > become smaller? > > Maybe they want to sell it all before it becomes obsolete and > maximize their income from that resource. > > Within the oil business I have heard this mentioned in regards to > natural gas. > I remember going to hear a Cornell geophysicist speak on this subject about 17 years ago. The gist of his talk was that the porosity of the mantle material had some unexpected variation vs. depth. This, along with the nature of the natural gas fields in Louisiana and the content profile of some oil reserves indicated a large amount of natural gas reserves as part of the deeper structure. I don't know where this ever went but it was pretty interesting at the time. Mike From stuffed at stuffed.net Thu Sep 10 11:44:51 1998 From: stuffed at stuffed.net (STUFFED NEWS DAILY) Date: Thu, 10 Sep 1998 11:44:51 -0700 (PDT) Subject: NEW MEGA FAST INTERFACE FROM TODAY + 30 HOT JPEGS AT LIGHTNING DOWNLOAD SPEED Message-ID: <19980910164827.12223.qmail@eureka.abc-web.com> In today's super-fast, totally revamped Stuffed you'll find there's much more than ever before! 30 SCORCHING JPEGS .......... FIVE SEXY STORIES NET SEX THERAPY ...... DRIVE THROUGH WHOREHOUSE TOO CHEAP FOR SEX . SUPERMARKET SKIRT SNATCHING FILMS TO FUCK BY ...................... SEX BED TRUCK ME BABY .. TALKING DICK SPEAKS PORTUGUESE BVD BANDIT BUSTED ................ LEO_S LIZARD FRANTIC PHALLIC FRESCOS .......... PLONKER BOMB BEST OF EUREKA ............... MUCH, MUCH MORE! ----> http://stuffed.net/98/9/10/ <---- Welcome to today's issue of Stuffed. To read it you should click on the URL above. If it is not made clickable by your email program you will need to use your mouse to highlight the URL, copy it and then paste it into your browser (then press Return). This email is never sent unsolicited. Stuffed is the supplement for the Eureka newsletter you subscribed to. Full instructions on unsubscribing are in every issue of Eureka! ----> http://stuffed.net/98/9/10/ <---- From mmotyka at lsil.com Wed Sep 9 20:51:25 1998 From: mmotyka at lsil.com (Michael Motyka) Date: Thu, 10 Sep 1998 11:51:25 +0800 Subject: Computer hard disc scanning by HM Customs & Excise In-Reply-To: <3.0.5.32.19980909143613.00c51da0@idiom.com> Message-ID: <35F80407.5303@lsil.com> Bill Stewart wrote: > > >> > Just set the BIOS not to boot to floppy, > >> If the customs people have any clue, the first thing they do > >> is hit DEL at the appropriate BIOS prompt > >I think you give them WAY too much credit, not to mention many systems > >give no such prompt. But highly suspect if anything they will check the > >BIOS *after* first not being able to boot to floppy successfully. > > Any tax-collector who's illiterate enough to ask "Do you have Internet > on your computer" is probably not going to know what's happening, > especially given the disparity of system boot behaviour. > > Some things may get their attention, like the sound card yelling > "Begin destruct sequence! 10, 9, 8, 7....." > or, more politely, > "Stop, thief! Help, someone is stealing this computer!" > or "Virus detected. Please remove the infected diskette > and contact corporate security for further instructions" > but your basic subtleties like a Linux boot screen and > copying the diskette to backup and then wiping it are > beyond the typical border guard's technical training, and > don't smell interesting enough to get his dog's attention > (unless there's a good high-pitched tone as well.) > > I may post a more thoughtful article about the offensiveness of this > practice or the technical cluelessness, but for now I'll just > rant about the sheer folly of allowing anybody to touch your computer > whose primary training is in Shouting and looking for people who > match profiles, like Irish accents or obvious wealth or obvious poverty. > The practice is as offensive as the KGB-like DWI roadblocks but don't be so hasty to assume the long-term incompetence of the federales in any country. If the interest in scanning PC's persists, or *dammit* increases, there will be increased funding and somebody who is technically capable will provide more sophisticated analysis tools. Period. Better get used to it. I doubt the issue will just go away. Design your CM accordingly. Mike From petro at playboy.com Wed Sep 9 20:53:44 1998 From: petro at playboy.com (Petro) Date: Thu, 10 Sep 1998 11:53:44 +0800 Subject: Citizenship silliness. Re: e$: crypto-expatriatism (fwd) In-Reply-To: <199809100116.UAA18005@einstein.ssz.com> Message-ID: At 8:15 PM -0500 9/9/98, Jim Choate wrote: >Forwarded message: >> Put about 2% detergent (just about any grade will do) into that >> "water spray", and the fire goes out quicker, and stays out longer. > >That'll work for gasoline because soap and gasoline are soluble. I doubt it >would work very well for alcohol but once I get this mess with the tree >straightened out I'll do a little backyard experiment. > >What I had in mind was to pour some alcohol on the concrete drive way and >light it. Then use a waterbottle with a water/soap mix. Do you think that >would be a suitable simulation? No. I know just a bit about Fuel Fires as I worked in Aircraft Firefighting and Resuce for Uncle Sams Miserable Children in the last 1/2 of the 80's. The point of using the detergent has nothing to do with it's solubility in gasoline/kerosene (I have much more experience with JP5 than gas, and JP5 is basically a high grade kerosene/diesel), but rather it is there to break up the water tension & allow the water to "float" on top of the gas/oil/whatever. It also improves (somewhat) the "wetting" properties of water, allowing it to saturate porus material (wood, newspaper rolls whatever) better. >> There are plenty of unused roof tops here in Chicago bouncing free >> energy off into the air. >Yep, use the roof of every 10+ houses to power a single house... Actually, by using solar heating/cooling techiques instead of (ineffecient) conversion to electicity, you can save MUCH more energy. >Ok, so we let PART of the people starve and die in the dark. And the problem here is... >> The waste problem goes away of you build a decently stable launch >> platform and drop the shit into the sun. > >We don't have engines at this point that can do that. The fact is that it >takes more energy to get to the sun than it does to leave the solar system. >Nope, not the answer. (I do experimental, ie big bird, rockets for grins and >giggles) I don't see how, you just get it up there inside the orbit of the earth, and let gravity do the rest. >> "power sats" into orbit (altho I am not real clear on how the energy gets >> back down, something about using microwaves ) > >Microwaves, and god help you if you happen to fly through one. I won't even >talk about the costs of development, control, maintenance, etc. This won't >fly any time in the next couple of hundred years at least. What about the >heating of the water in the air, can you say global warming on a scale that >would make the current issues irrelevant. Like I said, I wasn't too sure on the last one. >> Also, you ignored, or didn't see the "mix of" statement. Oil CAN be >> replaced, and should be. There are plenty of ways to replace the energy > >Absolutely, I want to replace it. I want to replace it with something that >is renewable, won't have the ecological impact of the others, won't squeeze >the small countries out, etc. If it requires killing a single salamander >then it's the wrong choice simply to make a profit. I don't mind killing a salamander or 100, but I don't want my electric supply, and it's attendant costs to be dependent on ONE technology, or source of supply. >> for clean air as much as the next guy, and I guess trees are kinda nice to >> look at, but I'd like to see far more diversity in energy sources, and >> investigation into more long term, renewable sources. >I love trees. I like desks, decks, houses, tables, chairs, etc. Oh, and altho it's not the most Green solution, we heated my parents last home (3000 sq. feet in central Missouri) entirely with wood for 5 or 6 years. Took about 2 cords per year IIRC. Not for everyone tho'. >The problem is that there aren't that many renewable resources that won't >break the bank or create a have/have-not situation that would be rife with >conflict potential. We already have the have/have not situatiuon. >> Actually it looks like something that could be made in a factory. >> Take a methane source (sewage, rotting plant matter) pump it into really >> cold water under pressure, and blam. > >You need pressure as well. But yes, this is a possibility as well. I I said "cold water under pressure". >haven't seen the energy costs on this approach. The largest producers of >methane on the planet are cows. Perhaps we should shove a hose up the hinney >of all the cows...:) Factory farms, just add some sort of methane collector. >> Depends on what you want it to replace. The one of the largest uses >> of oil is in the transportation sector, and "they" have been pushing >> Natural Gas there for years to little effect. > >Absolutely, there is a hurdle to jump. One of the main issues with the >traditional natural gas deposits are that they are expensive because of the >drilling requirements, non-renewable, and not evenly distributed to >potential users. Something deep-ocean clathrates and potentialy your >industrial process idea don't have. I think there is also this issue that NG doesn't "burn" when the tank cracks, it "explodes", and when it does burn, it is very similar to alcohol in that it doesn't have much of a flame. petro at playboy.com----for work related issues. I don't speak for Playboy. petro at bounty.org-----for everthing else. They wouldn't like that. They REALLY Economic speech IS political speech. wouldn't like that. From oshako at everest.u-grenoble3.fr Wed Sep 9 21:15:00 1998 From: oshako at everest.u-grenoble3.fr (OSCAR) Date: Thu, 10 Sep 1998 12:15:00 +0800 Subject: Child-Molesting Forger's Chilling Confession!!!1! Message-ID: <199809101715.TAA14312@everest.u-grenoble3.fr> A non-text attachment was scrubbed... Name: not available Type: application/x-www-form-urlencoded Size: 34 bytes Desc: not available URL: From oshako at everest.u-grenoble3.fr Wed Sep 9 21:15:26 1998 From: oshako at everest.u-grenoble3.fr (OSCAR) Date: Thu, 10 Sep 1998 12:15:26 +0800 Subject: Child-Molesting Forger's Chilling Confession!!!1! Message-ID: <199809101715.TAA14309@everest.u-grenoble3.fr> A non-text attachment was scrubbed... Name: not available Type: application/x-www-form-urlencoded Size: 34 bytes Desc: not available URL: From sunder at brainlink.com Wed Sep 9 21:20:55 1998 From: sunder at brainlink.com (Ray Arachelian) Date: Thu, 10 Sep 1998 12:20:55 +0800 Subject: oil, greens, recycling, and poly-ticks. In-Reply-To: <199809101649.JAA18487@leroy.fbn.bc.ca> Message-ID: <35F809C4.4ED03ABC@brainlink.com> Raymond D. Mereniuk wrote: > In the Vancouver BC area they are trying to raise the price and the > new standard is CAN$0.549 per litre, or US$1.37 per US gallon. > Not difficult to find CAN$0.454/l or US$1.14/g. For the last few > weeks you could find CAN$0.399/l or US$1.00/g. I often go to > Blaine WA and the lowest available there is US$1.059. Gas in > Seattle WA is at least US$1.199. Bastards! > Have you ever tried using this argument on a Vegetarian? I have > and they squirm in all directions attempting to rationalize their > irrational position. Basically some living things are more living than > others. Sort of reminds you of some politicians where it is obvious > from their actions that some people are more equal than other > people. Yep, and they can't figgure out what to say, so they just cop out saying it's healthier. :) -- =====================================Kaos=Keraunos=Kybernetos============== .+.^.+.| Ray Arachelian |Prying open my 3rd eye. So good to see |./|\. ..\|/..|sunder at sundernet.com|you once again. I thought you were |/\|/\ <--*-->| ------------------ |hiding, and you thought that I had run |\/|\/ ../|\..| "A toast to Odin, |away chasing the tail of dogma. I opened|.\|/. .+.v.+.|God of screwdrivers"|my eye and there we were.... |..... ======================= http://www.sundernet.com ========================== From ravage at einstein.ssz.com Wed Sep 9 21:28:04 1998 From: ravage at einstein.ssz.com (Jim Choate) Date: Thu, 10 Sep 1998 12:28:04 +0800 Subject: Citizenship silliness. Re: e$: crypto-expatriatism (fwd) Message-ID: <199809101750.MAA04560@einstein.ssz.com> Forwarded message: > Date: Thu, 10 Sep 1998 11:46:40 -0500 > From: Petro > Subject: Re: Citizenship silliness. Re: e$: crypto-expatriatism (fwd) > >That'll work for gasoline because soap and gasoline are soluble. I doubt it > >would work very well for alcohol but once I get this mess with the tree > >straightened out I'll do a little backyard experiment. > > > >What I had in mind was to pour some alcohol on the concrete drive way and > >light it. Then use a waterbottle with a water/soap mix. Do you think that > >would be a suitable simulation? > > No. Ok, then what would be a suitable test in your view? It seems to me that after reviewing your comments this would be sufficient. We have a small pool of fuel that is on fire, we spray water on it and monitor the behaviour. We then create another similar pool and spary water w/ detergent in it and note any differences. > The point of using the detergent has nothing to do with it's > solubility in gasoline/kerosene (I have much more experience with JP5 than > gas, and JP5 is basically a high grade kerosene/diesel), but rather it is > there to break up the water tension & allow the water to "float" on top of > the gas/oil/whatever. Actualy it's to keep the water from forming 'beads' because of differences in density. The surface tension of water is much higher than most fuels so if you put a little water in a lot of fuel you don't want it to bead. This is analogouse to why you put your injector cleaner in *before* the gas so that the difference in density won't effect the thoroughness of the mixing. You can do the same sort of thing at home with cooking oil, water, and detergent. As to water floating on top of gasoline, it won't for any lentgh of time greater than a fraction of a second, detergent or no detergent. > Actually, by using solar heating/cooling techiques instead of > (ineffecient) conversion to electicity, you can save MUCH more energy. I have several friends who are as fanatical about this technology as you seem to be. I find it interesting that in 20 years of playing with it they are still in the red. The proof is in the pudding. > I don't see how, you just get it up there inside the orbit of the > earth, and let gravity do the rest. If it was ONLY that simple. When you leave the Earth you have the Earths orbital momental (and it is considerable). I'll refer you to: Classical Mechanics (2nd ed) HC Corben, P. Stehle ISBN 0-486-68063-0 (Dover) $10.95 Introduction to Space Dynamics WT Thomson ISBN 0-486-65113-4 (Dover) $8.00 Because I'm way to lazy today to want to delve in to triple-integrals and such. > I don't mind killing a salamander or 100, but I don't want my > electric supply, and it's attendant costs to be dependent on ONE > technology, or source of supply. If there is any alternative that will fulfill the requirements and doesn't require the arbitrary collateral damage then it isn't worth it, period. If for no other reason than the ethical responsibility to pass on the world as undamaged as possible to the next generation. (another oversite in current economic thought that I find makes it unusable) > We already have the have/have not situatiuon. True, but only because the current energy sources are located in specific geographic areas. > I think there is also this issue that NG doesn't "burn" when the > tank cracks, it "explodes", and when it does burn, it is very similar to > alcohol in that it doesn't have much of a flame. Actualy natural gas isn't any more flamable than gasoline or alcohol. What makes it safer is the gas diffuses in the air much faster than either alcohol or gasoline. In fact, in an accident I'd rather have a gas involved than a liquid because of this. I've seen several natural gas fires and they burn a yellow-orange (course they could be putting something in there besides the odorant to cause this). ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From ravage at einstein.ssz.com Wed Sep 9 21:35:42 1998 From: ravage at einstein.ssz.com (Jim Choate) Date: Thu, 10 Sep 1998 12:35:42 +0800 Subject: Renewable Energy Stuff (was citizenship silliness) (fwd) Message-ID: <199809101757.MAA04638@einstein.ssz.com> First, let me say (again) to everyone .... Quit sending these responses to my private email. If you want to discuss it keep it on the list. Any further such private submissions go into /dev/null unread. This also means you don't need to cc: if you send it to the cpunks list since I'm subscribed...;) Now, back to more intersting discussion... Forwarded message: > Date: Thu, 10 Sep 1998 11:26:47 -0600 (MDT) > From: Jim Burnes > Subject: Renewable Energy Stuff (was citizenship silliness) > Apparently hemp hurd gassification yields a fairly sizeable, renewable > amount of energy per acre. Lemme see if I have the reference.... > Historically Hemp (Cannabis Sativa L.) has been a very high yielding plant > (Haney 1975). Assuming that hemp produces up to 4 tons/acre seed plus 10 > tons/acre stalks, Table 1 shows how many gallons of liquid fuel import could be > saved by each of the following proven biomass fuel conversion routes. > > Table 1. Conversion technologies for hemp stalks and hemp oil > > CONVERSION CONVERSION GASOLINE EQUIV > TECHNOLOGY EFF - % GAL/ACRE > > 1 Ethanol from fermentation of hydrolyzed cellulose 20 200 > 2 Digestion of whole stalks to methane 50 500 > 3 Producer gas from thermal gasification of stalks 85 1000 > 4 Methanol from syngas from gasification of stalks 65 750 > 5 Methanol from pyrolysis of stalks 3 30 > > OIL SEEDS - 4 tons/acre > > 6 Hemp Seed oil from Seeds, no conversion 100 300 > 7 Biobioesel premium diesel fuel from hemp seed 90 270 > oil combined chemically with methanol You're going to seriously claim that 1 gallon of hemp oil is equivalent to 3 gallons of gasoline? I don't think so. I've seen hemp burn and it don't burn anywhere near that efficiently. I also notice it doesn't mention what it costs to raise that 4 tons/acre... ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From ravage at einstein.ssz.com Wed Sep 9 21:48:18 1998 From: ravage at einstein.ssz.com (Jim Choate) Date: Thu, 10 Sep 1998 12:48:18 +0800 Subject: Model Airplane Bio-weapon Sniffers [CNN] Message-ID: <199809101810.NAA04843@einstein.ssz.com> Forwarded message: > X-within-URL: http://www.cnn.com/TECH/science/9809/09/science.weapons.reut/ > "TOY PLANES" COULD SNIFF OUT BIOLOGICAL WEAPONS > LONDON (Reuters) - U.S. defense scientists have developed small > radio-controlled planes capable of "sniffing out" the presence of > biological weapons, a British magazine reported on Wednesday. > > New Scientist said the aircraft, described by one of their developers > as "like little toy planes," are designed to fly low into danger zones > looking for up to four suspected types of bacteria. > > As they patrol, air is forced into an on-board sampling chamber, > creating a vortex in a pool of water, the magazine said. > > Every five minutes, water from this chamber is pumped over a sensor > consisting of four optical fibres, each of which has a probe fixed to > its core. > > Each probe is coated with an antibody to which the spores of a > particular bacterium will bind if present in the water. ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From sorens at workmail.com Wed Sep 9 22:04:16 1998 From: sorens at workmail.com (Soren) Date: Thu, 10 Sep 1998 13:04:16 +0800 Subject: [Fwd: Citizenship silliness. Re: e$: crypto-expatriatism (fwd)] Message-ID: <35F81543.365F22DD@workmail.com> Sorry Jim, slip of the wrist. Hydroelectric turbines generate electric power. Feed this into the power grid; well, maybe until the end of next year. Maybe after 2000 we'll see the un-nationalization of the national power grid. Bay of Fundy is >50 (?) square miles and tidal range is 25feet, one of the largest in the world. There have been discussions in the past to do likewise to the Bering strait also. Sorry about that whales. To: sorens at workmail.com (Soren) Subject: Re: Citizenship silliness. Re: e$: crypto-expatriatism (fwd) From: Jim Choate Date: Thu, 10 Sep 1998 13:01:39 -0500 (CDT) In-Reply-To: <35F7FF53.E57503AE at workmail.com> from "Soren" at Sep 10, 98 12:33:23 pm Hi Soren, Let's keep it on the list please... > What about tidal hydro? Bay of Fundy would be appropriate. Figure the volume of the Bay from low tide and the highest tide. Then figure the time needed to fill. From this you can calculate the maximum amount of energy available. If you live near the Bay I suppose it would work, won't help the folks 50 miles away though... The goal is to find a renewable, generaly available source of energy so that geographic proximity is irrelevant. ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From petro at playboy.com Wed Sep 9 22:20:12 1998 From: petro at playboy.com (Petro) Date: Thu, 10 Sep 1998 13:20:12 +0800 Subject: Citizenship silliness. Re: e$: crypto-expatriatism (fwd) In-Reply-To: <199809101750.MAA04560@einstein.ssz.com> Message-ID: At 12:50 PM -0500 9/10/98, Jim Choate wrote: >> No. > >Ok, then what would be a suitable test in your view? > >It seems to me that after reviewing your comments this would be sufficient. >We have a small pool of fuel that is on fire, we spray water on it and >monitor the behaviour. We then create another similar pool and spary water >w/ detergent in it and note any differences. Well, we used to dump 1000-3000 gallons of waste fuels into a pit, but I'd guess a decent size bucket or tray would work. We had a smaller pit about 5x3 feet. I'd also suggest using a water extinguisher, the kind you can refill/recharge yourself. There are some out there, the big silver kind where you can unscrew the top and fill with your liquid of choice, then presurize with a tire pump. As an aside, one _could_ fill these with a combination of gasoline and a gelling agent to make a short range flame thrower, not that that would be a smart or safe thing to do (really, there wouldn't be much to keep the flame from wandering back up inside the cylinder, and haveing it explode in your hands would make it very hard to type...). Also, I know from experience it IS possible to put out a gasoline fire with straight water. You dump enough on, and it cools the liquid down to the point where combustion is not possible. It can take a bit of doing, but in the case of a car or light truck, we are talking no more than 10 or 20 gallons of fuel, tops. >> The point of using the detergent has nothing to do with it's >> solubility in gasoline/kerosene (I have much more experience with JP5 than >> gas, and JP5 is basically a high grade kerosene/diesel), but rather it is >> there to break up the water tension & allow the water to "float" on top of >> the gas/oil/whatever. > >Actualy it's to keep the water from forming 'beads' because of differences >in density. The surface tension of water is much higher than most fuels so >if you put a little water in a lot of fuel you don't want it to bead. This As I said, I know "just a bit" about this. I know that we would often get the bubbles from the detergent/water combo floating on top of everything, assisting in preventing a reflash by keeping a blanket between the air and the fuel/water. >As to water floating on top of gasoline, it won't for any lentgh of time >greater than a fraction of a second, detergent or no detergent. The longer it takes, the better it works. >> Actually, by using solar heating/cooling techiques instead of >> (ineffecient) conversion to electicity, you can save MUCH more energy. > >I have several friends who are as fanatical about this technology as you >seem to be. I find it interesting that in 20 years of playing with it they >are still in the red. A "friend" of my fathers has been heating his home with it longer than I've known him, and that's about 20 years. Had his investment returned a LONG time ago. >The proof is in the pudding. As with many things, it's the implementation, not just the underlying technology. >> I don't see how, you just get it up there inside the orbit of the >> earth, and let gravity do the rest. > >If it was ONLY that simple. When you leave the Earth you have the Earths >orbital momental (and it is considerable). I'll refer you to: Ok, like I said, "I don't see how". I hadn't considered all the angles, but then, I don't play with rockets much. My father didn't like me playing with fire, so it wasn't an option as a child. >Because I'm way to lazy today to want to delve in to triple-integrals and >such. I doubt I'd understand the math at this point. One of my failings. >> I don't mind killing a salamander or 100, but I don't want my >> electric supply, and it's attendant costs to be dependent on ONE >> technology, or source of supply. > >If there is any alternative that will fulfill the requirements and doesn't >require the arbitrary collateral damage then it isn't worth it, period. If I'll go that far. >for no other reason than the ethical responsibility to pass on the world as >undamaged as possible to the next generation. (another oversite in current >economic thought that I find makes it unusable) Well, there's damaged, and there's damaged. >Actualy natural gas isn't any more flamable than gasoline or alcohol. What >makes it safer is the gas diffuses in the air much faster than either >alcohol or gasoline. In fact, in an accident I'd rather have a gas involved >than a liquid because of this. I've seen several natural gas fires and they >burn a yellow-orange (course they could be putting something in there >besides the odorant to cause this). Question, when you said that there we'd need more land under production than we have available to produce enough CHO3 (IIRC) to replace oil, was that using current corn/soybean as a base material, or was that considering higher biomass stuff such as Hemp &etc. As well, where was that number from? I really do think that the best option is massively diversified energy sources, with each working in their places. petro at playboy.com----for work related issues. I don't speak for Playboy. petro at bounty.org-----for everthing else. They wouldn't like that. They REALLY Economic speech IS political speech. wouldn't like that. From brownrk1 at texaco.com Wed Sep 9 22:29:55 1998 From: brownrk1 at texaco.com (Brown, R Ken) Date: Thu, 10 Sep 1998 13:29:55 +0800 Subject: Renewable Energy Stuff (was citizenship silliness) (fwd) Message-ID: <896C7C3540C3D111AB9F00805FA78CE2013F8414@MSX11002> Jim Choate wrote: > Quit sending these responses to my private email. If you want to discuss it > keep it on the list. Any further such private submissions go into /dev/null > unread. This also means you don't need to cc: if you send it to the cpunks > list since I'm subscribed...;) It's because we're using these broken-as-designed mailers that put your name into the reply as well as the the list :-( > Now, back to more intersting discussion... Definitely [...snip Jim Burnes on hemp yields (because you all already read it...] > You're going to seriously claim that 1 gallon of hemp oil is equivalent to 3 > gallons of gasoline? I don't think so. I've seen hemp burn and it don't burn > anywhere near that efficiently. I'm begining to lose track of this thread. Are we talking about: 1) reducing fossil fuel use for conservation? (not something Cypherpunks mention a lot :-) 2) ways of cutting the imported fuel requirement of "western" countries in order to save money and/or teach the Arabs a lesson? (cf the sideline about Israel) 3) how to live with as little interaction as possible with the the existing state or corporate economy? 4) what we do for fuel if the balloon goes up, the lights go out, the crash comes & we are in an "Earth Abides" scenario? i.e everyone has died, or gone away, or stopped working for money and we ahve to survive as best we can? If (1) or (2) then reducing fuel consumption is a damn sight more cost-effective than substituting anything else for motor gas. You know, insulation, designing buildings for the climate, high fuel taxes, subsidised public transport... all the things us lefty Europeans like bit that don't go down well in Houston, Texas. I take Jim's point about solar-powered houses being a money pit - although there does seem to be some medium-term benefit in glass cladding for passive solar heating (known to our ancestors as "conservatories" :-) And if (2) is what you mean then you probably ought to carry on paying the dollars to those Arabs so they carry on spending them on American products - like McDonalds and Disney and MS Windows. Cultural imperialism works wonders. For every Muslim for whom America is the great Satan there is another for whom it is the home of Elvis. Or the Simpsons. Or Charley Pride. Or even Jim Reeves. You wouldn't believe how much Jim Reeves you hear in Africa. For (3) again the easy way is to arrange your lifestyle to consume less. I expect if you are distilling fuel-grade alcohol in your yard the local equivalent of customs and excise will want a word with you. If you are going to burn plant material for fuel don't bother with oil. Either distill the alcohol (if you are in a warmish climate like southern California you can probably get the best yields from cane - but it sucks up water like a herd of hungry camels) or burn wood. In a temperate climate you probably get the best yields from coppiced trees - use whatever grows in your local area and coppices well. Willow grown in wetlands does well. The yield of burnable biomass is far better than most herbaceous crops. Use hazel, birch even oak. Leaves make animal feed, stouter poles are for timber, thinner ones for burning - if you need higher temperature make charcoal out of it. Lots of use for the bark as well. Just like our ancestors used to do before all this industry. Of course you won't be able to run a car on it... for that you need the alcohol. If we did get thrown back to a mediaeval economy those of us who survived probably would be growing hemp (you heard it here first) but not as a fuel crop. Hemp has great yields but it isn't much cop as fuel It was one of the major crops in England a thousand years ago - in some pollen studies it was the major crop. That's not for recreational or medicinal use (you don't need acres of it for that) but as animal feed and for fibre, with fuel as a useful byproduct. Probably not as an an oil crop & if it was it would probably be cooking oil. > I also notice it doesn't mention what it costs to raise that 4 tons/acre... Clearly more than getting oil from out of the ground. That's why my employers are still in business. There were some Welsh hill farmers on the radio the other day asking more more subsidy from the government. Apparently their average income is now only about 10,000 UKP a year (maybe 16,000 USD). They were complaining that their fathers and grandfathers used to be able to get a living from the land, but they can't, and they were blaming the "global market" and urban-dominated governments who didn't understand farming. Of course the truth is that they can live the way their grandfathers lived if they want to. But in the last 100 years *everyone* *else* has got richer and the way of life of a small farmer in the Welsh hills now looks like poverty. And there is nothing (other than the law) to stop someone with 30 acres and a cow from growing their hemp and their willow withies (in Wales) or their cotton and their cane (in California) and riding their own horse and making their own clothes and having almost nothing to do with the rest of the modern economy. But they won't be able to have a car, or a computer and if they get any modern medicine it will be on welfare. We probably ought to know *how* to live like that, just in case things really fall apart. (I remember once having to show someone how to squat over a hole-in-the-ground latrine because he had only ever used bogs with seats) . But don't look forward to it. Ken Brown (usual disclaimers still in force) From petro at playboy.com Wed Sep 9 22:35:52 1998 From: petro at playboy.com (Petro) Date: Thu, 10 Sep 1998 13:35:52 +0800 Subject: Renewable Energy Stuff (was citizenship silliness) (fwd) In-Reply-To: <199809101757.MAA04638@einstein.ssz.com> Message-ID: At 12:57 PM -0500 9/10/98, Jim Choate wrote: >> Date: Thu, 10 Sep 1998 11:26:47 -0600 (MDT) >> From: Jim Burnes >> Subject: Renewable Energy Stuff (was citizenship silliness) >> Apparently hemp hurd gassification yields a fairly sizeable, renewable >> amount of energy per acre. Lemme see if I have the reference.... > >> Historically Hemp (Cannabis Sativa L.) has been a very high yielding plant >> (Haney 1975). Assuming that hemp produces up to 4 tons/acre seed plus 10 >> tons/acre stalks, Table 1 shows how many gallons of liquid fuel import >>could be >> saved by each of the following proven biomass fuel conversion routes. >> >> Table 1. Conversion technologies for hemp stalks and hemp oil >> >> CONVERSION CONVERSION GASOLINE >>EQUIV >> TECHNOLOGY EFF - % GAL/ACRE >> >> 1 Ethanol from fermentation of hydrolyzed cellulose 20 200 >> 2 Digestion of whole stalks to methane 50 500 >> 3 Producer gas from thermal gasification of stalks 85 1000 >> 4 Methanol from syngas from gasification of stalks 65 750 >> 5 Methanol from pyrolysis of stalks 3 30 >> >> OIL SEEDS - 4 tons/acre >> >> 6 Hemp Seed oil from Seeds, no conversion 100 300 >> 7 Biobioesel premium diesel fuel from hemp seed 90 270 >> oil combined chemically with methanol > >You're going to seriously claim that 1 gallon of hemp oil is equivalent to 3 >gallons of gasoline? I don't think so. I've seen hemp burn and it don't burn >anywhere near that efficiently. No, he is saying you get the energy equiv. of 300 gallons of gas from 4 tons of seed, PLUS the other stuff from the stalks. I can't speak for the veracity of the numbers, but that would be my interpretation. Also, he is talking when processed into fuel oil/gas, not put in a pipe and... Never mind. petro at playboy.com----for work related issues. I don't speak for Playboy. petro at bounty.org-----for everthing else. They wouldn't like that. They REALLY Economic speech IS political speech. wouldn't like that. From ravage at EINSTEIN.ssz.com Wed Sep 9 22:37:28 1998 From: ravage at EINSTEIN.ssz.com (Jim Choate) Date: Thu, 10 Sep 1998 13:37:28 +0800 Subject: Renewable Energy Stuff (was citizenship silliness) (fwd) Message-ID: <199809101859.NAA05373@einstein.ssz.com> Forwarded message: > From: "Brown, R Ken" > Subject: RE: Renewable Energy Stuff (was citizenship silliness) (fwd) > Date: Thu, 10 Sep 1998 13:30:05 -0500 > > Now, back to more intersting discussion... > > Definitely > I'm begining to lose track of this thread. Are we talking about: Well if we really, really must go back there....;) What I was originaly looking to discuss was the impact of the injection of a globaly available, economical, and effective replacement of petroleum products on the international relationships. In particular the impact on places like Isreal, Iran, US, etc. The only real relevance this has to cypherpunks is from the economics side (why I've been trying to stay on topic with the economics comments in parens) and how such a shift of economic and industrial capabilites out of centralized and nationaly controlled geographies might impact these same countries ability to remain stable and the consequences of such. Take Kuwait for example, the impact there would be devistating. And like a domino effect (or want of a nail...) the repurcussions can be imagined to run up the food chain. It is related, though not directly, to an issue that I was engaged in several days ago about Gibson and the relationships of governments, individuals, large companies, technology development, etc. ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From mgering at ecosystems.net Wed Sep 9 22:44:30 1998 From: mgering at ecosystems.net (Matthew James Gering) Date: Thu, 10 Sep 1998 13:44:30 +0800 Subject: Spot The Fed Message-ID: <33CCFE438B9DD01192E800A024C84A19284637@mossbay.chaffeyhomes.com> Traceroute doesn't use DNS? Whatever. And it's ICMP, Internet Control Management Protocol. The original traceroute works by sending User Datagram Protocol (UDP) datagrams (default 3) to an invalid port address of a remote host, starting with a Time-To-Live (TTL) of 1 causing the first router in the path to return an ICMP Time Exceeded Message (TEM), traceroute increments the TTL by one (up the max hop count, default 30) and resends, reaching the next router, until an ICMP Destination Unreachable Message is returned indicating the unreachable port on the destination host. The IP addresses of the hops are determined by the return packet headers, there is no hostname. Reverse DNS lookup is used to give you the host names, which can be turned on or off in the traceroute options (it's much faster if you turn it off). Traceroute was a diagnostic kludge. RFC 1393 describes and ICMP-based traceroute function, whereby traceroute sends an ICMP trace message (see the RFC for details) but there is still no hostname on the return packet, DNS is still used. Certain ICMP messages are often disabled and/or certain ports blocked or "shaped" by routers under thresholds to prevent common Denial-of-Service (DoS) attacks. Matt > -----Original Message----- > From: Raymond D. Mereniuk [mailto:Raymond at fbn.bc.ca] > Traceroute doesn't use DNS, it doesn't need to as it already has the > IP numbers. DNS is a system which provides IP numbers when you > give it a domain name. Reverse DNS provides a host name to an IP > address but Traceroute doesn't use it. > > Traceroute works at the router level. Traceroute is like Ping but > provides information on every hop including IP number and > assigned device name. With Traceroute if a host name is not > received, when requested of course, it is because the equipment > was not assigned a host name or it is deliberately suppressed. I > don't use Traceroute a lot but this is the first time I have > seen host names suppressed. > > A lot of routers have ICM suppressed and will not provide a device > name. If an end user site wants to provide better security they will > turn off ICM packets. At that point Traceroute doesn't work at all. From jya at pipeline.com Wed Sep 9 22:59:32 1998 From: jya at pipeline.com (John Young) Date: Thu, 10 Sep 1998 13:59:32 +0800 Subject: CJ Update Message-ID: <199809101852.OAA28421@dewdrop2.mindspring.com> This from the AZ court docket of September 2 (note the out of sequence entry date for the first item which was not there when we got the docket on September 2 although the last two were): 8/25/98 6 ( FILED: 8/31/98) MINUTES: before Mag Judge Nancy Fiora Court telephonically notified that Carl Johnson is defecating in his food tray, mutilating himself and writing on the walls with his blood; court notes that dft spat upon officers while awaiting his initial appearance[cc: all cnsl] [6-1] re: minute entry [6-1] (sms) [Entry date 09/02/98] 8/26/98 -- ORAL MOTION for Psychiatric exam [0-0] by Carl Edward Johnson (sms) [Entry date 08/27/98] 8/26/98 5 ORDER by Mag Judge Nancy Fiora granting motion for Psychiatric exam [0-0] Psychiatric examination ordered for Carl Edward Johnson (sms) [Entry date 08/27/98] ---------- The AZ docket is archived at: http://jya.com/cej090298.htm We also got today the Western Washington court docket which shows when CJ's arrest warrant was issued and sealed, August 5: http://jya.com/cej082298.htm We did a quick check of the WA court's cases for others (TCM and JYA) who may have a sealed arrest warrant in force, but found none. But if there are any they may not be entered in the public record yet, as with Carl's performance artistry. From real at EDMC.net Wed Sep 9 23:18:40 1998 From: real at EDMC.net (Graham-John Bullers) Date: Thu, 10 Sep 1998 14:18:40 +0800 Subject: A Cypherpunk Trial, Yes In-Reply-To: <199809092216.SAA19854@dewdrop2.mindspring.com> Message-ID: <199809101917.NAA19120@freenet.edmonton.ab.ca> Date sent: Wed, 09 Sep 1998 18:10:37 -0400 To: cypherpunks at cyberpass.net From: John Young Subject: A Cypherpunk Trial, Yes Send reply to: John Young As i'am one of persons mention in Toto's posts I would just like to say I think the posts were a joke. With the help of of Vullis I was a pain to the list and this was Toto's way of acknowledging this To the government readers of this list,the cigar was Cuban,will you put Bill in the cell with Toto. > http://jya.com/jg062397.htm > http://jya.com/jg090497.htm > http://jya.com/jg120997.htm > http://jya.com/jg121497.htm > http://jya.com/jg060898.htm (not June 10, as in the complaint; thanks to > jeff-anon) > http://jya.com/jg072598.htm > http://jya.com/jg072798.htm > > It was a pleasure to reread Toto(s)'s stuff while searching the > cpunk amazing archives -- what a waterfall from everyone of free > association, tants, jibes, potshots and richochets and self-mockery. > I now believe the report from TX that Carl's got an IQ off the charts > like all cpunks off the wall. > > It's worth keeping in mind that multiple users of pseudonyms is > not unusual, at least among artists long before the Internet, and > not only performance group e-mailers like the Totos, CJ Parkers, > XxxMongers, Gus-Peters and endless Anonymees jostling for > unrecognition. > > Two venerable and heavily-used nyms in Europe are Luther Bissett > and Monty Cantsin. A dazzling Monty Cantsin posted here for a > while. A Luther Bissett message ridiculing the recent kiddie porn > sweep was posted to Cyberia a few days ago. But these pseudonyms > and others are frequently used to taunt uptight authoritarians by > substantial numbers of people, sometimes acting in concert but > most often acting alone. > > An exemplary case of acting up like the Totos and other performance > pseudo-Feynmann's here, is that of Dario Fo, the Italian artist who > recently won the Nobel Prize. His off the chart genius, too, was in > mixing the real and imaginary to challenge, and to frighten, authority > into revealing their treacherous deception of the real and imaginary > to maintain state and religious control century after century, culture > after culture. He, too, was regularly condemned by those obsesses > with holding onto power, and sometimes arrested, for his imitations > of them at their most buffoonish and serious. > > Fo is from an earlier generation, though, and what more agressively > offensive form is suitable for those younger we may be witnessing in > the Jim Bells, Unknown Arrestees, and those here not yet projected > onto the world stage but working the crowd most effectively. > > Black Unicorn, step up to the mike. Show magic. > > In any, case, I'm delighted to see Cypherpunks get credit in the Johnson > pseudo-complaint for hosting transgressive art appropriate for the age of > widespreading disinformation. A tumultous trial to amplify this forum's > mayhemic virtues and vices would be magnificently chaotic and hopefully > anarchic to the max. > > Pray for CJ to get an equally mad attorney to demand his day, and our day, > in court. This under-recognized witness is eager for a highly offensive > part to play, a gibbering idiot like Toto(s), you bet, I admire their style of > spleen and threat to the fools of seriousness. > > > Graham-John Bullers real at freenet.edmonton.ab.ca | ab756 at freenet.toronto.on.ca http://www.freenet.edmonton.ab.ca/~real/index.html I dream of things that never were and say,why not? From ravage at einstein.ssz.com Wed Sep 9 23:19:43 1998 From: ravage at einstein.ssz.com (Jim Choate) Date: Thu, 10 Sep 1998 14:19:43 +0800 Subject: ASL: RE: RE: RE: Copyright infringement (fwd) Message-ID: <199809101938.OAA05621@einstein.ssz.com> Forwarded message: > Date: Thu, 10 Sep 1998 10:58:40 -0700 > From: Randy King > Subject: Re: ASL: RE: RE: RE: Copyright infringement (fwd) > Yes, but there is a difference. It is legal to share a book. Although it > is copyrighted, you have the right to share it, at least in the US. A letter > is similar. Um, actualy not. It is actualy illegal for me to allow you to borrow my books, CD's, albums, etc. > been a court case on this yet? Consider that companies have the right to > make copies of all electronic mail coming through their Internet connections. They own it. The employees are acting as agents of the employer and therefore the employer, not the employee, is the owner of that traffic. So if you send an email to some mailing list on the clock or with their equipment then the traffic wasn't ever yours. The owner of a copyright can make as many copies as they choose. The question is what do they do with the email that comes from the other person using the other employers computer to send the traffic.... As far as I know this hasn't made it into court in this exact form, however it isn't likely too either. The precedences, and reasoning behind, the above interpretation is well known and understood (at least by lawyers). > The issue is still very open on web sites. The federal govt. is considering > legislation (even as we type) that would make it illegal to copy any info > from a web site written by a child (under 18). Since viewing it makes a copy, > it would be illegal to look at one without the writer's permission. And > there is no obligation on the writer's part to divulge his age. It is > obvious the feds don't understand the technology yet. Again, I haven't had > a chance to observe what has happened here in the past 6 or 8 months now. What is the bill number for this? > Anyway, under your interpretation (which is probably the legal one > unfortunately), viewing a web site would be illegal without permission > first. Regardless of age. Not viewing it since the act of putting the data on the server is an implied permission to view. However, the instant you make a permanent copy on your hard-drive, that's not in the browsers short term cache, would be illegal. ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From mmotyka at lsil.com Wed Sep 9 23:34:37 1998 From: mmotyka at lsil.com (Michael Motyka) Date: Thu, 10 Sep 1998 14:34:37 +0800 Subject: oil, greens, recycling, and poly-ticks. In-Reply-To: <199809101649.JAA18487@leroy.fbn.bc.ca> Message-ID: <35F82A2D.65AD@lsil.com> > Yep, and they can't figgure out what to say, so they just cop out saying it's healthier. :) > Julia Child, when asked to what she owed her longevity, replied: "RED MEAT AND GIN" Anyone got a good recipe for a New Orleans style bourbon steak? From rah at shipwright.com Wed Sep 9 23:40:44 1998 From: rah at shipwright.com (Robert Hettinga) Date: Thu, 10 Sep 1998 14:40:44 +0800 Subject: IP: Dave Barry: "Funny Money" Message-ID: --- begin forwarded text Delivered-To: ignition-point at majordomo.pobox.com X-Sender: believer at telepath.com Date: Thu, 10 Sep 1998 11:39:07 -0500 To: believer at telepath.com From: believer at telepath.com Subject: IP: Dave Barry: "Funny Money" Mime-Version: 1.0 Sender: owner-ignition-point at majordomo.pobox.com Precedence: list Reply-To: believer at telepath.com Source: Miami Herald http://www.herald.com/archive/barry/archive/98sep06.htm Published Friday, September 4, 1998, in the Miami Herald Funny Money By DAVE BARRY Recently I received a press release from the U.S. Treasury Department. Naturally my first move was to verify, via chemical analysis, that it was genuine. There has been a sharp increase in the number of counterfeit Treasury Department press releases, as an embarrassed CNN found out last month when it reported, incorrectly, that Federal Reserve Board Chairman Alan Greenspan does all the voices on the popular cartoon show South Park. (In fact, he does only Kenny and Mr. Hankey.) But this particular press release turned out to be authentic; it announced that, this fall, we'll be seeing a new, redesigned $20 bill. This is part of an anti-counterfeiting program to redesign all of our old currency, which has become too easy to duplicate with modern color photocopiers -- a fact that was made all too clear when the Xerox Corp., in its 1997 annual report, reported profits of ``$850 trillion, mostly in 50s.'' Why does counterfeit money represent a threat to the nation? And how can we, as consumers, be sure that we have spelled ``counterfeit'' correctly? To answer these questions, we need to understand exactly what money is, and what makes it valuable. Back in ancient times, when people were much stupider than they are today, there was no such thing as money. People transacted business by trading actual, physical things. For example, if you sold a cow, the buyer would pay for it by giving you, say, 14 physical ducks. Even in those days, that was a lot of ducks to be carrying around, and the bank wouldn't let you deposit them, because they fought with the chickens. Also the automatic teller machines were disgusting. Finally, the ancient Egyptians got sick of this and invented the first unit of paper currency, called the `simoleon.'' The way the Egyptians explained the concept to their trading partners was: ``For your convenience, we're going to start paying you with these pieces of paper, which are valuable because they have a picture of Ulysses Grant.'' The trading partners were not crazy about this concept, but they went along with it, because the Egyptians had also invented spears. Today, the basic principle remains the same: We trust money because our government stands behind it. A counterfeit $20 bill is a worthless piece of paper backed by nothing; whereas a real $20 bill, issued by the Treasury Department, has value, because any time you want, you can take it to Fort Knox, site of the federal gold bullion depository, and exchange it, no questions asked, for a duck. Try it yourself! If they give you any trouble, mention my name, Art Buchwald. But the point is that, starting this fall, you're going to start seeing a drastically redesigned $20 bill. Among the major changes are: -- To thwart would-be photocopiers, instead of saying ``TWENTY DOLLARS,'' the new $20 bills say ``FIFTEEN DOLLARS.'' -- The Nike swoosh has been enlarged. -- The engraved portrait of Andrew Jackson has been given a new, up-to-date hairstyle, patterned, according to the Treasury Department press release, ``after Barry Manilow.'' President Jackson also has been given a vivacious new facial expression that seems to say: ``I am looking good, and I am READY TO PARTY with the engraved portraits on other currency denominations!'' -- On the back of the bill, in the engraving of the White House, on the far right-hand side, in the engraved shrubbery, is a tiny crouching engraving of Kenneth Starr. -- For verification purposes, the new bill is impregnated with plutonium particles that emit a distinctive pattern of atomic radiation. ``This poses absolutely no health danger whatsoever to humans,'' notes the Treasury Department press release, which adds: ``Do not ever put the bill in your pocket.'' These improvements, plus the top-secret ``auto-detonate'' feature that I am not allowed to mention in this column, will make the new $20 bill -- which is costing the government $348.50 per unit to manufacture -- the most advanced anti-counterfeit currency in the world. But the whole effort will be wasted unless you, the consumer, do your part by keeping a sharp eye out for ``funny money.'' The Treasury Department is asking that you regularly inspect all of your bills, of all denominations. If you notice anything suspicious -- according to the press release, this especially means ``foreign words, men in wigs, strings of numbers, a greenish coloring or some kind of weird eyeball floating over a pyramid'' -- you should immediately put the suspect bills into an envelope and mail them to: The U.S. Treasury Department Anti-Counterfeit Task Force, c/o Dave Barry, The Miami Herald, Miami, Fla. 33132. Please help. Only by joining together to fight this thing can we, as a nation, buy me a giant mansion with servants and a lake. It will have ducks. Thank you. Copyright � 1998 The Miami Herald ----------------------- NOTE: In accordance with Title 17 U.S.C. section 107, this material is distributed without profit or payment to those who have expressed a prior interest in receiving this information for non-profit research and educational purposes only. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml ----------------------- ********************************************** To subscribe or unsubscribe, email: majordomo at majordomo.pobox.com with the message: (un)subscribe ignition-point email at address ********************************************** www.telepath.com/believer ********************************************** --- end forwarded text ----------------- Robert A. Hettinga Philodox Financial Technology Evangelism 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From jvb at ssds.com Wed Sep 9 23:43:11 1998 From: jvb at ssds.com (Jim Burnes) Date: Thu, 10 Sep 1998 14:43:11 +0800 Subject: Renewable Energy Stuff (was citizenship silliness) (fwd) In-Reply-To: <199809101757.MAA04638@einstein.ssz.com> Message-ID: On Thu, 10 Sep 1998, Jim Choate wrote: (risking /dev/nullification "is that like jury nullification?") > Forwarded message: > > > Date: Thu, 10 Sep 1998 11:26:47 -0600 (MDT) > > From: Jim Burnes > > Subject: Renewable Energy Stuff (was citizenship silliness) > > > Apparently hemp hurd gassification yields a fairly sizeable, renewable > > amount of energy per acre. Lemme see if I have the reference.... > > > Historically Hemp (Cannabis Sativa L.) has been a very high yielding plant > > (Haney 1975). Assuming that hemp produces up to 4 tons/acre seed plus 10 > > tons/acre stalks, Table 1 shows how many gallons of liquid fuel import could be > > saved by each of the following proven biomass fuel conversion routes. > > > > Table 1. Conversion technologies for hemp stalks and hemp oil > > > > CONVERSION CONVERSION GASOLINE EQUIV > > TECHNOLOGY EFF - % GAL/ACRE > > > > 1 Ethanol from fermentation of hydrolyzed cellulose 20 200 > > 2 Digestion of whole stalks to methane 50 500 > > 3 Producer gas from thermal gasification of stalks 85 1000 > > 4 Methanol from syngas from gasification of stalks 65 750 > > 5 Methanol from pyrolysis of stalks 3 30 > > > > OIL SEEDS - 4 tons/acre > > > > 6 Hemp Seed oil from Seeds, no conversion 100 300 > > 7 Biobioesel premium diesel fuel from hemp seed 90 270 > > oil combined chemically with methanol > > You're going to seriously claim that 1 gallon of hemp oil is equivalent to 3 > gallons of gasoline? I don't think so. I've seen hemp burn and it don't burn > anywhere near that efficiently. I think you misunderstood. They are claiming "gasoline equivalent gallons/acre" -- not that 1 gallon of hemp oil = 3 gallons of gasoline. And were not talking about "burning" hemp in that sense. In this particular case were talking about hemp-based biodiesel. > > I also notice it doesn't mention what it costs to raise that 4 tons/acre... > Raising a full acre of hemp in that matter is something I don't have the data on. However, hemp is widely known as a low-maintenance crop -- that translates little to no fertilizer. After that we have the price of the land/month, servicing loans on the farm equipment, labor costs, taxes, energy, water etc. Typical business overhead. And for that 1000 galgas eq/acre. Certainly nothing out of the ordinary compared to the overhead in the oil industry. Although on a cost/gallon overhead I don't know. Obviously this would take a least one growth season. ObCrypto: In the case of TEOTWAWKI from Y2K, we are going to need energy to run our computers and crypto on. This might also be important to the people wanting to run a packet radio relay net. (even though the then non-existant FCC might not like them using crypto on a packet link) I copied Tom Reed and Agua Das on this since they can address the tech matters more thoroughly than I can. Other than that we should probably take this off list. Jim From ravage at einstein.ssz.com Wed Sep 9 23:46:34 1998 From: ravage at einstein.ssz.com (Jim Choate) Date: Thu, 10 Sep 1998 14:46:34 +0800 Subject: Citizenship silliness. Re: e$: crypto-expatriatism (fwd) Message-ID: <199809102009.PAA06031@einstein.ssz.com> Forwarded message: > Date: Thu, 10 Sep 1998 13:15:09 -0500 > From: Petro > Subject: Re: Citizenship silliness. Re: e$: crypto-expatriatism (fwd) > Well, we used to dump 1000-3000 gallons of waste fuels into a pit, > but I'd guess a decent size bucket or tray would work. > > We had a smaller pit about 5x3 feet. Youser, this is a plan to have every fireman and policeman in Austin show up at my house Saturday afternoon isn't it (you crafty devil you)?... I'll have to beg off since I live right in the middle of town any showy demonstrations would be met with some neighborhood hostility I suspect. I also don't believe the folks who own the land out in Elgin where my shop is would go for that either, they're worried enough about my rocket engines and Tesla coils... > truck, we are talking no more than 10 or 20 gallons of fuel, tops. > As I said, I know "just a bit" about this. I know that we would > often get the bubbles from the detergent/water combo floating on top of > everything, assisting in preventing a reflash by keeping a blanket between > the air and the fuel/water. Well in petroleum fires it isn't the liquid that burns but the very thin gas layer just above it. You can actualy put a gas fire out with a wash of gasoline. It's got to literaly be thrown on the fire and it needs to be much larger than the quantity of material being burned. The soap/water combo act as a layer reducing the outgassing and hence starving the fire of fuel. It also lowers the temperature also helping the fire fighting (remember temperature, fuel, oxidizer). The bubbles of water than form, without the soap, sink to the bottem of the spilled fuel and play no part in the fire/fire-fighting process. > A "friend" of my fathers has been heating his home with it longer > than I've known him, and that's about 20 years. Had his investment returned > a LONG time ago. Where does he live? What kind of house does he live in? What happens when we expand his system to cover a small city of say 10k and include schools, hospitals, business, etc.? What are the costs to install and operate compared to traditional methods? If he lives in a wood house in Alaska that won't work, if he lives in a mud hut in the desert of Nevada all you need is a straw mat, a fan, and some water to cool (yeah I know that's a literal exageration, but environment does play a role). There's this house here in Austin that is thermo-regulated by a fluid that is pumped several hundred feet into a hill. The temperature in the core of the hill stays about 68F year around, his house stays around 72 or so year around as a consequence. Unfortunately, we don't have enough hills in Austin (and if you've never been to Austin, we're nothing but hills) to take care of the entire city. The heat from your neighbors house ends up in your house and vica versa. > Question, when you said that there we'd need more land under > production than we have available to produce enough CHO3 (IIRC) to replace > oil, was that using current corn/soybean as a base material, or was that > considering higher biomass stuff such as Hemp &etc. As well, where was that > number from? I suspect (and that's all it is) that when one takes the population growth rate, requirements for water, transportation, housing, commercial enterprises, waste, etc. there won't be enough arrible land left to grow sufficient quantities of any plant material for anything except food. There are issues with clathrates as well. Such as the fact these materials are also the result of decay of animal matter and some percentage of outgassing on the sea bed from deep geo-sources and ultimitely face the same sort of issues with petroleum *if* the various curves don't match. The question is, and I admit to have no hard data other than supposition, what are/would be the curves if we used clathrates? Is the deposition rate sufficient given a global extraction rate that was positive over time? Does the increase in bio-mass as a result of population growth compensate sufficiently? I don't know and really would be hesitant to try to put real numbers to that with what references I have available currently. And given my current commitment level I'm not likely to spend a great deal of time working on it to solidify the model. I support diversity as well, unfortunately in some instances it's more economical (with the inclusion of waste and other issues normaly ignored) to go with a single solution on large scales. And that after all is the issue, not one house out of 10,000 but all 10,000. ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From guy at panix.com Wed Sep 9 23:47:01 1998 From: guy at panix.com (Information Security) Date: Thu, 10 Sep 1998 14:47:01 +0800 Subject: oil, greens, recycling, and poly-ticks. Message-ID: <199809101948.PAA09931@panix7.panix.com> > From: John Young > > 8/25/98 Carl Johnson is defecating in his food tray... No shit! > From: Ray Arachelian > > Every toilet in our apt building was exchanged for one that supposedly > saves water... it now takes an average of three flushes to sink a > bowlful of turds... No shit! > My math says that's a lot more wasted water than the single flush > of the old toilet. Solution: http://yournewhouse.com/mainFR3.htm ---guy From ravage at EINSTEIN.ssz.com Wed Sep 9 23:53:13 1998 From: ravage at EINSTEIN.ssz.com (Jim Choate) Date: Thu, 10 Sep 1998 14:53:13 +0800 Subject: Renewable Energy Stuff (was citizenship silliness) (fwd) Message-ID: <199809102014.PAA06141@einstein.ssz.com> Forwarded message: > Date: Thu, 10 Sep 1998 13:46:02 -0600 (MDT) > From: Jim Burnes > Subject: Re: Renewable Energy Stuff (was citizenship silliness) (fwd) > I think you misunderstood. They are claiming "gasoline equivalent > gallons/acre" -- not that 1 gallon of hemp oil = 3 gallons of gasoline. > And were not talking about "burning" hemp in that sense. In this > particular case were talking about hemp-based biodiesel. How many gallons of gasoline can you raise on an acre? Actualy the point I was trying to make is that it's comparing apples and oranges. Until it's in a dollars/gallon for each of them format no real worthwhile comparison can be made. > Raising a full acre of hemp in that matter is something I don't have the > data on. However, hemp is widely known as a low-maintenance crop -- that > translates little to no fertilizer. After that we have the price of the > land/month, servicing loans on the farm equipment, labor costs, taxes, > energy, water etc. Typical business overhead. And for that 1000 galgas > eq/acre. Well don't forget crop rotation since the hemp is going to deplete the soil if you simply grow three crops a year (which is possible this far south). There is also the issue of water, hemp is a plant that needs lots of water and is very sensitive to light levels/times, tempearture and pH. Hemp also leeches nitrogen quite heavily. ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From rah at shipwright.com Wed Sep 9 23:56:00 1998 From: rah at shipwright.com (Robert Hettinga) Date: Thu, 10 Sep 1998 14:56:00 +0800 Subject: DCSB: Burning the Jolly Roger; Internet Anti-Piracy Technology Message-ID: --- begin forwarded text Mime-Version: 1.0 X-Sender: rah at pop.sneaker.net Date: Thu, 10 Sep 1998 15:38:33 -0400 To: dcsb at ai.mit.edu, dcsb-announce at ai.mit.edu From: Robert Hettinga Subject: DCSB: Burning the Jolly Roger; Internet Anti-Piracy Technology Cc: Peter F Cassidy , Dan Geer , Terry Symula , "Heffan, Ira" Sender: bounce-dcsb at ai.mit.edu Precedence: bulk Reply-To: Robert Hettinga -----BEGIN PGP SIGNED MESSAGE----- The Digital Commerce Society of Boston Presents Peter Cassidy Founder, TriArche Research Burning the Jolly Roger: Can Anti-Piracy Technologies Make the Internet a Shrinkage-Free Commercial Platform? Tuesday, October 6, 1998 12 - 2 PM The Downtown Harvard Club of Boston One Federal Street, Boston, MA For most of this century, the fusion of intellectual property and media was enough to ensure that its owners could reasonably be expected to profit from its consumption. Most people didn't have the means to lift Ella Fitzgerald's music from her records, so fans of her music would actually have to go out and buy her records. Today, a high proportion of ordinary households have the technical capacity at hand to take recordings, visual or audio artifacts and executables, digitize them if need be, and transmit it to millions of people overnight over the Internet. This state of affairs could signal the demise of the software and entertainment industries. Evolving almost as quickly as the interlopers' sophistication in aquiring and distributing ill-gained wares, however, are technical solutions to foil pirates, technologies of varying potency and adaptability. Standard specifications for license management systems that prevent unauthorized use of software have been drafted by the X/Open Group this summer; watermarking systems and digital wrappers that allow creatives to either mark or encapsulate images and sounds to frustrate infringers have been on the market for the past few years; comprehensive smart wrapper systems like InterTrust and C-dilla promise persistent protection for all digital artifacts; and at least one system TriArche Research Group has reviewed under NDA can prevent the most all non-photographic copying of content presented in a Web browser. Meanwhile, policing technologies like Online Monitoring Service's WebSentry can locate pirated intellectual property on the Web and in Usenet news groups. None of these technologies are perfect but, as they mature, they will make it far more difficult for infringers to take control of intellectual property and to share it with their contemporaries. The Web might never lower its shrinkage rate to that of, say, Wal-Mart but merchants in this medium already have many of the tools they need to clean up this digital Barbary Coast. Peter Cassidy is an IT industry writer and analyst at large: Mr. Cassidy, director of research at his own firm, TriArche Research Group, has engaged consulting clients in North America and the Middle East. As well, Mr. Cassidy contracts as an information technology analyst with other industrial research firms, researching topics as varied as network security, multimedia applications and international telephony markets, among them, Strategy Analytics, Giga Information Group, Decision Resources, Dataquest, Business Research Group, The American Institute for Business Research and CI-InfoCorp. Mr. Cassidy writes under his own name for international business publications and general readership magazines such as WIRED, Covert Action Quarterly, InformationWeek, CIO Magazine, The Economist, Forbes ASAP, Software Developer & Publisher Magazine, Silicon Strategies, The Texas Observer, The Progressive, Telepath Magazine, American Banker, Datamation, Computerworld, World Trade Magazine, and the National Security Institute Advisory. Mr. Cassidy has been interviewed about technology issues on several broadcast radio programs in the United States and, appropriately enough, on C|Net Radio, an international Internet-based audio network. His reportage on national political affairs has been reprinted in college text books and anthologies. He has also contracted as a consultant to syndicated television magazine programs in the United States and Britain. This meeting of the Digital Commerce Society of Boston will be held on Tuesday, October 6, 1998, from 12pm - 2pm at the Downtown Branch of the Harvard Club of Boston, on One Federal Street. The price for lunch is $32.50. This price includes lunch, room rental, various A/V hardware, and the speaker's lunch. ;-). The Harvard Club *does* have dress code: jackets and ties for men (and no sneakers or jeans), and "appropriate business attire" (whatever that means), for women. Fair warning: since we purchase these luncheons in advance, we will be unable to refund the price of your lunch if the Club finds you in violation of the dress code. We need to receive a company check, or money order, (or, if we *really* know you, a personal check) payable to "The Harvard Club of Boston", by Saturday, October 3rd, or you won't be on the list for lunch. Checks payable to anyone else but The Harvard Club of Boston will have to be sent back. Checks should be sent to Robert Hettinga, 44 Farquhar Street, Boston, Massachusetts, 02131. Again, they *must* be made payable to "The Harvard Club of Boston", in the amount of $32.50. Please include your e-mail address, so that we can send you a confirmation If anyone has questions, or has a problem with these arrangements (We've had to work with glacial A/P departments more than once, for instance), please let us know via e-mail, and we'll see if we can work something out. Upcoming speakers for DCSB are: November Dan Geer TBA December Joseph DeFeo TBA January Ira Heffan Internet Software and Business Process Patents We are actively searching for future speakers. If you are in Boston on the first Tuesday of the month, and you would like to make a presentation to the Society, please send e-mail to the DCSB Program Commmittee, care of Robert Hettinga, . For more information about the Digital Commerce Society of Boston, send "info dcsb" in the body of a message to . If you want to subscribe to the DCSB e-mail list, send "subscribe dcsb" in the body of a message to . We look forward to seeing you there! Cheers, Robert Hettinga Moderator, The Digital Commerce Society of Boston -----BEGIN PGP SIGNATURE----- Version: PGP for Personal Privacy 5.5.5 iQEVAwUBNfgqqMUCGwxmWcHhAQELWwf8C0H1jxf2cLeqWywTNKRiPFRMQJ3NnsMN yOlsISeec05pXO1wUfxjNDQhLZcjJ98Ca73FdDroVFzjJdd4D+fInLCfGSAw9EtC saCkTZiz0JVGYoM7SsAvwrfhNAy+lqoV4/eWtOlAUDa204oDlsgQPDTUyLvmzv8Q VJKWpCHyPGBKlVHPNdyWoCOT6e+VS0gZDjsh4s1yIYBVREvGONedDVRC6wSanYEr /+XdEZhh+FMbxdMoHPoYcvd8vDw/jrTuc9ZRF+R1uBzRVNoK/MDelsnse+qC872o F7T6Sm76U3VeAGiIB1ElcTG+qXaiv3H3lGPIBj3a9WeDXU6H2TijhQ== =Pj5e -----END PGP SIGNATURE----- ----------------- Robert A. Hettinga Philodox Financial Technology Evangelism 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' For help on using this list (especially unsubscribing), send a message to "dcsb-request at ai.mit.edu" with one line of text: "help". --- end forwarded text ----------------- Robert A. Hettinga Philodox Financial Technology Evangelism 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From mmotyka at lsil.com Thu Sep 10 00:36:16 1998 From: mmotyka at lsil.com (Michael Motyka) Date: Thu, 10 Sep 1998 15:36:16 +0800 Subject: Happy Fourth of July ( was : Re: Citizenship silliness. Re: e$: crypto-expatriatism (fwd)) In-Reply-To: Message-ID: <35F83878.62D5@lsil.com> Happy Fourth of July! and how did this thread start? Petro wrote: > > I'd also suggest using a water extinguisher, the kind you can > refill/recharge yourself. There are some out there, the big silver kind > where you can unscrew the top and fill with your liquid of choice, then > presurize with a tire pump. As an aside, one _could_ fill these with a > combination of gasoline and a gelling agent to make a short range flame > thrower, not that that would be a smart or safe thing to do (really, there > wouldn't be much to keep the flame from wandering back up inside the > cylinder, and haveing it explode in your hands would make it very hard to > type...). > Actually these things are usually inverted so that the liquid is fed out from the bottom so the hose probably won't act like a fuse. At least until the liquid runs out and there is a combustible pathway into the container. If you try this one could you get someone to videotape it from a safe distance? It would make a great AVI for an 'anarchists on the web' site. At least mention nitrogen or helium. But COMPRESSED_AIR + GASOLINE? Are you one nut short of a matched pair? Gasoline scares the hell out of me. It should you. You don't live anywhere near me do you? You should try baking bread instead. Don't you think this conversation should be continued on some AOL forum? egads, Mike From jya at pipeline.com Thu Sep 10 00:39:36 1998 From: jya at pipeline.com (John Young) Date: Thu, 10 Sep 1998 15:39:36 +0800 Subject: oil, greens, recycling, and poly-ticks. In-Reply-To: <199809101948.PAA09931@panix7.panix.com> Message-ID: <199809102039.QAA06951@dewdrop2.mindspring.com> Ray's a much too delicate a cpunk to report what going on with low-flow toilets in NYC. Most of us close the lid, kick the lever fleeing the stench, which jiggles the muck a bit, leaves it for the next hold-breath lid lifter, who figures that's what Guiliani has ordered the lifestyle cops. Trainspotting-type diving for the good stuff is the practice in Manhattan's best clubs, where Brut reigns, and Carl's seasonings show the way to theme prison food franchising, emulating the CEO who Julia Childed the airline food cart. Let me tell later about The Harvard Club of NY's kitchen inability to pass a health inspection since the Depression. Having surveyed it recently DN and me toyed with the DCSNY's lunch there, other swell-suited cpunks wolfed it like CJ had pronounced it A-OK. From mgering at ecosystems.net Thu Sep 10 00:54:21 1998 From: mgering at ecosystems.net (Matthew James Gering) Date: Thu, 10 Sep 1998 15:54:21 +0800 Subject: ASL: RE: RE: RE: Copyright infringement (fwd) Message-ID: <33CCFE438B9DD01192E800A024C84A1928463C@mossbay.chaffeyhomes.com> > Um, actualy not. It is actualy illegal for me to allow you to > borrow my books, CD's, albums, etc. Uh, how so? Distribution copyright covers first-sale only, after that the owner can lend or sell that item. If it were not for this, public and private libraries could not exist. This works for IP protected in tangible form, but falls down for electronic IP. Software is not protected by distribution copyright, it is instead licensed. Matt From whgiii at invweb.net Thu Sep 10 00:54:58 1998 From: whgiii at invweb.net (William H. Geiger III) Date: Thu, 10 Sep 1998 15:54:58 +0800 Subject: Happy Fourth of July ( was : Re: Citizenship silliness. Re: e$: crypto-expatriatism (fwd)) In-Reply-To: <35F83878.62D5@lsil.com> Message-ID: <199809102054.QAA26964@domains.invweb.net> -----BEGIN PGP SIGNED MESSAGE----- In <35F83878.62D5 at lsil.com>, on 09/10/98 at 01:37 PM, Michael Motyka said: >Don't you think this conversation should be continued on some AOL forum? You mean this *isn't* an AOL forum!?! - -- - --------------------------------------------------------------- William H. Geiger III http://www.openpgp.net Geiger Consulting Cooking With Warp 4.0 Author of E-Secure - PGP Front End for MR/2 Ice PGP & MR/2 the only way for secure e-mail. OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html - --------------------------------------------------------------- Tag-O-Matic: For a good time, call 1-800-3IBMOS2 -----BEGIN PGP SIGNATURE----- Version: 2.6.3a-sha1 Charset: cp850 Comment: Registered_User_E-Secure_v1.1b1_ES000000 iQCVAwUBNfg+go9Co1n+aLhhAQF24wP/bYFcSg3fUVtiQ2X4EQ6jYCZkTXpnAJb7 oHfyxvrDfYMjjGHs0H8yMQOyVF5XMarBtO9gLE/QAFUm0gIIzv6bi9shvVy+WjI4 hSqCdVewtTi1X7luW/njHEpg3VbnP9TiLthmG/lKZskIfRPDD1vqMi5PNH2OG/8e PCtephoQxmo= =wbUW -----END PGP SIGNATURE----- From petro at playboy.com Thu Sep 10 02:03:01 1998 From: petro at playboy.com (Petro) Date: Thu, 10 Sep 1998 17:03:01 +0800 Subject: Renewable Energy Stuff (was citizenship silliness) (fwd) In-Reply-To: <199809102014.PAA06141@einstein.ssz.com> Message-ID: At 3:14 PM -0500 9/10/98, Jim Choate wrote: >Forwarded message: >> I think you misunderstood. They are claiming "gasoline equivalent >> gallons/acre" -- not that 1 gallon of hemp oil = 3 gallons of gasoline. >> And were not talking about "burning" hemp in that sense. In this >> particular case were talking about hemp-based biodiesel. > >How many gallons of gasoline can you raise on an acre? >Actualy the point I was trying to make is that it's comparing apples and >oranges. Until it's in a dollars/gallon for each of them format no real >worthwhile comparison can be made. No, the point is can enough be raised in this country to meet the needs of the transportation industry in the near and mid term (anything longer than 10 to 15 years out couldn't be predicted with accuracy anyway). >> Raising a full acre of hemp in that matter is something I don't have the >> data on. However, hemp is widely known as a low-maintenance crop -- that >> translates little to no fertilizer. After that we have the price of the >> land/month, servicing loans on the farm equipment, labor costs, taxes, >> energy, water etc. Typical business overhead. And for that 1000 galgas >> eq/acre. > >Well don't forget crop rotation since the hemp is going to deplete the soil >if you simply grow three crops a year (which is possible this far south). >There is also the issue of water, hemp is a plant that needs lots of water >and is very sensitive to light levels/times, tempearture and pH. Hemp also >leeches nitrogen quite heavily. Nitrogen is easy to replace, as long as you don't mind a few tagants in the soil, and don't buy your diesel at the same place... petro at playboy.com----for work related issues. I don't speak for Playboy. petro at bounty.org-----for everthing else. They wouldn't like that. They REALLY Economic speech IS political speech. wouldn't like that. From petro at playboy.com Thu Sep 10 02:03:09 1998 From: petro at playboy.com (Petro) Date: Thu, 10 Sep 1998 17:03:09 +0800 Subject: Happy Fourth of July ( was : Re: Citizenship silliness. Re:e$: crypto-expatriatism (fwd)) In-Reply-To: Message-ID: At 3:37 PM -0500 9/10/98, Michael Motyka wrote: >Happy Fourth of July! and how did this thread start? >Petro wrote: >> I'd also suggest using a water extinguisher, the kind you can >> refill/recharge yourself. There are some out there, the big silver kind >> where you can unscrew the top and fill with your liquid of choice, then >> presurize with a tire pump. As an aside, one _could_ fill these with a >> combination of gasoline and a gelling agent to make a short range flame >> thrower, not that that would be a smart or safe thing to do (really, there >> wouldn't be much to keep the flame from wandering back up inside the >> cylinder, and haveing it explode in your hands would make it very hard to >> type...). >Actually these things are usually inverted so that the liquid is fed out >from the bottom so the hose probably won't act like a fuse. At least Some are, some aren't. depends on the age. >until the liquid runs out and there is a combustible pathway into the >container. If you try this one could you get someone to videotape it >from a safe distance? It would make a great AVI for an 'anarchists on >the web' site. Ummm, I live in the middle of Chicago, I don't think it's going to be anytime soon. >At least mention nitrogen or helium. Yeah, but it's harder to get than Air, which can be done with a bicycle pump. >But COMPRESSED_AIR + GASOLINE? >Are you one nut short of a matched pair? >Gasoline scares the hell out of me. It should you. Did you see the part where I mention that I am (a) an ex-marine, and that (b) whilst in the Marine Corpse I was in Aircraft Firefighting and Rescue? You ever seen 3000 gallons of jet fuel burn, and it was your job to get up close and personal with a fire hose. 5 gals. of burning gasoline is NOT a problem. 5 Gals. cooking off in a sealed container IS a problem. >You don't live anywhere near me do you? You live in S.F. right? >You should try baking bread instead. Boring. >Don't you think this conversation should be continued on some AOL forum? Fuck you. petro at playboy.com----for work related issues. I don't speak for Playboy. petro at bounty.org-----for everthing else. They wouldn't like that. They REALLY Economic speech IS political speech. wouldn't like that. From lodi at well.com Thu Sep 10 02:17:15 1998 From: lodi at well.com (Alia Johnson) Date: Thu, 10 Sep 1998 17:17:15 +0800 Subject: toto In-Reply-To: Message-ID: Declan, I did look up your stuff on the internet and thanks. I'm writing to let you know that as of yesterday it has been 14 days since the court (Judge Fior) ordered CJ moved to a psychiatric facility and they still have not moved him. No one has heard from him for a few days. I talked to him last week and he was okay but going through some hard times. Bogart, the lawyer in Tucson, if he does not hear about CJ's move by romorrow will request a hearing demanding what is going on. But the prison is not cooperative in communicating even with him. Cj has apparently not got it together to put me on the visitors list but he seems not to have got my mail with my SS # etc. that the prison requires in order to let visitors come. Then they spend ten days establishing that you're not a criminal. Jesus. Any the lawyer does think that he will be moved to Springfield. The family is in terror that he will disappear into there or be committed for a long time or for life. I have asked his Texas lawyer Dowling, just today, whether we can retain him to represent Cj's interest with respect to what is happening with the psychiatric evaluation, and haven't heard back from him yet. I am writing to ask you to help me: will you point me to information on Springfield, its reputation, rules, accessibility of information on how patients/inmates are being treated, etc.? Any information you can help me locate would be very welcome. Thanks. Alia J P.S. I saw the request for a picture/cd of music, whatever, I'll look. Here are a couple of his porno country/western song titles: "turning good girls bad, most fun I ever had." "I'll give you my heart, but my dick belongs to mama." "there's no niggers left in Oakland, and all myh lies are true." C.J. also wrote some absolutely beautiful lyric songs, and of course his classic "Jesus Lives in Garberville" about a dope raid on the long-haired barefoot blissed-out guy living on the land.... What's your mailing address? And thanks again for your help, and for contacting CJ. He was happy to hear that we had talked. But I think he's not getting all his mail. Alia On Thu, 3 Sep 1998, Declan McCullagh wrote: > I'd also be interested in seeing a copy of the RCMP page, on his old > sympatico.ca/carljohn account. > > -Declan > > > On Thu, 3 Sep 1998, John Young wrote: > > > I tried today to speak to Toto's attorney in Tucson, John Bogart > > (520-624-8196), and another in Texas supposedly involved, > > Larry Dowling (512-892-3393), but neither returned messages. > > Bogart's secretary later said he did not want to talk -- to me at least. > > > > Next, I called the jail (520-868-3668) to get it's policy on > > contacting Toto. No incoming calls, he can call out. Mail to > > him okay: > > > > Carl Edward Johnson > > Inmate Number 05 98 7196 > > CCA > > 1155 North Dinal Parkway > > Florence, AZ 85232 > > > > Other reports, leads or news welcome. Anybody got a photo, > > a CD of his music or hallelujahs? A mirror of his RCMP taunt? > > > > > > > > > > > > > > > From AIMSX at aol.com Thu Sep 10 02:18:07 1998 From: AIMSX at aol.com (AIMSX at aol.com) Date: Thu, 10 Sep 1998 17:18:07 +0800 Subject: Forwarded mail.... Message-ID: <4cb4c748.35f84ccc@aol.com> I truly hope you don't stereotype all AOL users for this idiot's insane ramblings. Unfortunately, some people are just morons, but you get them on every ISP anyway, they just aren't so obvious on others, because unfortunately, AOL makes it easier to communicate. From honig at sprynet.com Thu Sep 10 02:38:57 1998 From: honig at sprynet.com (David Honig) Date: Thu, 10 Sep 1998 17:38:57 +0800 Subject: PGP5.5.5 Problem In-Reply-To: <35F6A8B2.CCB6D9FF@earthlink.net> Message-ID: <3.0.5.32.19980909191149.007dfb50@m7.sprynet.com> At 09:11 AM 9/9/98 -0700, Jim Van Over wrote: >I am seeking assistance with a PGP 5.5.5 system and noting your comments >on the net I thought it might be possible for you to help me with a >solution. > >I have been using PGP5.5.5, successfully, for the past four months. >However, beginning three days ago I began experiencing a problem. I am >using Netscape Navigator and the Netscape Message Center. The problem: >When I receive a PGP message I copy it to the clipboard, but, when I >depress the "decrypt and verify" line on the PGP tool bar the screen for >the "pass phrase" flashes briefly on the screen and disappears. The Are all the keys you're sending to VERIFIED? Launch PGPKeys. From mmotyka at lsil.com Thu Sep 10 03:08:12 1998 From: mmotyka at lsil.com (Michael Motyka) Date: Thu, 10 Sep 1998 18:08:12 +0800 Subject: Happy Fourth In-Reply-To: Message-ID: <35F85C94.6A55@lsil.com> I'm -almost- ready to admit defeat and move on. > Did you see the part where I mention that I am (a) an ex-marine, IMHO Marines burn just like the rest of us wimps. They just don't scream as much. > You ever seen 3000 gallons of jet fuel burn, AOED the biggest fire I've seen was the fire here in CA last month. 6-8 Million tires. Nobody had the balls to put that one out. At peak 1000X your jet fuel deal. Scary. Very. > 5 gals. of burning gasoline is NOT a problem. ISASI ( it sure as shit is ) if you're wearing it on your back. > 5 Gals. cooking off in a sealed container IS a problem. FYI 5 ounces mixed with compressed air in a metal container could easily be fatal. > Fuck you. Yes, yes, PTMYT ( pleased to meet you too ). Remember, shit draws flies. There'll just be more geniuses asking how to make noncryptographic devices. I would enjoy some crypto-tech talk. Found any cool primitive polynomials lately? Got a good block cipher with a 4096 bit block size and an even bigger key space? Got some time to donate to actually put together some good HW/SW systems? Mike From win at winwinwin.com Thu Sep 10 18:18:36 1998 From: win at winwinwin.com (win at winwinwin.com) Date: Thu, 10 Sep 1998 18:18:36 -0700 (PDT) Subject: You and your guest could be the lucky winners. Message-ID: <199573420021.G5398874@winwinwin.com> Win a FREE vacation at: http://www.winwinwin.com ***** WIN A FREE VACATION **** You and your guest could be the lucky winners. Through this online registration service, you may register daily for vacations to Puerto Vallarta, Disney World, Palm Springs, and many other "Vacation-hot-spots." With the help of our reputable Sponsors, winwinwin.com is pleased to offer this incredible Free Vacation Giveaway! There is no purchase necessary and entering the sweepstakes is easy. Point your browser to http://www.winwinwin.com and register now! This web site now uses "Cookies Technology". What this means is that once you have successfully registered to win a Free Vacation, all of your information will be saved in our database, and as long as your "Cookies" are active you will not need to re-enter any information into the submit form. Also, every time you visit one of our sponsors you will automatically be registered again to win a Free Vacation! WOW! A free entry every time you visit one of our sponsors! So, please... visit as many sponsors as you would like, because it will increase your chances of being chosen. To our winners: we have made arrangements for you and someone special to enjoy your choice of several FREE deluxe Hotel Accommodation Packages. We are aware of the rigmarole of your complex and busy lives. That is why we have found a solution that will help ease your stress by allowing you the opportunity to choose from a selection of resort retreat-spots. So, please... sit back and be free of worries! Take advantage of this free online service. Who knows... before you know it, you might just be basking on the beach or "playing it up" in Atlantic City. You are welcome to come back and re-submit as often as you please, however players are limited to only one entry per day (and NOW, you can re-submit once per day per sponsor). In return for this great service, we would like to ask that you please spread the word. There are plenty of vacations available... please tell your friends and family to give us a visit. Visit us at http://www.winwinwin.com today. For more information or to get started as an authorized Sponsor of WinWinWin.com, email us at sponsors at glaid.com. We will be glad to discuss the entire program with you in detail and help you get started! Regards, The WinWinWin.com Team EMAIL: info at winwinwin.com WEB: http://www.winwinwin.com -------------------------------------------------------------------------- This email is never sent unsolicited. This is a WinWinWin.com mailing! -03 Per Section 301, Paragraph (a) (2) (C) of S. 1618, further transmissions to you by the sender of this email may be stopped at no cost to you by -forwarding- this entire message to remove at winwinwin.com. http://www.senate.gov/~murkowski/commercialemail/EMailAmendText.html -------------------------------------------------------------------------- From announce at lp.org Thu Sep 10 03:58:09 1998 From: announce at lp.org (by way of "Edwin E. Smith" ) Date: Thu, 10 Sep 1998 18:58:09 +0800 Subject: Release: Constitution Museum Message-ID: <3.0.2.32.19980910195404.00803d30@mailhost.IntNet.net> -----BEGIN PGP SIGNED MESSAGE----- ======================================= NEWS FROM THE LIBERTARIAN PARTY 2600 Virginia Avenue, NW, Suite 100 Washington DC 20037 ======================================= For release: September 9, 1998 ======================================= For additional information: George Getz, Press Secretary Phone: (202) 333-0008 Ext. 222 E-Mail: 76214.3676 at Compuserve.com ======================================= Forget ignorant teenagers: Let's send politicians to the Constitution Museum WASHINGTON, DC -- Philadelphia Mayor Ed Rendell's plan to build a museum dedicated to the Constitution should be approved, the Libertarian Party says -- provided that every Congressman and Senator is required to take classes there. "Educating ordinary Americans about freedom and individual rights is important, but educating politicians is absolutely essential -- because only they have the power to write laws that threaten your life, liberty, and pursuit of happiness," said Ron Crickenberger, national director of the Libertarian Party. Crickenberger's comments came in response to Rendell's request to the Senate Appropriations Committee last week for $65 million to pay half the cost of a museum designed to educate Americans about the Constitution. To buttress his argument that Americans are "ignorant about government," Rendell cited a survey of 600 teenagers showing that more of them could name the Three Stooges (59%) than could name the three branches of government (41%), and that while 74% could name the city where cartoon character Bart Simpson lives (Springfield), just 12% know where Abraham Lincoln lived (Springfield). Building the museum in Philadelphia, Rendell said, would help reverse "the tide of ignorance" that is "absolutely critical to the health of our democracy." Crickenberger countered: "First we need to reverse the tide of ignorance in Congress. After all, in just the last two years, these politicians have violated the First Amendment by trying to censor the Internet, flouted the Second Amendment by passing the Lautenberg gun-control law, and made a mockery of the Fifth Amendment by quietly creating a massive federal database of every employee in America, mandating fingerprints for drivers licenses, and imposing a national ID card. "Politicians who habitually violate the Constitution themselves have no business lecturing ordinary Americans on this subject. Instead, they should practice what they preach -- and be the first ones in line when the National Center on the Constitution opens in Philadelphia. "And instead of hitting up taxpayers for $65 million, members of Congress should pay for it out of their own pockets, or by abolishing some of the unconstitutional agencies they have created," Crickenberger said. For example, he noted, the Pennsylvania delegation could urge Congress to come up with the money by: * Knocking out every unconstitutional pork-barrel project that Rep. Bud Shuster quietly inserted into the $217 billion highway bill that Congress passed in March, such as $800,000 to renovate a historic train station at Gettysburg and $500,000 for a study on sidewalks at the Kennedy Center. * Trimming the $65 billion corporate welfare budget by one-tenth of one percent. * Earmarking just 25% of the paycheck of every Senator and Congressional representative -- and every Capitol Hill staffer making over $100,000 -- for a single session of Congress. * Eliminating just one of the hundreds of unconstitutional federal agencies Congress has created, such as the National Endowment for the Arts, which has a budget of $100 million a year. Then, after attending classes at this museum, members of Congress should have one other requirement, said Crickenberger. "Before graduating from their class on the Constitution, these politicians should be required to prove their knowledge by repealing every unconstitutional law they ever passed," he said. "That's the best way to set an example for American teenagers -- and it doesn't require building another museum in Philadelphia." -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCVAwUBNfbSuNCSe1KnQG7RAQE8gAQAvrV8hv96Yfkrz7gOvLXEHtu0aY9zxZ1E wILr9VVw1u2lLig6C/9V8gt1Feio7iCuRvTdG3FI9I9JTvT/Y/QdzLajkNrbHb+V Oa8YTGgTfVAhpF3MX5M6SHiBua5dsYZtUZ5wLnpTE4oiWSI04hrD612Jf+0CZTCH JbaOzaW7wnw= =xN7R -----END PGP SIGNATURE----- The Libertarian Party http://www.lp.org/ 2600 Virginia Ave. NW, Suite 100 voice: 202-333-0008 Washington DC 20037 fax: 202-333-0072 For subscription changes, please mail to with the word "subscribe" or "unsubscribe" in the subject line -- or use the WWW form. From bill.stewart at pobox.com Thu Sep 10 04:06:38 1998 From: bill.stewart at pobox.com (Bill Stewart) Date: Thu, 10 Sep 1998 19:06:38 +0800 Subject: ANNOUNCE: Bay Area Cypherpunks, Sat. Sept. 12, 12-6, KPMG Mountain View Message-ID: <3.0.5.32.19980910170625.00cd8ec0@idiom.com> The Septembre Bay Area Cypherpunks Meeting will be Saturday from 12-6, at KPMG, 500 E. Middlefield Rd., Mountain View, with the organized part beginning at 1:00. IPSEC - Hugh Daniel will talk about the latest IPSEC Free/SWAN work Crypto 98 - Various people will talk about what they saw at the conference. Dinner after the meeting will be at some restaurant on Castro St. Mtn.View. Directions: KPMG is a relatively-unmarked building at the corner of Middlefield Rd. and Ellis St. in Mountain View, surrounded by Netscape. The lobby entrance is on the Ellis St. side. The Ellis exit on 101 is between 85 and 237. http://www.mapblast.com/mapblast/blast.hm?CMD=MAP&GC=X%3A-122.05265%7CY%3A37.39603%7CLT%3A37.39603%7CLN%3A-122.05265%7CLS%3A20000%7Cc%3AMountain_View%7Cs%3ACA%7Cz%3A94043%7Cd%3A807%7Cp%3AUSA&LV=3&IC=37.39603%3A37.39603&IC=5&IC%3A=KPMG&GAD2=500+E+Middlefield+Rd&GAD3=Mountain+View%2C+CA++94043-4008&W=600&H=350&MA=1&zoom.x=28&zoom.y=172 Probable speaker for October - Sue Bardakos from Entrust ----------- Mailing list administrivia - this announcement has been sent to cypherpunks at algebra.com cypherpunks-announce at toad.com coderpunks at toad.com cryptography at c2.net If you want to get off one of the lists, send mail to listname-request at machine.domain (probably majordomo!) for the listserver that sent you the mail. ----------- Thanks! Bill Bill Stewart, bill.stewart at pobox.com PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639 From bill.stewart at pobox.com Thu Sep 10 04:07:38 1998 From: bill.stewart at pobox.com (Bill Stewart) Date: Thu, 10 Sep 1998 19:07:38 +0800 Subject: radio net (fwd) In-Reply-To: <33CCFE438B9DD01192E800A024C84A19284623@mossbay.chaffeyhomes.com> Message-ID: <3.0.5.32.19980910135746.00c4c100@idiom.com> >Matthew James Gering wrote: >> Isn't there a similar ban on encryption-capable telephones and other >> electronic devices (other than computers). Not per se, though there _is_ still one major restriction - the Defense Department gets a crack at patent applications, so if you try to patent a crypto algorithm or crypto phone, they can seize and classify your patent application and working materials, using the excuse of "national security". There was a case in the late 70s where somebody tried to patent a wimpy analog scrambler for CB radios, and got it seized, and a number of patent applications that got delayed a long time. The RSA and Diffie-Hellman algorithms were published first, and then the patents applied for, which works in the US and Canada but makes them unpatentable in much of the rest of the world. Steve Bellovin also got lots of legal advice about what order to submit his patent applications and academic papers to avoid the risk of getting them stolen by the Feds. At 09:22 AM 9/10/98 -0700, Michael Motyka wrote: >I suspect that the reason that there aren't any $99 cryptophones at >Wal-Mart is that there really is not a significant market. The average >person just doesn't care. And the consumer electronics business is so >competitive and cost-sensitive that adding cost as a matter of principle >is just not going to happen. Sure there are - my $150 cordless phone uses spread-spectrum, partly for better sound quality, partly for better privacy, and partly because it's simpler than picking individual channels. I think it's probably the frequency-hopping form of spread-spectrum, and the hopping speed is probably deliberately low because of Federal pressure, but it's still reasonable voice privacy. (And the digital phones that don't do spread-spectrum still advertise using "digital" for privacy...) My phone's a couple of years old; you can probably get one for <$100 now. Analog cell-phones aren't secure, but the digital cell-phones on the market all provide cryptography for voice privacy, though not all cellular service providers support it. CDMA provides some inherent security, and it, TDMA, and GSM all offer some encryption features - having prominent politicians get caught talking to their girlfriends on their cellphones has helped raise the awareness of privacy. (The real price of a cell-phone in the US is hard to determine; most range from about $100-700 without service activation, and $0-400 with a service contract of typically 1 year. But the low end's close to $99.) >Oh, I suppose it's possible that anyone >trying to introduce a product like this could run into LEA interference >- endless audits, supplier problems, FCC approvals, you name it but lack >of market is probably the simplest explanation. The NSA and FBI did the best job of FUD they could arm-twisting the US digital cellular standards committees into using wimpy encryption, and GSM had its own set of wrangling that went on, producing a primary algorithm that's weak, and a bunch of alternative algorithms that are progressively weaker. I probably couldn't break the GSM main code myself, but I know where to find people who can, and just about any of the frequent readers of this list could break some of the other systems used. But that doesn't mean there isn't a strong demand for voice privacy - just that the average consumer is satisfied having _some_ privacy, enough to keep casual observers out and neighbors from stealing phone service, and either doesn't believe the police would illegaly wiretap _him_, or (more cynically) doesn't believe the cellphone is enough protection if they do decide to target him. Thanks! Bill Bill Stewart, bill.stewart at pobox.com PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639 From bill.stewart at pobox.com Thu Sep 10 04:07:51 1998 From: bill.stewart at pobox.com (Bill Stewart) Date: Thu, 10 Sep 1998 19:07:51 +0800 Subject: radio net (fwd) In-Reply-To: Message-ID: <3.0.5.32.19980910141331.00cd0b60@idiom.com> >> > The FCC prohibits the transmission of encrypted data via analog or digital >> > signals by amateurs. >> I'd love to see them try to enforce that. What about chaffing and >> winnowing? Stego? Transmission of random noise? ;) Anyone have the text >> of the actual rules concerning this? Put it like this, it took the Feds a long time to be willing to accept RTTY (Radio Teletype), because it used this 7(?)-bit ASCII CODE stuff. On the other hand, they've relaxed a lot, as amateurs have largely become computer hackers as well, equipment changed, Morse became less relevant.... As long as the ham user community doesn't get annoyed at you, and you don't abuse the available bandwidth, you ought to be able to stego a certain amount of traffic through the net, either using some sort of PointyHairedBoss code, or low-order bits in GIFs, or whatever. Thanks! Bill Bill Stewart, bill.stewart at pobox.com PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639 From nobody at sind.hyperreal.art.pl Thu Sep 10 04:08:33 1998 From: nobody at sind.hyperreal.art.pl (HyperReal-Anon) Date: Thu, 10 Sep 1998 19:08:33 +0800 Subject: No Subject In-Reply-To: <3.0.5.32.19980909005149.0081d100@mail.xroads.com> Message-ID: >>>>> Soren writes: > What about SSB? >> FCC regulations prohibit amateur radio services from carrying >> either encrypted OR commercial traffic. SSB modulation hardly counts as encryption. (?!) CFR 47 says: 97.113 Prohibited transmissions. (a) No amateur station shall transmit: (1) Communications specifically prohibited elsewhere in this part; (2) Communications for hire or for material compensation... (3) Communications in which the station licensee or control operator has a pecuniary interest... (4) Music using a phone emission except as specifically provided elsewhere in this section; communications intended to facilitate a criminal act; messages in codes or ciphers intended to obscure the meaning thereof, except as otherwise provided herein; obscene or indecent words or language; or false or deceptive messages, signals or identification; (5) Communications...which could reasonably be furnished alternatively through other radio services. [snip] 97.117 International communications. Transmissions to a different country, where permitted, shall be made in plain language and shall be limited to messages of a technical nature relating to tests, and, to remarks of a personal character for which, by reason of their unimportance, recourse to the public telecommunications service is not justified. From phelix at vallnet.com Thu Sep 10 04:43:23 1998 From: phelix at vallnet.com (phelix at vallnet.com) Date: Thu, 10 Sep 1998 19:43:23 +0800 Subject: radio net (fwd) In-Reply-To: <199809091239.HAA15369@einstein.ssz.com> Message-ID: <35f871f9.173776779@news> On 10 Sep 1998 17:51:31 -0500, Greg Broiles wrote: >If you want to know what crypto regs and net use regs are going to look >like in 10-20 years, look at the amateur radio regs now - we'll have >citizens' committees (similar to the "block leaders" on GeoCities) who stay >up late at night, unpaid, watching their fellow subjects for signs of >pseudonym use, or the use of unlicensed/unapproved crypto, or "unlicensed >Internet broadcasting". Are we already seing this, with CAUCE and USENET II? Good users are known users (... and if it stops just one spammer...) -- Phelix From jya at pipeline.com Thu Sep 10 05:07:45 1998 From: jya at pipeline.com (John Young) Date: Thu, 10 Sep 1998 20:07:45 +0800 Subject: Springfield Medical Center In-Reply-To: Message-ID: <199809110107.VAA23558@dewdrop2.mindspring.com> Alia, Thanks for the update on CJ. Please keep us informed. More on CJ's music and how to get it, and help promote it, would be welcomed. It sounds wonderfully rude and vulgar, all right! Below is a 1994 thumbnail description of the U.S. Medical Center for Federal Prisoners in Springfield, Missouri, taken from a long, critical report on prisoner health care with more on the Springfield facility available at: http://jya.com/hehs-94-36.txt (81K) Bureau of Prisons Health Care: Inmates' Access to Health Care Is Limited by Lack of Clinical Staff (Letter Report, 02/10/94, GAO/HEHS-94-36). [Excerpt] SPRINGFIELD MEDICAL REFERRAL CENTER MISSION OF REFERRAL CENTER The U.S. Medical Center for Federal Prisoners in Springfield, Missouri, is one of the Bureau of Prisons' six referral centers that treat male medical, surgical, and mental health patients. LOCATION AND CONDITION OF FACILITY The Springfield Medical Referral Center is an administrative facility, meaning it is equipped to house inmates of all security levels. It was built about 1933. Inmates live in six connected buildings, each of two or three stories. The medical facilities are concentrated in four of the six buildings. The acute and chronic care medical and surgical patients are housed in units that resemble typical hospital rooms, except that several rooms in each unit have locked doors. These locked cells are used for patients who are (1) dangerous to staff or other inmates, (2) participating in the federal witness protection program, or (3) waiting for their custody status to be determined. The mental health patients are housed in units that resemble typical prison cell blocks with one-man cells. Springfield also has a unit that can contain up to 37 inmates in individual locked cells for disciplinary or protective reasons. NUMBER OF INMATES AND PATIENTS SERVED Springfield serves approximately 1,120 inmates, including 439 patients who require medical or surgical care and 294 who need psychiatric care. The medical and surgical care is provided to about 46 acute care patients, 54 patients receiving renal dialysis, and 393 other chronic or recovering patients. The mental health population includes 177 treatment patients and 117 forensic inmates who are being evaluated for their mental ability to stand trial. NUMBER AND TYPE OF MEDICAL BEDS The Joint Commission on Accreditation of Healthcare Organizations rates Springfield as a 46-bed acute care and 177-bed mental health hospital. NUMBER AND TYPE OF STAFF POSITIONS AUTHORIZED AND FILLED In July 1993, Springfield had 279 authorized health care positions, including 5 psychiatrists, 15 medical/surgical physicians, an optometrist, 12 physician assistants, 127 nurses, 9 pharmacists, 12 psychologists, 6 quality assurance staff, 10 medical records staff, and 82 other health care staff. At that time, 18 positions were vacant, including 3 medical physicians, a surgeon, a psychiatrist, a physician assistant, 10 nurses, 1 medical records staff, and 1 other health care staff. The following specialists were working at Springfield: 3 general practitioners, 4 psychiatrists, 2 internists, 2 neurologists, 1 physiatrist, 1 anesthesiologist, 1 orthopedic surgeon, and 1 chief of health programs. Physicians and physician assistants are available 24 hours a day. However, physicians generally work from 7:30 a.m. to 4:00 p.m. During the evening and night shifts and on weekends, one physician, one psychiatrist, and one psychologist are on call. Physician assistants are available in the facility 16 hours a day. Nurses are responsible for medical care between 10:00 p.m. and 6:00 a.m. Nursing service is provided 24 hours a day. STAFF ORGANIZATION The Associate Warden for Medical Services supervises most of Springfield's health care staff, including nurses and technicians. The Clinical Director is responsible for the internal medicine physicians, psychiatrists, surgeons, dentists, physician assistants, the quality assurance coordinator, utilization manager, and infection-control practitioners. The Associate Warden for Mental Health Services is responsible for the psychologists and social workers who work with the mental health patients. From jya at pipeline.com Thu Sep 10 05:23:19 1998 From: jya at pipeline.com (John Young) Date: Thu, 10 Sep 1998 20:23:19 +0800 Subject: Impossible Analysis Paper at Crypto98 Message-ID: <199809110124.VAA25687@dewdrop2.mindspring.com> There's talk of a paper given at Crypto98 on "Impossible Differential Analysis" which got the NSA people scribbling like mad taking notes as though this was something that had never come up at the agency and they'd better get right on it. Roughly, as I heard it (and I may be way off), the premise is that instead of using differential analysis for finding weaknesses in a cipher, to flip that to determine what could not possibly be a weakness in a cipher and build one with just those attributes. Is this report correct, and is there a source for that paper? From nobody at replay.com Thu Sep 10 05:25:41 1998 From: nobody at replay.com (Anonymous) Date: Thu, 10 Sep 1998 20:25:41 +0800 Subject: Cypherpunks as a Continuing Criminal Enterprise? Message-ID: <199809110126.DAA07290@replay.com> On Tue, 8 Sep 1998, Tim May wrote: > Could our group be charged as a "continuing criminal enterprise" under the > RICO statute? Probably. Under RICO and associated laws they can get anyone for anything. Well, except Komrade Klinton. > > It occurs to me that if Carl Johnson, who is linked several times to our > group/list in the court documents, is successfully prosecuted,then the Feds > may be able to cite both Bell and Johnson as evidence of a conspiracy. > > Which probably wouldn't be too hard to prove, as many of us have admitted > to conspiring mightily to undermine various institutions. (And we even use > encypted e-mail, the very essence of a secret conspiracy.) > > It might be fun to see them try this. Would they charge some of us as > ringleaders? Or would they declare the entity itself an illegal > organization? (As they have done with various cultural, political, and even > religous groups, like Hezbollah, the Aum religion, etc.) > > Interesting times. Quite. One partial solution I see is to rewrite premail in C so it runs at a respectable speed[1], fix some of the bugs[2], integrate it with more mailers, and then encourage everybody to subscribe through nyms. I'd love to see them try to prosecute users at nym.alias.net by presenting a court order to Community Connexion in Oakland. ;) [1] Yes, it's really slow on slower machines. [2] One of the most obvious is when Premail sends out 3 copies of a message for a 2 remailer chain, 9 copies for a 3 remailer chain, something like 27 for a 4 remailer chain, and so on. If nothing else, that's a security hole which allows people to know how many warrants they will need. From attila at hun.org Thu Sep 10 20:36:06 1998 From: attila at hun.org (attila) Date: Thu, 10 Sep 1998 20:36:06 -0700 (PDT) Subject: tickling the cheshire cat In-Reply-To: <3.0.3.32.19980910152608.0367d6cc@earthlink.net> Message-ID: let's see, the banks other than the select few bankers' banks and the Rockefeller-Rothschild central bank cartels are out 'n' billion, but that only represents an infinitesimal fraction of the middle class loss since it's paper to the banks, but life savings to the middle class. Thailand, Indonesia, Malaysia, Korea --the pet tigers of the US-Brit money cartels all propped up, but actually setup by the IMF and their rules which destroy their infrastructure in favour of the cartel. suckers one, suckers all. Japan started it all with their economic isolation, multi-level cronyism, state sponsored economic terror, and scientific cannibalism. Japan sits on 50% crony-deals and the banks are falling like dominoes, but Japan today is Japan for centuries; they wont take their medicine. The Arabs are in hock up to their headbands and real income in Saudi Arabia has fallen from 14,000 in 1991 to less than 4,000 today... but, now they wont fight each other as they found the common unifier as the Tomahawk IIs crashed into Sudan and Afghanistan. Italy, France, and even Germany cooked their books to make the Masstricht and Germany suffers from 13% unemployment; the EC can not afford their socialism and Kohl will need a new dinner table. Russia caves in after the mob bilked the international money market for over $500 billion! the summit of the doomed: pairing a demented, addled drunk with a moral bankrupt went Saturday Night Live... and the only two economies which have been able to maintain their standard of living are watching... meanwhile, Rubin cooks the books, steals the Social Security Administration's kitty for unfunded IOUs. the export of money grows and grows and grows --to China, whose state planned economy is as crony booked as Japan and China is preoccupied with learning to swim. Clinton thinks he can apologize for anything and Blair is playing cards in the back room. Ambrose came back to Washington to wait for the kill. forget the report to Congress, give the backup material the fraudulent duo buried in 100 graves to hollyweird --they wont need new plots for years. follow the money... dont worry about value; it's only relevant. attila out... tickling the chesire cat. From nobody at replay.com Thu Sep 10 05:51:06 1998 From: nobody at replay.com (Anonymous) Date: Thu, 10 Sep 1998 20:51:06 +0800 Subject: Revenge of the AOLHoles Message-ID: <199809110152.DAA09397@replay.com> On Thu, 10 Sep 1998 AIMSX at aol.com wrote: > > I truly hope you don't stereotype all AOL users for this idiot's insane > ramblings. > Unfortunately, some people are just morons, but you get them on every ISP > anyway, they just aren't so obvious on others, because unfortunately, AOL > makes it easier to communicate. AOL makes it easier to communicate. This has the intended side effect of attracting every moron with a home computer. Thus, AOL has a disproportionate number of morons. They get what they ask for. The problem is that most of the AOL users who publish to the net seem to be morons. They use some annoying Russo-Germanic quoting style, they can't use English, they're clueless, they post off-topic, or something else. Examples of AOL catering to morons: 1) "AOL is the Internet!" 2) Using the fact that their software *says* "You have mail!" as a selling point. 3) They use a platform-specific client package. Further, "AOL is the Internet," therefore AOL-specific conferences and newsgroups must be "on the Internet" or "on the net" *and are advertised that way*. Uhh... 4) They make no effort to educate their lamers...err, users. 5) They send out tons of "free trial" disks, trying to snare every idiot they can find. 6) They make their service as easy to use as possible, which is fine, except that it attracts people who don't have the mental capacity to use it when they venture outside of AOL. Witness the drek they pour onto the Cypherpunks list. I'm sure Mr. May could expand on this with a few dozen additional points, if not a few hundred. Now maybe this stuff is good marketting practice, but it's a lousy way to serve the community which gives them life. It's the equivelent of a swim coach bringing his students to a public pool and instructing them to release their bowels whenever they feel the urge. If you use a site which caters to morons, expect to get treated like one, especially if said site celebrates the fact that they're defecating in the pool. They've earned the stereotype that they have. While we're at it, maybe some of the statistics-types out there can analyze the archives for, say, the last month. Remove postings, if any, which are routed through an anonymous remailer at AOL. Then remove random or systematic spam (ex: the New York Times, that Javascript "child-molester" exploit). Then compare the number of clueless postings to Cypherpunks by AOL users to the number of useful and on-topic postings to Cypherpunks by AOL users, and compare that ratio against other ISPs. When determining clueless postings, include postings which use Russo-Germanic ("<< >>") quoting, or which are completely off-topic (ex: "how u do that"). Count postings which are clueless but were originally from another site and got forwarded here as originating from the original site. Maybe repeat for Juno and Hotmail. Exclude flames and subsequent discussions concerning these clueless postings (ex: don't include AIMSX's response or this response in either category). Then again, there probably isn't any need. From gbroiles at netbox.com Thu Sep 10 05:56:59 1998 From: gbroiles at netbox.com (Greg Broiles) Date: Thu, 10 Sep 1998 20:56:59 +0800 Subject: Mercury-News article tries to link crypto export, Africa bombings Message-ID: <199809110200.TAA22774@ideath.parrhesia.com> Standard four-horsemen stuff; see . I couldn't find any actual connection between the Africa bombings and crypto (or crypto export), but the FBI and their pet congresspeople are much too smart to get bogged down in a discussion of actual facts. -- Greg Broiles��������|History teaches that 'Trust us' gbroiles at netbox.com�|is no guarantee of due process. |_Kasler v. Lundgren_, 98 CDOS 1581 |(March 4, 1998) From mb2657b at enterprise.powerup.com.au Thu Sep 10 21:15:52 1998 From: mb2657b at enterprise.powerup.com.au (Scott Balson) Date: Thu, 10 Sep 1998 21:15:52 -0700 (PDT) Subject: One Nation tax policy on ABC Message-ID: <009f01bddd3a$fd9e65e0$f81c64cb@QU.fox.uq.net.ai> Dear One Nation supporter in NSW � We anticipate that the ABC's 7.30 Report will cover One Nation's discussion document on tax:� "2%EASYTAX" tonight. � We cannot guarantee how it will be presented but we are pleased that the ABC, unlike other Australian media, are apparently giving us the opportunity to present our views on why the tax should be considered. � The tax proposal has not been given a fair go by the media so far. See: http://www.gwb.com.au/tax.htm � Global Web Builders � � Scott Balson Pauline Hanson's Web Master From mgering at ecosystems.net Thu Sep 10 06:24:08 1998 From: mgering at ecosystems.net (Matthew James Gering) Date: Thu, 10 Sep 1998 21:24:08 +0800 Subject: radio net (fwd) Message-ID: <33CCFE438B9DD01192E800A024C84A19284643@mossbay.chaffeyhomes.com> BTW, is all this talk about rules for specific frequencies dedicated to amateur radio? Why not use some of the frequency ranges that were recently opened up for unlicensed SS/RF use? Matt (who sends encrypted traffic over the airwaves with his Ricochet modem) From rah at shipwright.com Thu Sep 10 06:35:51 1998 From: rah at shipwright.com (Robert Hettinga) Date: Thu, 10 Sep 1998 21:35:51 +0800 Subject: radio net In-Reply-To: <199809091239.HAA15369@einstein.ssz.com> Message-ID: Hey, guys, Someone here already said it, but nobody else got it, so I'll repeat it: SSB, or Single Sideband. It's commercial ham radio, if you will, and all the ships use it. I expect that you can shove anything down an SSB set that you want, including encrypted traffic. Ham radio is a government nerd subsidy, and as such, doesn't do much but make more government funded/sactioned/approved/whatever nerds. :-). SSB would do just fine. It's an international standard, after all, and probably not under the control of any one government, even.e Cheers, Bob Hettinga ----------------- Robert A. Hettinga Philodox Financial Technology Evangelism 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From ravage at einstein.ssz.com Thu Sep 10 07:16:20 1998 From: ravage at einstein.ssz.com (Jim Choate) Date: Thu, 10 Sep 1998 22:16:20 +0800 Subject: radio net (fwd) Message-ID: <199809110337.WAA08744@einstein.ssz.com> Forwarded message: > Date: Thu, 10 Sep 1998 22:28:02 -0400 > From: Robert Hettinga > Subject: Re: radio net > Someone here already said it, but nobody else got it, so I'll repeat it: > SSB, or Single Sideband. It's commercial ham radio, if you will, and all > the ships use it. I expect that you can shove anything down an SSB set that > you want, including encrypted traffic. > > Ham radio is a government nerd subsidy, and as such, doesn't do much but > make more government funded/sactioned/approved/whatever nerds. :-). > > SSB would do just fine. It's an international standard, after all, and > probably not under the control of any one government, even.e Single-sideband (SSB) isn't an international standard, it's a physical effect. See: The Art of Electronics Horowitz, Hill ISBN 0-521-37095-7 pp. 897 ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From whgiii at invweb.net Thu Sep 10 08:40:25 1998 From: whgiii at invweb.net (William H. Geiger III) Date: Thu, 10 Sep 1998 23:40:25 +0800 Subject: Revenge of the AOLHoles In-Reply-To: <199809110152.DAA09397@replay.com> Message-ID: <199809110441.AAA00735@domains.invweb.net> -----BEGIN PGP SIGNED MESSAGE----- In <199809110152.DAA09397 at replay.com>, on 09/11/98 at 03:52 AM, Anonymous said: >Now maybe this stuff is good marketting practice, but it's a lousy way to >serve the community which gives them life. The saddest thing about advertizing: It works. :( - -- - --------------------------------------------------------------- William H. Geiger III http://www.openpgp.net Geiger Consulting Cooking With Warp 4.0 Author of E-Secure - PGP Front End for MR/2 Ice PGP & MR/2 the only way for secure e-mail. OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html - --------------------------------------------------------------- Tag-O-Matic: I went window shopping...and bought OS/2! -----BEGIN PGP SIGNATURE----- Version: 2.6.3a-sha1 Charset: cp850 Comment: Registered_User_E-Secure_v1.1b1_ES000000 iQCVAwUBNfir5I9Co1n+aLhhAQGyHQP/UIIleHN1WZK5AAzoQPHLMIu4ZfN4ECas I50YxTxQ5MqnZwZi2VVxXik6RqwTreP3fsMiAlcE18nDxlAWSCc6eiJ6j4IzbOdO ko9bVi4nfX/vEq8tLTtxVJLab3k6H+crsqHky9CxQK/4TPQk45LrxsXJ895IoIqD IcsX2XSqYrs= =s6UJ -----END PGP SIGNATURE----- From die at pig.die.com Thu Sep 10 09:09:08 1998 From: die at pig.die.com (Dave Emery) Date: Fri, 11 Sep 1998 00:09:08 +0800 Subject: radio net (fwd) In-Reply-To: <33CCFE438B9DD01192E800A024C84A19284623@mossbay.chaffeyhomes.com> Message-ID: <19980911010325.B10226@die.com> On Thu, Sep 10, 1998 at 01:57:46PM -0700, Bill Stewart wrote: > > But that doesn't mean there isn't a strong demand for voice privacy - > just that the average consumer is satisfied having _some_ privacy, > enough to keep casual observers out and neighbors from stealing phone service, > and either doesn't believe the police would illegaly wiretap _him_, > or (more cynically) doesn't believe the cellphone is enough protection > if they do decide to target him. > > And it clearly isn't. With the exception of cellphone to cellphone traffic on one providers system (especially if it is GSM) the traffic gets sent in the clear over trunking which is not particularly well protected (and on occasion over microwave backhauls from cell sites in the clear), to wire line phones which are often very vulnerable to wiretaps. And all of these are subject to CALEA access, and many also to various subrosa access via mechanisms provided for test and maintainence and remote configuration of the system and trouble diagnosis (mechanisms well and trully exploited by phreakers over the years and well known and understood by the spooks as well). Without end to end encryption with secure key material the security of any phone is weak at best, link encryption of vulnerable links such as RF paths will keep the nosey out and raise the bar enough so as to discourage that kind of penetration by professionals, but if the call goes through switching and trunking infrastructure in the clear it is hardly difficult for large and powerful organizations to get there hands on it if they really need it... And of course if they really get desparate, they can bug the area the conversation is taking place in... or even the phones... -- Dave Emery N1PRE, die at die.com DIE Consulting, Weston, Mass. PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2 5D 27 BD B0 24 88 C3 18 From nobody at replay.com Thu Sep 10 09:19:12 1998 From: nobody at replay.com (Anonymous) Date: Fri, 11 Sep 1998 00:19:12 +0800 Subject: Impossible Analysis Paper at Crypto98 Message-ID: <199809110520.HAA29692@replay.com> > There's talk of a paper given at Crypto98 on "Impossible > Differential Analysis" which got the NSA people scribbling > like mad taking notes as though this was something that > had never come up at the agency and they'd better get > right on it. > > Roughly, as I heard it (and I may be way off), the premise is > that instead of using differential analysis for finding weaknesses > in a cipher, to flip that to determine what could not possibly be > a weakness in a cipher and build one with just those attributes. > > Is this report correct, and is there a source for that paper? This was presented at the rump session and apparently there is no paper writeup yet. Biham's home page at http://www.cs.technion.ac.il/~biham/ has a place you can register to be notified when new material comes out. With conventional differential cryptanalysis, you look for pairs of inputs which have differences (xors usually) such that after a certain number of rounds, the ciphertexts have certain differences with excess probability. With "impossible" differential cryptanalysis, you look for inputs with differences which lead to ciphertext differences that are "impossible", or at least have reduced probability. It's the same basic idea but you look for diminution rather than enhancement of the probability of later differences. Because of the reversal of the effect, the techniques for identifying differentials, exploiting them, and designing against them are rather different. As a result ciphers which were designed to resist differential cryptanalysis may be vulnerable to impossible differentials. This technique has apparently led to an improved attack on SkipJack, announced on Biham's web page above as "coming soon". There was also a moderate improvement in attacks on reduced-round IDEA (not effective against the full number of rounds though). At Crypto everyone was scurrying off to see if any of the AES candidates could be knocked out by the new technique. From 97343818 at 14683.com Fri Sep 11 01:06:29 1998 From: 97343818 at 14683.com (bman offer) Date: Fri, 11 Sep 1998 01:06:29 -0700 (PDT) Subject: Bulk emailing service Message-ID: <445877496358.PAA93871@mailhost1.cochems.com>


Bulkman Direct Email Promotion

Bulkman --> Call (336) 214-0344 for ordering information,custom orders, and Website information.  

Bulkman Services offers professional, effective direct email advertising to promote your business 
or website.  With our service you will reach thousands of people who are interested in what you 
have to offer.  We can send up to 500,000 emails out for you with your own sales letter.  The 
email addresses that we use are freshly extracted daily from people actually online either 
chatting or surfing! Plus, the people who receive your email aren't overloaded with other offers.  
We also offer targeted emailing using a target audience that you specify, for example - music lovers, 
single mothers, college students, etc.  

We use up to date, high quality programs to effectively extract fresh addresses and successfully mail 
your message.  This is why our service is more effective than others. 

Bulkman will give the sales boost you've been looking for.  Try out our services and  you will be 
overloaded with response and sales!!!


We accept any questions and phone orders -   

Call --> (336) 214-0344    - Anytime -
     --> please leave a voicemail message and you will be contacted shortly















From dbrown at alaska.net  Thu Sep 10 10:28:25 1998
From: dbrown at alaska.net (Dave Brown)
Date: Fri, 11 Sep 1998 01:28:25 +0800
Subject: oil, greens, recycling, and poly-ticks.
In-Reply-To: <199809092123.OAA17355@leroy.fbn.bc.ca>
Message-ID: <3.0.6.32.19980910205225.0096d7d0@alaska.net>



Ray Arachelian typethed the following...
>
>Raymond D. Mereniuk wrote:



>
>What pisses me off is that in NYC the gas prices are ridiculous high...
>$1.35/Gal is the regular gas, drive just a few miles over a tunnel or bridge 
>to n NJ, it's $1.00 or $.99 depending on which pump you hit...  go a bit
south,
>say VA, and in some areas it drops as low as $0.87 a gallon!
>
>Shit, if it weren't for the tolls and the drive, I'd be getting my gas out of
>NYC all the time, but doing so wastes enough and costs enough in tolls to not
>make it worth the effort...
>
>Just out of curiosity what are prices around where you guys live?

Prices in Anchorage are about $1.15 in the summer and $1.30-5 when the
tourists leave. And we have all the oil you can use and a bunch of
refinery's up here. 
We get shafted nearly as bad as you do.





 --Dave

Lucidity Paradox:  Explain a concept in sufficient detail, and it will
become clearer and clearer until it eventually disappears.





From s9812127 at postino.up.ac.za  Thu Sep 10 11:00:03 1998
From: s9812127 at postino.up.ac.za (s9812127 at postino.up.ac.za)
Date: Fri, 11 Sep 1998 02:00:03 +0800
Subject: Writing skills
Message-ID: 



YoU wR1t3 l1K3 tH1s aGa1N & 1'll f1 at m3 you, dickhead...
> From:          Jrjeffro at aol.com
> Date:          Wed, 9 Sep 1998 19:27:05 -0700 (PDT)
> Bcc:           

> HaCkaZ OnlY Da EliTeHelLO YaLL DiS is Da MaDD AAOOLL HaCka Ima startin a GreWp fOR HaCs Only So In OthA WerDS yA gOttA KnOw The WAreZ anD HoW toO UsEr FaTe AnD AOL So MaIl Or Im Me FoR Da TeTaIls 
f
> YeR LeeTo K Pe at CE FrOmE The LeeTs HacKJeFFrO)
> >
> 
-/"Those who desire to give up freedom in 
-/exchange for security will not have,
-/nor do they deserve, either one." - Thomas Jefferson
-/ Crayven.

-/"Those who desire to give up freedom in 
-/exchange for security will not have,
-/nor do they deserve, either one." - Thomas Jefferson
-/ Crayven.





From s9813117 at postino.up.ac.za  Thu Sep 10 11:14:52 1998
From: s9813117 at postino.up.ac.za (s9813117 at postino.up.ac.za)
Date: Fri, 11 Sep 1998 02:14:52 +0800
Subject: No Subject
Message-ID: 







From vznuri at netcom.com  Thu Sep 10 11:40:44 1998
From: vznuri at netcom.com (Vladimir Z. Nuri)
Date: Fri, 11 Sep 1998 02:40:44 +0800
Subject: If there's a trial will some of us be witnesses?
In-Reply-To: 
Message-ID: <199809110742.AAA07729@netcom13.netcom.com>




hmmmm, I doubt carl johnson will claim he is innocent. or
has he? the trial is only necessary if he doesn't plead
guilty. depending on his lawyer & the evidence, that seems likely to
me if he was involved. there aren't any cpunks with the 
resources to take on uncle sam, except maybe... 

seriously, though, it's fun to fantasize. it would certainly
be the trial of the century. better than unabomber & oj
simpson combined. 

that reminds me.. before they caught him I always thought
the unabomber was probably on the cpunk list. I was quite
surprised when his antitechnology rant came out. he's got
the rant part down, but not the technology part!!

at one time, kevin mitnick was on this list, rumor has
it. probably many of the world's premiere hackers have been at one time or
another.






From vznuri at netcom.com  Thu Sep 10 11:46:36 1998
From: vznuri at netcom.com (Vladimir Z. Nuri)
Date: Fri, 11 Sep 1998 02:46:36 +0800
Subject: Joe Cypherpunk
In-Reply-To: <199809091200.IAA18283@www.video-collage.com>
Message-ID: <199809110747.AAA08019@netcom13.netcom.com>



wow, a new site called sixdegrees.com, in which everyone
registers and reveals who their friends are. the privacy
implications are really incredible. yet supposedly
close to 1 million people joined, with 900,000 of them
connected!!

 wow!! boy, it sure would be interesting to
write software that analyzed this data.

 reminds me of another program someone wrote that looked
up proper nouns in the ciabase database, I think, and
showed the relationships. probably the kind of software
that intelligence agencies use all the time. pretty sophisticated.

amazing what the information revolution is bringing. in
many ways, extraordinary things can be done merely by
sloshing information around in creative ways. no one
has really predicted some of the coolest stuff that
is happening.

wheeeeeeee!!! cyberspace is so much fun!!!





From tcmay at got.net  Thu Sep 10 11:56:46 1998
From: tcmay at got.net (Tim May)
Date: Fri, 11 Sep 1998 02:56:46 +0800
Subject: Bits are Bits
In-Reply-To: <33CCFE438B9DD01192E800A024C84A1928463C@mossbay.chaffeyhomes.com>
Message-ID: 



At 1:54 PM -0700 9/10/98, Matthew James Gering wrote:
>> Um, actualy not. It is actualy illegal for me to allow you to
>> borrow my books, CD's, albums, etc.
>
>Uh, how so? Distribution copyright covers first-sale only, after that
>the owner can lend or sell that item. If it were not for this, public
>and private libraries could not exist.

Several misc. points. Perhaps related, but I don't have the time to try to
figure out all the relations.

* Books: OK to resell. OK to lend. May or may not be OK to rent.

* Recorded music: OK to resell. OK to lend to private parties for
noncommercial use. NOT OK to rent.

* Recorded videos: OK to resell, OK to lend to private parties for
noncommercial use, OK to rent. (There are video rental stores, but not CD
rental stores.)

* Software: OK to resell if license allows it, if original is destroyed, if
no copies are kept, blah blah blah. (Very complicated.) Not legal to rent
software since around the mid-80s, when software rental stores stopped.

* It is not illegal under the Act passed by Congress authorizing a blank
media tax. (I think it was called the Home Recording Act, or somesuch.
Circa 1992-4.) The Act requires that blank tapes be taxed and then says
that "noncommercial use" is declared to be legal. In other words, the
government is collecting money from us and says as a result we get to tape
stuff for our own use.

* I myself have taped about 600 CDs and DATs, digitally taped onto DAT. (I
use a Sony home deck for some purposes, a Sony DATMAN for others, and a
Tascam DA-P1 portable for others. The Tascam is neat in that it ignores the
SCMS bits and thus allows unlimited DAT-to-DAT copying.) A friend of mine
has taped over 4500 recordings...he's a bit obsessive about his library of
"free" music. He uses public libraries to get a dozen or so CDs at a pop,
then loads them into a carousel player and records for 3-5 hours each
night, and often during the day.

* There is talk that the Bern Convention, which the U.S. recently signed,
overrides this Home Recording Act (or whatever the title was).

* As to public and private libraries, I think the situation is much more
unsettled than Matthew makes out:

-- lending (and presumably rental?) of books is allowed, by convention.

-- rental of software is no longer allowed (court case?)...it seems to have
ended around 1984 or so, when the software rental place near me announced
it could no longer rent software titles

-- rental of CDs is not apparently allowed...but sales of used CDs
are...and liberal return policies on new CDs are common (defacto rental).
The music store chain, "Wherehouse," was involved in a major court case on
this several years ago. I presume from their continued sale of used CDs
that they won. (The case may have involved whether record labels could
refuse to sell to them, a choice I would of course support, in a free
society.)

-- rental of videos is allowed. (Why videos but not CDs? What about books
on tape? What about books on CD, either audio or CD-ROM?)

Anyway, I can discern no clear point here. It all seems hodge podge.

* Just today I was at a store which was selling many copies of major
programs at deep, deep discounts. A set of "used" installation diskettes
for Microsoft's "Excel" was selling for $24.95. And so on. There is little
enforcement of laws supposedly stopping this.

* There is no ipso facto reason why a book publisher could not require as a
condition of sale that no resales, rental, or lendings occur with the
publisher's permission. In fact, some have argued for this.

* If the courts intervene to say such restrictions are not allowable, how
can such restrictions exist for software? (Sure, the usual and tired
"replicability" argument. But a publisher and author are "losing" just as
much when a bestseller is rented or lent out a dozen times instead of
generating sales....)

In closing, it's all a hodge podge. Books are just bits. Saying one set of
bits may be lent out, but another set may not is not a stable solution.

And we all know what cyberspace is doing to all of these points.

--Tim May

(This space left blank pending determ. of acceptability to the gov't.)
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.







From vznuri at netcom.com  Thu Sep 10 12:11:39 1998
From: vznuri at netcom.com (Vladimir Z. Nuri)
Date: Fri, 11 Sep 1998 03:11:39 +0800
Subject: Impossible Analysis Paper at Crypto98
In-Reply-To: <199809110124.VAA25687@dewdrop2.mindspring.com>
Message-ID: <199809110813.BAA09626@netcom13.netcom.com>



a proof that you have an unbreakable cypher has a lot
of implications to the P=?NP question. if the analysis
is novel and elegant, than it might very well leads to
insights into P=?NP of computer science.





From vznuri at netcom.com  Thu Sep 10 12:35:09 1998
From: vznuri at netcom.com (Vladimir Z. Nuri)
Date: Fri, 11 Sep 1998 03:35:09 +0800
Subject: SNET: [FP] Alaska: Nearly 93% of new parents choose Enumeration At Birth (EAB)
Message-ID: <199809110836.BAA11054@netcom13.netcom.com>




From: "ScanThisNews"  (by way of jeremy.compton at stonebow.otago.ac.nz (Jeremy Compton))
Subject: SNET: [FP] Alaska: Nearly 93% of new parents choose Enumeration At Birth (EAB)
Date: Fri, 11 Sep 1998 01:37:30 +1200
To: snetnews at world.std.com


->  SNETNEWS  Mailing List

======================================================================
SCAN THIS NEWS
9/10/98

This article actually ran in '96, but it is worth reviewing.

======================================================================

Press release from Alaska's Department of Health and Social Services
found at: http://health.hss.state.ak.us/htmlstuf/com/pr/media.htm

Electronic Birth Certificates and Social Security Cards at Birth Make Life
Easier For Parents

Februrary 6, 1966 (sic)

The Alaska Department of Health and Social Services Bureau of Vital
Statistics reports that the Electronic Birth Certificates (EBC) have been
installed in all but three of Alaska's hospitals. In a little over a two
year time period, the Bureau has gone from no electronic birth certificates
to nearly 99% of all Alaska hospital births coming to the Bureau in
electronic format. "Innumerable man-hours have been saved at both ends of
the registration process," said Al Zangri, Chief of the Bureau. In
addition, in cooperation with state-wide hospitals, the Bureau has
implemented the Social Security Administration's Enumeration At Birth (EAB)
program statewide during 1995. The Enumeration at Birth program allows
parents to request a social security number for their newborn through the
birth registration process. This program has proven to be so popular with
new parents that nearly 93% of all births transmitted to the Bureau request
a social security number.

=======================================================================
-----Original Message-----
From: Katherine A.
Sent: Thursday, Sep. 10, 1998
=======================================================================
Reply to: 
=======================================================================
 To subscribe to the free Scan This News newsletter, send a message to
      and type "subscribe scan" in the BODY.
    Or, to be removed type "unsubscribe scan" in the message BODY.
   For additional instructions see www.efga.org/about/maillist.html
-----------------------------------------------------------------------
             "Scan This News" is Sponsored by S.C.A.N.
           Host of the "FIGHT THE FINGERPRINT!" web page:
                www.networkusa.org/fingerprint.shtml
=======================================================================



-> Send "subscribe   snetnews " to majordomo at world.std.com
->  Posted by: "ScanThisNews"  (by way of jeremy.compton at stonebow.otago.ac.nz (Jeremy Compton))





From vznuri at netcom.com  Thu Sep 10 12:35:10 1998
From: vznuri at netcom.com (Vladimir Z. Nuri)
Date: Fri, 11 Sep 1998 03:35:10 +0800
Subject: IP: The big blackout?
Message-ID: <199809110836.BAA11018@netcom13.netcom.com>




From: "Douglas E. Renz" 
Subject: IP: The big blackout?
Date: Thu, 10 Sep 1998 15:50:53 -0400
To: "'Chris Ball'" <1stlight at mail.tds.net>, "'En_Agape'" , "'Kim/Jr'" , "'Kristen'" , "'Steve Cortese'" , "'Tom Young'" 

September 7, 1998

The big blackout?

Regardless of your own Y2K preparedness, the slow-moving electrical industry
could leave you in the dark
By Blaise Zerega

Companies scrambling to bring their computer systems into year-2000
compliance may discover that their time and effort will be for naught. A
lack of preparedness by North America's electrical industry may pull the
plug on many companies' transition plans.

Although many electric companies have already begun addressing year-2000
compliance, some have not. It was only in June that the first industrywide
efforts got under way, which may not leave enough time for testing and
contingency planning, according to experts.

"I can't tell you overall how we stand. Based on the information we receive,
we'll build contingency plans off that," said Jon Arnold, chief technology
officer of the Edison Electric Institute (EEI), a trade organization in
Washington that represents companies supplying roughly 75 percent of North
America's electricity.

The North American Electric Reliability Council (NERC) will present the
first industry report on year-2000 readiness to the Department of Energy
(DOE) on Sept. 14, with public release slated for Sept. 17. Until the
publication of this report, serious questions about the capability of power
companies to generate, transmit, and distribute electric power -- and the
consequences for IT system and business disruptions -- will abound.

Industry experts point to the electric system's interconnectedness as the
potential source of most problems. North America is divided into three
interconnected power grids, which are made up of electric generating,
transmitting, and distribution companies. These thousands of companies
compose a high-level network that is only as strong as its weakest segment.

"If you have a failure in one place, it can affect the power delivery in
many places," said Stephanie Moore, an analyst at the Giga Information
Group, a research company in Westport, Conn.

The risk posed by interconnectedness is made worse by deregulation. For
example, a California company purchasing power from a Tennessee company may
not receive it because of a transmission problem in Kansas.

Unfortunately, companies have very few alternative power options, analysts
say. Large companies should investigate on-site power generation, largely
from generators, while small companies with limited resources might resort
to candles and a return to paper -- until power is restored and IT systems
brought back up.

"The truth is, I don't have any good advice," said Rick Cowles, director of
industry year-2000 solutions at Tava Technologies, in Penn's Grove, N.J.

Many companies have been slow to tackle the year-2000 risks of their power
supply, concentrating instead on their internal computing systems, analysts
said.

A large Fortune 200 manufacturer in the Midwest is taking this risk
seriously, but has yet to cement a plan to manage the risk. The manufacturer
has more than 50 worldwide locations and is urging its local facilities to
contact their electricity suppliers immediately.

"As we start to develop insight to what those providers are capable of,
we'll draw that into business continuity and contingency planning," the
manufacturer's year-2000 project leader said.

Other companies such as credit card provider Household International will
use in-house resources to meet the possibility of power disruption.

"All our major facilities are being prepared to handle any external or
internal failure, [by] having back-up generator and back-up diesel
capability," said Thomas Wilkie, Household International's director of risk
management, in Prospect Heights, Ill.

For now, companies have to wait while the electric power industry as a whole
undertakes the critical steps of gaining and sharing information.

"We can't answer questions on preparedness at this point," said Gene
Gorzelnik, director of communications at NERC, in Princeton, N.J.

NERC is compiling results of questionnaires sent in June to the 200 largest
North American power companies, and to four trade associations representing
3,000 distribution companies. Results will be included in the industry
report delivered to the DOE in September. NERC will follow the report with a
coordination of preparedness plans and scenario analysis ending in July
1999, and a coordination of precautionary operations during the year-2000
transition.

Although NERC and the EEI expect the September DOE report to be positive
generally, it is not clear whether "mom and pop" distributors or large
electric utilities -- generally thought to be more vulnerable -- present a
greater risk.

"In a lot of cases, you can't make the assumption that mom and pops are
going to be the problem, because the larger companies tend to have a lot of
automation," the EEI's Arnold said.

Another risk in need of assessment is the nuclear power industry. According
to the Nuclear Energy Institute, a trade organization in Washington, the
United States depends on nuclear power to generate 22 percent of its
electricity.

"You can't talk about [year 2000] and electricity without including the
nuclear power industry," Cowles said.

In June, the Nuclear Regulatory Commission (NRC) sent a letter the 108 U.S.
nuclear power plants advising the industry of year-2000 risks and requesting
a detailed written statement of readiness by July 1, 1999.

Much like the NERC effort, the NRC information-gathering is a good first
step, but one that leaves companies considering contingency plans in limbo.

"My advice is wait for the [industry] reports and strike up a dialogue with
your utility at the local level," Arnold said.






**********************************************
To subscribe or unsubscribe, email:
     majordomo at majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email at address
**********************************************
www.telepath.com/believer
**********************************************





From vznuri at netcom.com  Thu Sep 10 12:35:12 1998
From: vznuri at netcom.com (Vladimir Z. Nuri)
Date: Fri, 11 Sep 1998 03:35:12 +0800
Subject: IP: [FP] Smart Cards -- Public Acceptance?
Message-ID: <199809110836.BAA10995@netcom13.netcom.com>




From: "ScanThisNews" 
Subject: IP: [FP] Smart Cards -- Public Acceptance?
Date: Wed, 9 Sep 1998 22:07:48 -0500
To: ignition-point at majordomo.pobox.com

======================================================================
SCAN THIS NEWS
9/9/98

=======================================================================

New Poll: 76% Indicate Interest in Smart Cards

 SAN FRANCISCO--(BUSINESS WIRE)--Sept. 9, 1998--

 Smart Card Forum research study seeks keys to market success, ways to
bridge the gap between early adopters and the mainstream consumer market

 The Smart Card Forum (SCF), a multi-industry organization working to
accelerate the widespread acceptance of smart card technology, today
announced some initial top-line poll results of a qualitative and
quantitative research study it has commissioned. A detailed analysis of the
comprehensive study will be finalized in tandem with the Forum's Work Group
meetings this November in Florida.

 The Forum is attempting to better understand what North American consumers
would like in a smart card that they could carry around with them that
stores information or value (or both) from various applications (e.g.,
health care, insurance, banking, loyalty programs). These applications are
just some of what a smart card can do (the technology has many more
applications), but a study of how consumers perceive them will help the
industry better understand the potential size and shape of the future market
for smart card technology.

 "The smart card is a very exciting and powerful emerging technology," says
Forum President William J. Barr. "To extend its promise into the mainstream
commercial marketplace means understanding and then delivering what
consumers want. After all, it's a basic marketing premise that you have to
understand the public's needs before you can deliver a solution that will
win their support and loyalty. Previous Forum market research has shown
consumer interest in our industry; this next wave of research is designed to
provide us with more specific information that we can apply to the task of
introducing smart cards to the broadest possible consumer audience."

 FIND/SVP, a nationally known New York-based research and consulting firm,
was asked by the Forum to design the research study to capture consumer
perceptions of smart cards and the keys to their acceptance and use. To do
this, they designed a qualitative (14 focus groups) and quantitative
(telephone survey of 2,400) research study(a) conducted in the United States
and Canada. It was tightly focused to determine certain attributes of smart
cards, which applications would be supported and why, plus servicing,
branding, and pricing issues.

 For the purposes of the research, a very specific "smart card concept" was
developed and tested. It was described as a "card-sized unit with a memory
that can hold just about any kind of information but requires some sort of
reader to input or output data." Among the research findings:

- three quarters of those polled (76%) said they were "extremely," "very" or
"somewhat" interested in the smart card concept; about one-third (31%) were
"very" or "extremely" interested

- of the 31% "very" or "extremely" interested, the majority said that they
would "definitely want" smart cards for applications such as med-alert
information (74%); health insurance ID (62%); ATM and related bank access
(59%); drivers licenses (56%); and credit cards (53%)

- the most interested group were, in general, willing to pay up to $50 to
obtain a smart card, and a $25 annual fee to maintain the card

- that same group carried far more cards in their wallets than those not
interested (6.3 cards vs. 3.9 cards)

- those most interested fit the profile of early technology adopters:
younger, higher income, own a PC, etc.

- convenience and security were seen as key motivating factors for adoption

 "These initial results reveal a number of interesting things we didn't know
before," says Barr. "First, smart cards -- as they were conservatively
described in the research -- have a potential core early-adopter
constituency to start with of about a third of the population. Second, some
of the applications a smart card can enable are easily understood and
appreciated by that segment of the population. That's good news for the
industry, because it is the use of smart cards for each of these individual
things that will collectively increase the momentum towards
multiple-application smart card interoperability and ubiquity."

Interest in smart cards.

 All focus group respondents expressed interest in the "smart card concept."
It should be noted that these groups were pre-screened to eliminate
"technophobes," and participants developed concepts themselves, so higher
levels of enthusiasm for smart card technology were to be expected.

 However, approximately three-quarters of those polled in the telephone
survey said they were either "somewhat," "very" or "extremely" interested in
the smart card concept. About a quarter were not interested.

 Who are most interested in the idea of smart cards?

 The research discovered that those interested in smart cards - compared to
those "not interested" in the concept -- are:

- much more likely to have PCs, cell phones, or other high-tech devices (98%
vs. 68%) - much more likely to look forward to new technology (44% vs.
18%) - younger (38 vs. 48 years old) - have higher incomes ($54,000 vs.
$45,000) - already carrying more cards than those not interested (6.3 vs.
3.9)

 "Those numbers tell us that as an industry, we must extend our efforts
beyond the classic early adopter community and connect with the majority of
consumers who need to be educated about the many benefits to them of smart
card technology," says Barr.

 "Our ability to bridge that gap will determine the future success of our
industry."

One card to replace many.

 As designed by the focus groups, "Such a (smart) card would replace most of
what they now carried in their pockets and do other things as well. It would
not be used in addition to the cards in the wallets, but instead of those
cards."

 Of those interested in having a smart card (N=741): *T Would want only one
smart card 35% Would want two smart cards 30 Would want three smart cards 27
Would want four or more cards 6 *T One card that does many things.

 Within the qualitative phase, people were able to easily generate potential
uses for a smart card. More than 100 plausible application ideas were
generated, both for personal and for business use. These included: replacing
money and credit cards, replacing many of the cards in one's wallet, storing
records, and managing daily events.

 Of those interested the smart cards, respondents said that they would
"definitely want" them for:

Med-Alert information 74%, Health insurance ID 62, ATM and related bank
access 59, Drivers license 56, Credit cards 53, Prescription card 51, Car
information 50, Money for small purchases 48, Medical records 44, "Other" ID
39, Discount shopping cards 39, Money for larger purchases 36, Frequent
flyer information 34, "Other" membership cards 26.

 According to Barr, "we are pleased by these findings on applications,
because that's what smart cards are supposed to be all about. Smart cards
are supposed to perform lots of diverse functions, and we're pleased that
those surveyed could identify so many of them. Multi-application
interoperability is both the objective of the Smart Card Forum and the key
to unlocking the business potential of our industry."

The ideal way to distribute and control smart cards.

 A consensus emerged among those most interested in the concept about how
one would/should get and maintain a smart card:

- consumers would obtain a "starter" smart card from one of many sources,
either free or for a small fee

- they would "build" onto it by adding identification and licenses, personal
data, and credit data (among others), either free or for a small fee

- users would pay an independent service an annual fee to help maintain and
protect the card

- individual smart card-holders would allow different organizations
different levels of access to the card

Respondents disliked the idea of a single authority having access to all
their smart card key data. They accepted that in the absence of such an
authority, problems with maintaining the card, replacing it, canceling it,
etc. would become overwhelming. Accordingly, their plausible solution was
"distributed," allowing for widespread sale of smart cards at a very low
price, with the cards supported by an individual choice of one of many
independent "bonding agencies" paid monthly or annual fees for their
services. It was thought that data might also be backed up by this agency
(in encrypted form), or saved by the card's owner who would have two
versions of his/her card made.

Mild preference for adding data oneself 61%, Mild preference for having one
company to call for problems 59%, Mild preference for many suppliers 58%.

Pricing.

 In general, the research discovered that of those most interested in the
smart card concept, respondents were willing to pay up to $50 to obtain a
card, and approximately a $25 annual fee to maintain the card.

 Potential smart card users rarely envisioned a single-use card that would
be used in addition to the cards in their wallets. Rather, they were
interested in a card that would put multiple uses on a single device. The
key reasons for embracing the card thus focused heavily on convenience:
fewer things in one's wallet, fewer things to remember to carry.

 Another initial motivator might be security. A smart card can be made
significantly more secure than a normal magnetic stripe card, and when
introduced to that information, survey participants indicated that smart
cards might, by "electronically storing receipts in some way," provide
additional reassurance. The use of electronic fingerprinting (biometrics) as
proof of identity was also seen as a way to protect the security of
information stored on smart cards.

 "Security" was also interpreted as meaning medical safety and physical well
being. Accordingly, a smart card with emergency information accessible by
physicians and paramedics was also considered desirable.

 Other ways to encourage initial smart card use focused on having a smart
card doing certain things better than its "dumb" predecessor (e.g. a
"faster" or "less expensive" card). Using the card as an electronic key, to
which other applications might be added later, was also seen as a possible
benefit.

The bottom-line.

 "Using a very precise and narrow definition of a smart card, we have
discovered useful new information that we can apply as the full spectrum of
smart card applications emerges into the mainstream commercial environment,"
says Barr. "This is just the beginning of our industry's efforts to learn
about how we can connect with and educate consumers whose interest in smart
card technology increases in relation to the information they have about
it."

 The Smart Card Forum (www.smartcardforum.org) is a non-profit, multi-
industry organization of 200 members working to accelerate the widespread
acceptance of multiple application smart card technology by bringing
together, in an open forum, leading users and technologists from both the
public and private sectors.

NOTES:

- The "qualitative" aspect of this study comprised a set of 14 focus groups
that were conducted in four US cities (New York City, NY; Chicago, IL; San
Francisco, CA; and Jacksonville, FL), and two Canadian cities (Guelph and
Toronto, ON).

- The "quantitative" aspect comprised a much larger and more "projectable"
sample of 2,400 American and English-speaking Canadian citizens aged 18 and
over who completed a structured telephone interview. Respondents were
capable of using a smart card (e.g., had some other form of "plastic" card
or checking accounts) but otherwise were randomly selected.

CONTACT:
Megan McDonnell
Environics Communications
1 (203) 325-8772, #14
mmcdonnell at environics-usa.com
or
Karen Silberman
Smart Card Forum
1 (703) 610-9023
help at smartcardforum.org

=======================================================================
[forwarded from F.D. Bowden]
=======================================================================
Reply to: 
=======================================================================
 To subscribe to the free Scan This News newsletter, send a message to
      and type "subscribe scan" in the BODY.
    Or, to be removed type "unsubscribe scan" in the message BODY.
   For additional instructions see www.efga.org/about/maillist.html
-----------------------------------------------------------------------
             "Scan This News" is Sponsored by S.C.A.N.
           Host of the "FIGHT THE FINGERPRINT!" web page:
                www.networkusa.org/fingerprint.shtml
=======================================================================






**********************************************
To subscribe or unsubscribe, email:
     majordomo at majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email at address
**********************************************
www.telepath.com/believer
**********************************************





From vznuri at netcom.com  Thu Sep 10 12:35:24 1998
From: vznuri at netcom.com (Vladimir Z. Nuri)
Date: Fri, 11 Sep 1998 03:35:24 +0800
Subject: IP: [FP] FW: CA Fingerprinting legislation
Message-ID: <199809110836.BAA11006@netcom13.netcom.com>




From: "ScanThisNews" 
Subject: IP: [FP] FW: CA Fingerprinting legislation
Date: Wed, 9 Sep 1998 22:12:08 -0500
To: ignition-point at majordomo.pobox.com

======================================================================
SCAN THIS NEWS
9/9/98

[Forwarded message]
======================================================================
Fr:	Jon Golinger, CALPIRG
Re:	Wrap-up on Bank Fingerprinting/Biometrics Legislation in California
this year
Date:	9/9/98

As you know, there was significant activity in the State Legislature this
year surrounding the use of fingerprints and other biometric identifiers
by banks and commercial entities.  This is an effort to summarize what
happened this year and solidify a coalition to work together on these
issues next year and in years to come.

There were two main bills introduced to address the
fingerprinting/biometrics issue - SB 1622 by Senator Steve Peace, which
would have prohibited banks from fingerprinting customers, and AB 50 by
Assemblyman Kevin Murray, which would have created some guidelines for
the use of fingerprints and other biometrics in the commercial sector. 
Neither piece of legislation passed this year.

SB 1622, backed by CALPIRG, the Privacy Rights Clearinghouse, ACLU, Ralph
Nader, and others, was approved by the State Senate and the Assembly
Judiciary Committee.  Opposed by the California Bankers Association and
some law enforcement officials, the bill was voted down in the Assembly
Banking Committee in early August and remained there for the rest of the
year.

AB 50, backed by the California Bankers Association and some law
enforcement officials, was heavily amended and approved by just one
Committee, the Senate Judiciary Committee, after extensive negotiations. 
Opposed by Nader, ACLU, CALPIRG, Privacy Rights Clearinghouse, and the
California Reinvestment Committee, AB 50 was expected to pass but was
pulled from the Senate Floor and killed by leadership the day before the
session ended.

So, the status quo leaves many California banks still fingerprinting
customers and the potential for other commercial uses of biometrics very
much an open question.  However, the banks and their allies failed to
close the door on this issue by passing the weak "consumer protections"
in AB 50 that would have effectively paved the way for fingerprinting and
biometrics in a variety of commercial situations and made it difficult to
pass consumer-friendly legislation in the future.

This issue will surely be the subject of legislation next year.  I
believe that it would be in the interests of those concerned about
privacy, discrimination, and "Big Brother" issues related to this subject
to begin discussions or meetings before the new legislative session
begins about a plan for the coming year.  We may also want to consider
establishing a "Privacy Coalition" to work on these and related issues as
they arise.  I will be in touch with interested groups and individuals
about this in the coming weeks.

We can be certain of one thing:  the banks and their allies will be back.
 So will we.

-----Original Message-----
From: Jon L Golinger [mailto:calpirg.golinger at juno.com] 
Sent: Wednesday, September 09, 1998 2:56 PM
To: mcdonald at networkusa.org
Subject: CA Fingerprinting legislation

=======================================================================
Reply to: 
=======================================================================
 To subscribe to the free Scan This News newsletter, send a message to
      and type "subscribe scan" in the BODY.
    Or, to be removed type "unsubscribe scan" in the message BODY.
   For additional instructions see www.efga.org/about/maillist.html
-----------------------------------------------------------------------
             "Scan This News" is Sponsored by S.C.A.N.
           Host of the "FIGHT THE FINGERPRINT!" web page:
                www.networkusa.org/fingerprint.shtml
=======================================================================






**********************************************
To subscribe or unsubscribe, email:
     majordomo at majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email at address
**********************************************
www.telepath.com/believer
**********************************************





From vznuri at netcom.com  Thu Sep 10 12:35:49 1998
From: vznuri at netcom.com (Vladimir Z. Nuri)
Date: Fri, 11 Sep 1998 03:35:49 +0800
Subject: IP: Looming Y2k Crisis
Message-ID: <199809110836.BAA11030@netcom13.netcom.com>




From: "Douglas E. Renz" 
Subject: IP: Looming Y2k Crisis
Date: Thu, 10 Sep 1998 15:53:12 -0400
To: "'Chris Ball'" <1stlight at mail.tds.net>, "'En_Agape'" , "'Kim/Jr'" , "'Kristen'" , "'Steve Cortese'" , "'Tom Young'" 

   36 Seemingly Innocuous Questions That Pry the Truth
  Out of Managers and Programmers Regarding the Year 2000
   (Y2K) Problem and Their Organization's Looming Crisis

                   (c) Gary North, 1997
                 http://www.garynorth.com

The author hereby gives permission to any reporter,
columnist, or journalist to e-mail a copy of this report
to any colleague in the profession.


                       INTRODUCTION

     The Year 2000 (Y2K) Problem is real.  If it weren't,
Chase Manhattan Bank would not have budgeted between $200
million and $250 million to solve it.

     Nobody knows what the fallout will be.  My Web site
offers summaries and links to documents posted all over
the Web.  But there are so many potential falling dominoes
that nobody can predict most of what's going to happen.

     We will be hit from all sides without warning.
Things that nobody is thinking about today will be
disrupted.  For example, the water-control locks on the
Panama Canal are controlled by a mainframe computer
system.  Jimmy Carter and Congress signed away the Canal
back in 1977.  It goes to Panama on January 1, 2000.  Will
the U.S. government fund this Y2K repair?  (Ha!)  If not,
what happens to the canal in 2000?  What happens to
shipping?  The government is not discussing this.

     Dominoes.  Nothing but dominoes.  Maybe you can find
some interesting ones locally.

     I have set up a closed discussion forum on my Web
site for reporters who are working on Y2K assignments.
You can post messages to each other.  Maybe it will help.
If you find an interviewing strategy that works better
than what I suggest here, let me know.  Meanwhile. . . .


          I.  EXPECT TO BE STONEWALLED OR MISLED

     This reporting assignment is easier for women.  The
company's PR department will assume that a woman doesn't
know anything technical.  The manager or PR flak may be
less guarded.  If you're a woman who majored in English
lit, let the public relations people know this early.

     For general background, read the cover story of
NEWSWEEK (June 2).  This is an accurate account.  If
anything, it is overly subdued.  You need to know what is
at stake internationally before you begin research on how
the Millennium Bug will affect your community.

     My report is no cure-all.  A well-informed manager is
going to be paranoid about a story on Y2K and his
organization.  You have to hope you wind up interviewing a
manager or spokesman who really doesn't understand the
problem.  The closer you get to the truth, the more that a
careful manager will raise his "deflector shields."

     "We cannot divulge any proprietary information."
     "Our contractor is in charge of this project."
     "No, he cannot speak with you about this."
     "Our vendors are taking care of this."
     "No, we cannot supply their names."
     "We are on schedule: late 1998."

     When you hear any of these, be assured: you're onto
something important.  To get the full story, you must now
earn your paycheck.

     You can invoke the time-honored, "We want you to have
an opportunity to tell your side of the story."  You may
choose to hand him a photocopy of the NEWSWEEK article.
"This paints a pretty glum picture.  I had hoped to find
out if things really are as bad as this report indicates.
If your organization is on top of this problem, I would
like to be able to report this to our readers."  You can
gently make it clear that a refusal to answer questions
will make the company's situation look bad -- maybe worse
than it really is.  If you can't get access to a
programmer, keep asking the spokesman questions, even if
you get "no comment" to all of them.  Write each refusal
down in your notebook.  This will make him nervous.

     The most important Y2K-threatened organizations in
your community are the public utilities: water/sewers,
natural gas, and above all, electricity (the national
power grid is at risk).  You could do a powerful series of
articles on just these.  They can't stonewall you as
easily as a private firm can.  They are politically
controlled.  You can go to members of the public utilities
commission, tell them they you're being stonewalled, and
ask for help.  Ultimately, public utilities commission
members will become personally liable if the system goes
down and they knew about it in advance.  You can even
print out two or three of the documents I've posted on my
Web site under "Litigation."  Hand these print-outs to one
or more of the PUC's members.  My site's address is:

http://www.garynorth.com

     A member of a public utility commission is at great
personal risk if he lies or deliberately misleads the
public, and then a disaster takes place.  Call it
"Chernobyl syndrome."  Ask one or more of them to run
interference for you.  You want the interview.

     If you absolutely can't get access to a programmer at
a public utility, print out a copy of this report and hand
it to every member of the public utilities commission.
Tell them they had better get these questions answered for
themselves, and soon.

     I know of only one detailed local Y2K study that is
easily available: the report on North Platte, Nebraska,
written by three Creighton University economics
professors.  I have posted it on my site under
"Government."  A front-page story on Dick Brich, the
programmer in charge of the county's computer system,
appeared in the May 1, 1997 issue of USA TODAY.

     To understand the programming problem, you need a
standard for comparison.  Here is a good one.  Social
Security has had 400 programmers working since 1991 to fix
its system, which has 30 million lines of code.  The SSA
discovered the problem in 1989.  As of 1997, the system is
still noncompliant.  (See my Web site's category,
"Government.")  Use Social Security your benchmark.


                 II.  WHAT IS THE THREAT?

     You should assume that the spokesman or manager who
has consented to be interviewed has no idea of what is
involved technically in a Y2K repair.  He does not know
how long it will take.  Neither does anyone else.  Nothing
on this vast scale has ever been attempted in the
Information Technology world.

     The company probably has an official deadline:
December 31, 1998.  This has been forced on management by
the threat of post-1999 litigation: a due diligence date,
just in case the repair fails.  At least a year of testing
is necessary to verify that the repair is bug-free or at
least manageable.  The question is: Manageable by how many
people?  Kathy Adams of Social Security says that a 1%
error rate is too high.  With either 43 million or 50
million monthly checks -- she invoked both figures on
separate occasions -- either 430,000 or 500,000 phone
calls would hit the branch offices within days.  It would
overload the SSA's system, she says.  (Her estimate is
just for month one.  What if these complaints all not
taken care of, and another 1% error rate happens again
next month?  SSA will get a cascading effect -- noise,
confusion, and telephone busy signals.  Shutdown!)

     Medicare expects to pay a billion claims in 2000.
What percentage of errors would overwhelm the system,
assuming the system doesn't shut down on Jan. 1, 2000?

     But the manager who is speaking with you -- think of
him as Dilbert's boss's boss -- has not thought about any
of this.  So, he has no idea what constitutes a failed
repair, short of an absolute shutdown.  His job is to
paint a happy-face picture for you and all other
inquirers.  If the company is facing a disaster, he
doesn't want you to find out, assuming that anyone in the
company has warned him, which is doubtful.

     Everyone in the company has an incentive to lie.
Dilbert is paid to write code.  He does not make waves.
Meanwhile, his boss is threatened with getting fired if he
tells senior management, "I can't get this project
finished on schedule.  The system will crash."  The boss
says his team in on schedule.  Who can check up on him to
find out if he's behind schedule?  Nobody in management.
He collects his pay until December 31, 1999, at which time
he turns into Maxwell Smart: "Sorry about that."

     Senior managers desperately want to believe the IT
department, so they don't ask further questions.  They
hope that all their competitors are in the same condition,
which is surely the case.  This is why bond-rating
services have refused to downgrade any organization's
bonds because of Y2K risks.  They're all equally at risk.


     III.  ASSESSING THE ORGANIZATION'S VULNERABILITY

     Here are the Six Fundamental Questions:

     1.   "In what ways is your system is dependent on
          dates?"  (It's is a soft-core version of this:
          "If you fail to fix this, what happens?")
     2.   "When did the company find out about Y2K?"
     3.   "At what stage is the repair: inventory,
          assessment, code-fixing, testing [ha!]?"
     4.   "How many lines of code are in the system?"
     5.   "How many programmers are working on it?"
     6.   "What is your deadline to begin testing?"

     It is a standard estimate that a skilled programmer
with a date-search software tool ("silver bullet") can
correct about 100,000 lines of code a year.  This number
is crucial to your final story.  If you can find out how
many lines of code the organization must correct and the
number of programmers working full-time on the repair, you
can estimate whether there is any chance they will get the
problem fixed.  By this I mean the local computer.  This
does not solve the ultimate problem: integrating a
repaired computer with other computers, which, if not
repaired, or repaired with a different approach, will send
bad data into the first computer, ruining the repair.
(There is no agreed-upon standard for Y2K repairs; every
programming team is on its own, all over the world.)

     Be generous.  Let's say that the programmers are all
hot-shots.  Let's say they can fix on average 10,000 lines
a month.  Multiply this by the number of months left until
the universally agreed-upon date for the beginning of
testing: December 31, 1998.  Then multiply this number by
the number of programmers.  This will tell you if the
outfit has a chance of meeting the deadline for testing.
If the programmers miss the deadline -- and in 85% of all
large-scale code revision projects, they do -- then this
outfit the equivalent of the Titanic.  Do you think that a
program that's at least 500 times more complex than your
word processor can be re-coded by a committee and not
suffer a crash or a major glitch the first time it's run?
They had better test it.  What happens if they don't have
time?  Second, what happens if the test crashes the new
system?  The Jan. 1, 2000 deadline is a brick wall.

     Normally, 40% of a Y2K repair budget must be
allocated for testing.  This means 40% of the time budget
unless proven otherwise.  It may be higher in complex
systems -- above 100 million lines of code.  The spokesman
may tell you the truth about the Y2K discovery date if
he's proud of it: 1995 or early 1996.  Keep thinking
"Social Security."  They found out in 1989, got started on
the repair in 1991, and it's still not compliant.

     "Which stage?"  He may not know at which stage their
repair team is.  If he does know, he may not want to tell
you.  Maybe the programmer in charge will, if he doesn't
think it's privileged information.  So, your goal is to
get the spokesman to turn you over to the senior
programmer -- or, better yet for information purposes, a
subordinate programmer, who probably has no idea of the
sensitivity of the information he possesses.



         IV.  DETOUR: "PACKAGED SOFTWARE SOLUTION"

     I don't count these among the 36 questions.  The
spokesman may tell you that they will soon buy a packaged
system.  If you were conducting this interview in 1992,
this might make sense.  Today, it's too late.  Packaged
systems for highly complex, highly customized software are
very expensive to buy and very time-consuming to
implement.  A packaged system is no panacea today.

     The problem is this: How can they port their old data
and operations to the new, date-compliant software?  This
job takes years.  (Some consultants say that it's now too
late to repair code in the old systems.  I'm of this
opinion.  But is there enough time to design and implement
a replacement system?  Management hasn't a clue.)

     He may tell you that they are switching to a
client/server system.  Ask how much the old system cost.
Unfortunately, he may have no idea.  The new system had
better cost at least five times as much, given the
difference in prices (inflation).  If the new figure isn't
at least five times higher than the old one, the company
doesn't understand the magnitude of the complexity of the
old system and the difficulty of switching.  (On this
point, I was advised by Cory Hamasaki, a full-time Y2K
programmer.  For his voluminous Web postings, as well as
his humor, search "Hamasaki" on www.dejanews.com )

[Side Note: in a July 2, 1997, letter to me, Hamasaki
reported on the U.S. government's present Y2K status.  He
lives near Washington.  "Everywhere I checked last year,
they said that they were either working on it or had
solved the problem.  This year, the same places are saying
that it'll be tough, but they're having meetings and are
doing their planning.  What will they say next year?  I
expect that they will finally be past denial, and the
screaming and scape goating will begin."]

     If he says they plan to outsource the job to India or
Ireland, ask: "Do you have a contract with the software
repair company yet?"  These companies are now booked up or
are close to it.  The shortage of mainframe programmers is
real, though not yet an insurmountable problem.  It will
become insurmountable in 1999.  A WASHINGTON POST story
predicts a U.S. shortage of 500,000 to 700,000.  Another
estimate places England's at 300,000.  (I have posted this
information on my Web site under "Too Late?")

     If the company has "outsourced" the project, request
an interview with the contracting firm's project manager.
If he says no, then you're onto something.  But if you
can't get additional information, the interview will be
much harder.  You will have to interview the person inside
the local outfit who serves as the technical liaison.


           V.  HOW TO GET ACCESS TO A PROGRAMMER

     After you ask the spokesman about the date they
discovered the problem, ask him a technical question that
seems to be important to you, but which is actually
designed to get him to let you get your interview with a
programmer.  I suggest this question:

     7.   "Which method of dealing with the problem
          have you chosen: encapsulation, windowing,
          or expansion?"

     He won't know.  It's a purely technical question.
Nobody with decision-making capacity in management would
know the answer.  So, his ego isn't involved if he says he
doesn't know the answer.  You must now press politely but
firmly him allow you to interview a programmer.

     What if he asks why you want to know?  Answer: "So
that I can estimate how their repair will integrate with
the repairs made by other firms in your industry."

     You do, in fact, need to know this.  This, in fact,
is the crucial Y2K issue.  Any repair of one system that
fails to integrate with the industry's other newly
repaired systems will either: (1) kick the local computer
out of the system or (2) bring down the whole system.  If,
for example, the banks don't get together on their fixes,
you and I will not be getting paid for our brilliant
writing skills in 2000 and beyond.  (Sad, but true.)

     If the spokesman thinks you're interested mainly in
techie-type information, he may leave you alone with a
programmer.  That's your goal.  If he insists on being in
attendance, you must ask questions that seem to be merely
technical, but which will get the programmer to tell you
facts that will enable you to estimate whether the
organization is going to make it.


                VI.  YOU AND THE PROGRAMMER

     The lower on the hierarchy he is, the less he knows
about what constitutes sensitive information.  Even if the
PR flak knows, he may be hesitant to tell the guy to shut
up.  He may not want to appear to be stonewalling.

     The more information you can get early, the less
vulnerable you'll be to a "no further questions"
announcement.  That's why your early questions should be
more technical.  They will seem innocuous.

     Ask the programmer about windowing, expansion, and
encapsulation.  The guy will know.  Ask him why they
adopted their approach.  The answer may or may not be
comprehensible.  Let him talk.  It loosens his tongue.
(OK, OK: loosens HER tongue.  This is no time to worry
about political correctness.)  He's in his element.

     8.   Ask to see some of the code.  It will be
          gobbledegook to you.  But ask to see it.

     9.   Ask the guy to tell you what he has to do to
          change a date.  Sit next to him at his screen
          and watch how he does it.  This will give you an
          education.  Also, it puts him in his element.
          He's more relaxed.  He's in charge.  Meanwhile,
          the spokesman is as clueless as you are.

     If possible, conduct the rest of the interview while
the programmer is staring at his screen.  It will give him
confidence.  Look at his screen or your notebook as much
as you can.  A lot of eye contact may make him nervous.

     You're after information about the number of lines of
code in the system.  Ask him:

     10.  "Would you have adopted either of the other
          approaches if you had been facing a system
          with fewer lines of code?"

     Let him talk code.  He feels more secure.  Then ask:

     11.  "How many lines of code are in the system?"

     If the spokesman doesn't intervene here, you've got a
story.  If it's 5 million lines or more, the outfit is in
big trouble.  It's a huge, complex system.

     Now you want to find out how many programmers are
working on it full-time.  Ask (12).  He might even tell
you.  Next:

     13.  "When did you begin the actual code
          repair?"

     If he says that they're still in the assessment or
inventory stage, this outfit is dead.  Management just
doesn't know it yet.  Any programming team that is not
actively repairing code today will be incapable of
finishing the job by 2000.  You will want to visit my Web
site for confirmation.  Read the California White Paper.

     Once you have the Six Fundamental Questions answered,
you can begin to evaluate the company's actual condition.
The spokesman may not know how to put all this information
together.  In fact, he probably doesn't know.  He may not
even see what you're up to when you ask about which stage
the repair is in.  If he does, he may invoke "proprietary
information."  Keep going: you're now after "no comments."


           VII.  ASSESSING THE TASK'S COMPLEXITY

     14.  "I've heard that there are more languages
          embedded in a system than just COBOL.  How
          many have you come across?

     Some systems will have 20 other languages.  Assembler
is one of the monsters.  Find out if any of the system is
written in Assembler.  (Most of the IRS's system is in
Assembler.  The IRS told Congress in June of 1997 that it
needs $258 million in 1998 to repair its system.  The IRS
may not get this money, given its admission in January,
1997, of its 11-year, $4 billion failure to consolidate
its system into one.  Interesting?)  Then ask:

     15.  "How difficult will it be to keep all of
          the languages and programs in this system
          to remain integrated after you've made the
          necessary date changes in the code?

     One major problem is the compiler: a piece of
software that fits all parts of the system together.  The
compiler that the original programmer used to build the
system was not designed to handle 4-digit dates.  It may
not have been updated -- in fact, probably has not been
updated.  The company that made it may be out of business.
So, if he mentions "compiler," pursue the matter, but
don't mention it first.  Remember, you're ignorant.

     Now go for the jugular.  You must play the "please
help me to understand all this" role.  You just don't
understand.  You had better hope that the flak doesn't
either, if he's still sitting in the room.

     What you're after here is information regarding the
vulnerability of this organization.  Which kind of dates
can blow up the system and why?  He won't tell you if he
thinks you're looking for bombs, but he'll tell a whole
lot if he thinks he's your new-found mentor.

     If you're looking at the screen or a print-out of
indecipherable code, look helpless.  Always look helpless.
You may even ask the spokesman to sit closer.  Let this
become a joint-learning experience.

     16.  "You use dates in your computer software
          and in old data records.  How do you or
          your software tools find them?"

     He probably won't volunteer that there are hidden
dates in the system's programs.  Dates are hidden in
subroutines that his "silver bullet" can't find.  Finding
these is a very difficult, time-consuming task.  Ask:

     17.  "Can the tool you use automatically find
          every date in the code?"

     It can't.  There is no such thing as a true silver
bullet.  This is why the task is so painstaking.

     18.  "How do you spot dates if they're not visible?"

     Find out.  He may tell you about the screwball names,
such as some old girlfriend's first name, that the
original programmer used to identify his clever,
undocumented code.  I emphasize "undocumented."  Ask:

     19.  "Do you have the original documentation in
          front of you when you do the search?"

     If he says the company doesn't have it (which is
probably the case), you've hit pay dirt.  Don't let your
face show it.  Say, "Boy, that must make your work hard."
It does.  Let him whine about it a bit.  Next:

     20.  "I'm having trouble understanding all this.
          Am I interpreting this correctly?  Is the
          problem that all of these dates are stored
          as mm/dd/yy or in any other combination
          that has yy instead of yyyy?"

     This is indeed the problem.  The fate of the world's
economy hinges on the solution to it.  Then ask:

     21.  "If your dates are not already in the yyyy
          format, do you have to go in and add the
          extra 2 digits, line by line, through the
          entire system, including all of the old
          data files?"

     Let him explain this to you.  Then. . . .

     22.  "Is it true that when you rewrite a single
          line of code, this can have unpredictable
          repercussions in other parts of the
          system?"

     Here is the terrifying truth -- a truth that
literally threatens the survival of our economy.  If a
programmer makes a date change in one line of code, this
can have unforeseen repercussions -- always bad --
anywhere else in the system.  This is why final testing is
crucial.  It is also why final testing will crash many
systems.  Then the team will have to start over: search
all of the lines of code for non-date anomalies (no date-
locating silver bullet tool can help here), rewrite the
affected code, and test again.  The system may crash
again.  It probably will crash again.  Time will be
running out.  All this testing, fixing, and re-testing
must be done in 1999.  This assumes that firms actually
meet the formal deadline for testing: December 31, 1998.

     This is why Chase Manhattan Bank (200m lines of
code), Citicorp (400m lines) and AT&T (500m lines) have
problems.  So do you and I if we expect the economy to
stay afloat after Dec. 31, 1999.

     23.  "If one change can crash the system, do you
          have to check every line of code in every
          program to insure that if a date is being
          used, it can accept the new date format?"

     He had better say yes.  If he says his "silver
bullet" tool can help him do this, fine, but he is still
limited to about 100,000 lines of code a year.  Ask him
how many lines of code he can fix in a year (24).

     Now, you must take him into new worlds where no man
has gone before.

     25.  "How will you test the system after all of
          the dates have been changed?

     He had better tell you by parallel testing: running
data into the original program and the revised one
simultaneously, to see if the revised system crashes.

     26.  "How long will it take to test all this?"

     If he estimates anything under six months, use this
for comparison purposes with other local systems.  The
larger the program, the longer the testing period should
be.  Now, for the killer, the one that is unanswerable:

     27.  "Won't parallel [mirror] testing require
          two times your computer capacity and
          staff?"

     If the spokesman lets him answer this, he has made a
big mistake.  The rule for mainframes is "24 x 7 x 365":
all year long.  These expensive machines are run all day
at 90% capacity except for routine maintenance in non-
prime time.  Here is the Achilles Heel for all of the Y2K
repair hopes: there will not be enough excess computer
capacity -- memory, data tapes, and staff -- to run full
parallel testing if every system that must be fixed is
brought to the testing phase.  On the other hand, if there
is no shortage in capacity, then it's because very few
firms have reached the testing phase.  (This is my bet.)
Finally, if systems aren't tested in 1999, most of them
will crash or act up to the point of uselessness in 2000.

     28.  "Does your firm plan to rent computer time
          in order to run the tests?"

     If he says no, ask how they can do in-house.  If he
says yes, ask this question:

     29.  "Where will you rent the excess capacity in
          1999 if other organizations are also
          looking to rent time on mainframes?"

     By now, the guy knows that you know they can't fix
it, test it, and implement it by 2000.  You've got your
story.  Nevertheless, keep on going if you're allowed to.

     30.  "Companies rely on outside vendors for some
          of their programs.  Have your vendors
          supplied you with Y2K-compliant updates?

     31.  "Most mainframes are not Y2K compliant, and
          currently no PC is.  Will you be replacing
          all of your computer hardware as well as
          your computer software?"

     32.  "Some of the firms that you interact may
          not make the deadline.  What steps will you
          have to take to insure data you get from
          other computers is also Y2K compliant?"


                 VIII.  BACK TO MANAGEMENT

     Now you can go talk to the spokesman back in his
office.  If he let you get this far, he doesn't understand
what you've got.  Move away from discussing his firm.
Discuss the industry.  This lets him relax.

     33.  "About how many suppliers does the typical
          organization in this industry rely on?"

     34.  "Is your firm typical, approximately?"

     35.  "Has the industry discussed contingency
          plans if some of its major suppliers should
          fail to meet the Year 2000 deadline?"

     Last question (36): "Where can I get copies of
anything that the industry has released on Y2K?"  If there
isn't anything, this industry is headed for a disaster.


                        CONCLUSION

     As the year 2000 approaches, this story is going to
move toward the front page of every newspaper.  As yet,
stories on local companies have been mostly tapioca
pudding.  Reporters are accepting at face value the happy-
face, "we're on top of this" PR interviews offered by
local managers.  The articles dutifully report the story:
"Yes, there's a problem, but it's being dealt with by the
[  ] company."  Fact: the only problem being dealt with
successfully the company is the reporter problem.

     If a local public utility goes down and stays down on
January 1, 2000, the days of wine and roses will end in
your community.  The larger your community, the greater
the problem.  It is fair to give people a warning if they
are really at risk.  But if they are at risk, nobody in
authority at the local public utility will want to admit
this.  Deferral has become management's job number-one.
This strategy works because nobody in the media blows the
whistle.  Reporters (as with almost everyone else) are in
denial about Y2K.  Deferral and denial are the Tweedledum
and Tweddledee of the Year 2000 story.

* * * * * * * * * * * *

                     ABOUT THE AUTHOR

     Ph.D., history, U. of California, Riverside.
Contributor,  (1997), edited by Leon
Kappelman.  





**********************************************
To subscribe or unsubscribe, email:
     majordomo at majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email at address
**********************************************
www.telepath.com/believer
**********************************************





From vznuri at netcom.com  Thu Sep 10 12:36:03 1998
From: vznuri at netcom.com (Vladimir Z. Nuri)
Date: Fri, 11 Sep 1998 03:36:03 +0800
Subject: IP: Web-sites for Starr's report on Clinton
Message-ID: <199809110836.BAA11041@netcom13.netcom.com>




From: Jan 
Subject: IP: Web-sites for Starr's report on Clinton
Date: Thu, 10 Sep 1998 22:14:32 -0500
To: Ignition-Point 

	IMPORTANT NOTICE!!!!!

FOX News just announced the web-sites which will have 
Starr's report on Clinton to be posted sometime tomorrow.

I hope I have these all correct!   :0
   Jan
=============================
http://www.house.gov/icreport
http://www.loc.gov/icreport
http://www.access.gpo.gov/congress/icreport
 ******=========================================*****
"Among the elementary measures the American Soviet government
 will adopt to further the cultural revolution are...
 [a] National Department of Education...the studies will be
 revolutionized, being cleansed of religious, patriotic, and
 other features of the bourgeois ideology. The students will
 be taught the basis of Marxian dialectical materialism,
 internationalism and the general ethics of the
 new Socialist society."
     - William Z. Foster,
       Toward Soviet America, 1932

"...Stage III...would proceed to a point where no state would
have the military power to challenge the progressively 
strengthened U.N. peace force...
The manufacture of armaments would be prohibited...
All other armaments would be destroyed..." 
    -Department of State publication number 7277




**********************************************
To subscribe or unsubscribe, email:
     majordomo at majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email at address
**********************************************
www.telepath.com/believer
**********************************************





From mok-kong.shen at stud.uni-muenchen.de  Thu Sep 10 15:04:52 1998
From: mok-kong.shen at stud.uni-muenchen.de (Mok-Kong Shen)
Date: Fri, 11 Sep 1998 06:04:52 +0800
Subject: radio net (fwd)
In-Reply-To: <33CCFE438B9DD01192E800A024C84A19284623@mossbay.chaffeyhomes.com>
Message-ID: <35F903D8.3E787140@stud.uni-muenchen.de>



Bill Stewart wrote:
> 
> Not per se, though there _is_ still one major restriction -
> the Defense Department gets a crack at patent applications,
> so if you try to patent a crypto algorithm or crypto phone,
> they can seize and classify your patent application and
> working materials, using the excuse of "national security".
> There was a case in the late 70s where somebody tried to patent
> a wimpy analog scrambler for CB radios, and got it seized,
> and a number of patent applications that got delayed a long time.

It seems then to be advisable to apply for international patents
simultaneously. One can e.g. apply for a European patent that is 
valid for a number of countries.

M. K. Shen





From sorens at workmail.com  Thu Sep 10 15:18:59 1998
From: sorens at workmail.com (Soren)
Date: Fri, 11 Sep 1998 06:18:59 +0800
Subject: radio net
In-Reply-To: <3.0.5.32.19980909005149.0081d100@mail.xroads.com>
Message-ID: <35F90842.3D783D77@workmail.com>



HyperReal-Anon wrote:

> >>>>> Soren   writes:
>
>   > What about SSB?
>
>   >> FCC regulations prohibit amateur radio services from carrying
>   >> either encrypted OR commercial traffic.
>
> SSB modulation hardly counts as encryption. (?!)
> CFR 47  says:
>
> 97.113 Prohibited transmissions.
>
> (a) No amateur station shall transmit:
>
>   (1) Communications specifically prohibited elsewhere in this part;
>
>   (2) Communications for hire or for material compensation...
>
>   (3) Communications in which the station licensee or control operator
>   has a pecuniary interest...
>
>   (4) Music using a phone emission except as specifically provided
>   elsewhere in this section; communications intended to facilitate a
>   criminal act; messages in codes or ciphers intended to obscure the
>   meaning thereof, except as otherwise provided herein; obscene or
>   indecent words or language; or false or deceptive messages, signals
>   or identification;
>
>   (5) Communications...which could reasonably be furnished
>   alternatively through other radio services.
>
> [snip]
>
> 97.117 International communications.
>
> Transmissions to a different country, where permitted, shall be made
> in plain language and shall be limited to messages of a technical
> nature relating to tests, and, to remarks of a personal character for
> which, by reason of their unimportance, recourse to the public
> telecommunications service is not justified.

  The point being that Single side band transceivers are covered by a VHF
license, and don't count as ham/amateur although the spectrum overlaps.
Morse and other archaic codes are not required. Connectivity to telephonic
land stations is available.
In the mid-80's I purchased a yacht and sailed out over the horizon.  In
the preparation stages for this I investigated the comms availability and
ran head on into the old boys/popular mechanics of the '50's crowd, that
insisted I endure their hazing ceremony and learn Morse.  Suspecting that
adding morse parsing to the deep structures of my brain would turn me into
a popular mechanic, I declined. Other alternatives existed -- one SW
solution was to type in ascii which was then translated into morse before
sending (and vice versa).  Seems several other would be Cap'n Blighs, had
the same problem.  Hence marine electronic stores started stocking SSB
transceivers, which I purchased in the form of a ham transceiver with
factory installed disabling for the US. I disabled that strap pronto, and
was able to enjoy both listening to the cruising ham tag hunters, and make
telephone calls from 5000 miles out in the Pacific (12,000 when calling
Bay of Islands net in New Zealand). I had no problem using it to discuss
work and to ship data.  Whether I was breaking the Federal Communist
Channels rules or not, I can't say.  Of course, not being a United
Socialists citizen makes this easier.  Where I come from you get the
license/call numbers when you purchase the equipment.

And while I've got your attention, on another thread entirely re:
renewable energy sources -- where I come from we use geothermal and
hydroelectric (think hoover dam), to power the country. A lot of
individuals who have steady flowing water with a good head, on their
properties, also power themselves this way.  We also use LPG and CNG to
power about 50% of our autos. I would expect that using all that
relatively cheap electricity to produce metal hydrides would make hydrogen
powered vehicles viable as well.

The Union of Socialist Americans tends to not have much in the way of
raging rivers, so there have been discussions about harnessing the moon's
energy by building tidal hydro generators.  Last I heard, the
environmentalists thought it might hurt the fishies (more than fishing for
agricultural fertilizer?), so nuclear it is.  I suspect there's more to it
than that, nuclear probably has more dick-stroking factor.







From sorens at workmail.com  Thu Sep 10 15:31:03 1998
From: sorens at workmail.com (Soren)
Date: Fri, 11 Sep 1998 06:31:03 +0800
Subject: Bits are Bits
In-Reply-To: 
Message-ID: <35F90ADF.ED16F55B@workmail.com>





Tim May wrote:

> * Recorded music: OK to resell. OK to lend to private parties for
> noncommercial use. NOT OK to rent.

I've been to several public libraries which charge to borrow (rent?) music:
CDs, vinyl, tape, sheet.

How do they do that?  Is public the magic word?





From sorens at workmail.com  Thu Sep 10 15:44:38 1998
From: sorens at workmail.com (Soren)
Date: Fri, 11 Sep 1998 06:44:38 +0800
Subject: [Fwd: Course Ware Developer]
Message-ID: <35F90E95.BFF2B30A@workmail.com>

I'm busy,  anyone else want to make money educating people in London?


To: sorens at workmail.com
Subject: Course Ware Developer
From: Morven McLauchlan 
Date: Fri, 11 Sep 98 11:30:52 GMT
Reply-To: mm at elanguil.demon.co.uk

Dear Soren,
>
We are currently looking for a Course Ware Developer to produce all
documentation and slides etc for a data security course. This contract
position will involve 50 days of development split between 2 people. If
the presentation to the client is successful the successful candidates may
be required to conduct the actual training. They are looking to get someone
started as soon as possible and can interview very early next week.
>
The successful candidate will have  a proven track record of
his/her abilities and will need a very strong understanding of hardware /
software encryption. The training will be aimed at security and will be
formed around security standards already in place. A knowledge of NT, Unix
and Firewall would therefore be advantageous.
>
if you would be interested in hearing further details on this position,
please contact me on 01483 883315 or via E mail. Due to the deadline this
company are working to a speedy response is required. Don't forget you can
AIR MILES rewards by referring a friend or colleague to Elan.
>
I hope to hear from you shortly.
>

Morven McLauchlan
Elan Computing 01483 883308
Visit Elan's relaunched web site WWW.Elan.co.uk   

  

Morven McLauchlan
Elan Computing 01483 883308
Visit Elan's relaunched web site WWW.Elan.co.uk   

 





From rah at shipwright.com  Thu Sep 10 15:47:38 1998
From: rah at shipwright.com (Robert Hettinga)
Date: Fri, 11 Sep 1998 06:47:38 +0800
Subject: radio net
In-Reply-To: 
Message-ID: 



At 6:21 AM -0400 on 9/11/98, Somebody wrote:


> Actually, SSB is a modulation/broadcast *technique*.  Used by commercial
> and ham operators.

Yeah, but there are SSB radios, with the same range as ham radios, which
are, or should be, completely legal to do encryption on, among other
commercial things.

That was my point.
-----------------
Robert A. Hettinga 
Philodox Financial Technology Evangelism 
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'





From sorens at workmail.com  Thu Sep 10 15:52:24 1998
From: sorens at workmail.com (Soren)
Date: Fri, 11 Sep 1998 06:52:24 +0800
Subject: Replay
Message-ID: <35F91060.1DA7BFC3@workmail.com>



Why isn't remailer at replay.com posting to cypherpunks?  I've sent several
and none have shown up -- rants up in smoke.





From sorens at homemail.com  Thu Sep 10 16:05:54 1998
From: sorens at homemail.com (Søren)
Date: Fri, 11 Sep 1998 07:05:54 +0800
Subject: [Fwd: LFB Book News: EAT THE RICH]
Message-ID: <35F912F2.2C7536E@homemail.com>

This may be preaching to the choir,� but for anyone who doesn't know
about http://www.laissezfaire.org ...

To: booknews at laissezfaire.org
Subject: LFB Book News: EAT THE RICH
From: Russell Hanneken 
Date: Thu, 10 Sep 1998 17:31:38 -0700

=================================================================
Laissez Faire Books  -  Book News  -  September 10, 1998
Please forward this message to anyone who might be interested.
=================================================================

First 350 with autographed bookplates!

A grand slam from P. J. O'Rourke, the best political humorist
since H. L. Mencken

			  EAT THE RICH
			by P. J. O'Rourke
		 (Atlantic Monthly Press, 1998)

		    HU7872 (hardcover) 246p.
		    Publisher's price: $24.00
		    Our price normally $16.95
	  SPECIAL SALE PRICE, LIMITED TIME ONLY: $14.41

(reviewed by Jim Powell)

Everything P. J. O'Rourke writes makes you smile, but I'd rate
EAT THE RICH as his best book, better even than his super-seller
PARLIAMENT OF WHORES.  The political content is very high, and
the book is loaded with great lines.  Open to a page, any page,
and you'll soon find something wonderful--not just wit, but
passion as well.

O'Rourke offers uproarious commentary about fashionable
politicians, intellectuals and dogmas in Albania, Sweden, Cuba,
Russia, Tanzania and Shanghai as well as the United States.  
A sampler:

    "I had one fundamental question about economics: Why are some
    places prosperous and thriving while others just suck?  It's
    not a matter of brains.  No part of the earth (with the
    possible exception of Brentwood) is dumber than Beverly
    Hills, and the residents are wading in gravy.  Meanwhile in
    Russia, where chess is a spectator sport, they're boiling
    stones for soup."

    "Microeconomics concerns things that economists are
    specifically wrong about, while macroeconomics concerns
    things economists are wrong about generally.  Or, to be more
    technical, microeconomics is about money you don't have, and
    macroeconomics is about money the government is out of."

    "Government does not cause affluence.  Citizens of
    totalitarian countries have plenty of government and nothing
    of anything else."

    "And technology provides no guarantee of creature comforts.
    The most wretched locales in the world are well-supplied with
    complex and up-to-date technology--in the form of weapons."

    "Nationalization does to goods and services what divorce does
    to male parents--suddenly they're absent most of the time and
    useless the rest."

    "Altruism towards strangers is mostly a sentimental and
    fleeting thing, a small check dashed off to Save the
    Children.  Twenty billion dollars worth of it is rare.  In
    the Cold War days, of course, we were giving money to
    Tanzania on the theory of: 'Pay them to be socialist so they
    won't be communist and figure out what the difference is
    later.'  But now, I'm afraid, the ugly truth is that we care
    about Tanzanians because they have cool animals."

    "The Russian stuff is no good.  Even the smallest, simplest
    items stink.  The way you use a Russian match is: After you
    strike it, you put it back in the matchbox.  It's as likely
    to work as any of the other matches in there.  In the old
    days the soda pop tasted like soap, the soap lathered like
    toilet paper, the toilet paper could be used to sand
    furniture, the furniture was as comfortable as a pile of
    canned goods, the canned goods had the flavor of a
    Solzhenitsyn novel, and a Solzhenitsyn novel got you arrested
    if you owned one."

    "How a peaceful, uncrowded place with ample wherewithal stays
    poor is hard to explain.  How a conflict-ridden, grossly
    over-populated place with no resources whatsoever gets rich
    is simple.  The British colonial government turned Hong Kong
    into an economic miracle by doing nothing."

    "So if wealth is not a world-wide round-robin of purse
    snatching, and if the thing that makes you rich doesn't make
    me poor, why should we care about fairness at all?  We
    shouldn't."

    "If we want the whole world to be rich, we need to start
    loving wealth.  In the difference between poverty and plenty,
    the problem is the poverty and not the difference.  Wealth is
    good."

As these delightful selections suggest, nobody today has a more
gifted pen than P. J. O'Rourke.  You'll love this book.

=================================================================

EAT THE RICH
HU7872 (hardcover) 246p.
Publisher's price: $24.00
Our price normally $16.95
SPECIAL SALE PRICE, LIMITED TIME ONLY: $14.41

=================================================================

How to order from Laissez Faire Books:

SALES TAX: 

If we are shipping your order to California, you must pay sales
tax.  To learn the applicable tax rate, contact us, or point your
web browser to .

SHIPPING & HANDLING:

For destinations in the US:

  STANDARD SHIPPING (1-3 weeks):

       Merchandise total     Standard shipping price
       $ 0.00 - $24.99                $3.50
       $25.00 - $49.99                $4.50
       $50.00 - $74.99                $5.50
       $75.00 - $99.99                $6.50
       $100 and over                  FREE!

  3-DAY SHIPPING (3 business days, no PO boxes): $9 for the first
  item ($19 if destination is Alaska or Hawaii) plus $2.50 for
  each additional item.

For destinations outside the US:

  SURFACE MAIL (2-8 weeks): $4.50 for the rist item plus $1.50
  for each additional item.

Contact us for other shipping options.

PAYMENT: 

All orders must be prepaid.  Checks or money orders should be
drawn on a US bank and made payable to Laissez Faire Books.  If
paying by credit card, please include both the card number and
the expiration date.  We accept Visa, Mastercard, and Discover.

If you have placed a credit card order before, we can process
your order using the information we have on file (provided it is
up to date).  Please include your name and zip code (or postal
code) so we can find your record.

Members of the Laissez Faire Book Club can pay with funds drawn
from their account.  For more information about the Book Club,
contact us, or point your web browser to
.

SUBMITTING YOUR ORDER:

BY EMAIL: Address email orders to .
PGP-encrypted mail is accepted.  For our public key, email
, or point your web browser to
.

BY MAIL: Write to Laissez Faire Books, Dept L50, 938 Howard St., 
Ste. 202, San Francisco, CA 94103-4114, USA.

BY PHONE: Call toll free 1-800-326-0996 (US and Canada) or dial 
(415) 541-9780.  Customer service representatives are available 
between 9am and 6pm PACIFIC TIME.

BY FAX: Fax us at (415) 541-0597.

If you'd like to receive our free monthly booklist, please email 
your postal address to .

If you'd like to receive weekly Book News announcements via
email, or if you have any other questions or comments, please
contact Russell at .

-----------------------------------------------------------------
Russell Hanneken                              Laissez Faire Books
russell at laissezfaire.org                 http://laissezfaire.org/




-------------- next part --------------
A non-text attachment was scrubbed...
Name: bin00003.bin
Type: application/octet-stream
Size: 3031 bytes
Desc: "S/MIME Cryptographic Signature"
URL: 

From ravage at einstein.ssz.com  Thu Sep 10 16:22:55 1998
From: ravage at einstein.ssz.com (Jim Choate)
Date: Fri, 11 Sep 1998 07:22:55 +0800
Subject: Bits are Bits (fwd)
Message-ID: <199809111245.HAA10643@einstein.ssz.com>



Forwarded message:

> Date: Fri, 11 Sep 1998 00:47:03 -0700
> From: Tim May 
> Subject: Bits are Bits

> -- rental of software is no longer allowed (court case?)...it seems to have
> ended around 1984 or so, when the software rental place near me announced
> it could no longer rent software titles

Then I won't tell you folks about Star-Tek which rents and sells software
all around the country...

As to the other stuff...

If you really think it's ok to lend your budy your CD to listen to the
newest bands out there you should call your local musicians union.

As to books and such, call a book publisher and ask for their legal
department.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage at ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------





From sorens at workmail.com  Thu Sep 10 17:02:51 1998
From: sorens at workmail.com (Soren)
Date: Fri, 11 Sep 1998 08:02:51 +0800
Subject: Freebies
Message-ID: <35F92098.F414B51E@workmail.com>

While I'm at it, here are some other entertaining and educational sites:

�Protocols
(this one is for all you conspiracy junkies)

�Revoking your SSN -or- the
proper use of form 1040

�...
and how it works in practise (usavlong)

�Want to put your money where
your mouth is?

�World's smallest political
quiz

�... and lets not
leave the whigs out of this ...

�Raisson d'etre



From ptrei at securitydynamics.com  Thu Sep 10 17:42:42 1998
From: ptrei at securitydynamics.com (Trei, Peter)
Date: Fri, 11 Sep 1998 08:42:42 +0800
Subject: [off topic] ANNOUNCE: Bay Area Cypherpunks, Sat. Sept. 12, 12-6, KPMG Mountain View
Message-ID: 




	Bill wrote:
	> KPMG is a relatively-unmarked building at the corner of
	> Middlefield Rd. and Ellis St. in Mountain View, surrounded by
Netscape.
	 
	Reading this, I flashed on an alternate meaning for 
	a second --

	'Surrounded by netscape'... netscaping, the cyberspace
	equivalent of landscaping...

	Just an odd image.


	Peter Trei





From CTIA_Daily_News at um2.unitymail.com  Fri Sep 11 09:03:06 1998
From: CTIA_Daily_News at um2.unitymail.com (CTIA Daily News)
Date: Fri, 11 Sep 1998 09:03:06 -0700 (PDT)
Subject: CTIA Daily News from WOW-COM - September 11, 1998
Message-ID: <199809111559.KAA08514@mailstrom.revnet.com>



==========================================
Welcome to today's edition of the CTIA Daily News
from WOW-COM.  Please click on the icon / attachment
for the most important news in wireless communications today.

The future of your company will be announced
October 12 @ Wireless I.T.  Will you be there?

CLICK HERE NOW TO SIGN UP AND SAVE
http://www.wirelessit.com/portal.htm

Team WOW-COM
wowcom at ctia.org
===========================================
-------------- next part --------------
A non-text attachment was scrubbed...
Name: bin00015.bin
Type: application/octet-stream
Size: 8183 bytes
Desc: "_CTIA_Daily_News_19980911a.htm"
URL: 

From rdl at MIT.EDU  Thu Sep 10 18:04:17 1998
From: rdl at MIT.EDU (Ryan Lackey)
Date: Fri, 11 Sep 1998 09:04:17 +0800
Subject: cypherpunks archive
Message-ID: 



(Looks like I left at about the right time...)

I'm definitely planning to bring the archive back now that it seems
worthwhile, but I'm highly tempted to move it outside the US.  I'm
giving somone a few more days trying to fix it, and if that fails,
I'll restore the drive physically.  (the problem is that my agent in
the US is being slow, and I'm a bit low on cash after moving hastily...)

Anyone have 1gb of disk space on a machine, optionally with root access,
on a machine with unmetered network access outside the US on which I
could put the archive?

I can put the archive here in AI, but I'll have to charge per megabyte,
as my t1 is metered-use :(  It would end up being something on the order of
$0.50/MB for total traffic, and unfortunately there are no good payment
systems for that kind of thing right now.
-- 
Ryan Lackey
rdl at mit.edu
http://sof.mit.edu/rdl/   <-- brought down by a flakey hd controller or drive





From nokia at mail.kmsp.com  Fri Sep 11 09:15:30 1998
From: nokia at mail.kmsp.com (nokia at mail.kmsp.com)
Date: Fri, 11 Sep 1998 09:15:30 -0700 (PDT)
Subject: Eliminate your present phone bill......
Message-ID: <199809092110.CAA24580@shakti.ncst.ernet.in>


A FREE Nokia 6160 digital PCS phone that covers the 50 United States 
including Alaska and Hawaii and 600 FREE minutes of airtime utilizing
the AT&T wireless network with No roaming or Long Distance charges!
Eliminate your current phone bill forever as you continue to receive free airtime.

Nokia 6160 digital PCS phone sent
via Federal Express direct from AT&T.

Listen to our 3 Minute recorded Presentation regarding this Free Nokia Phone
offer at 1-888-834-5017 or 1-888-248-6031
Pull up the Fax-on-Demand at 1-716-720-2299

Not only can you get a FREE Nokia 6160 phone, you can receive residual income that allows the sky to be the limit as
far as your future income is concerned.
Need more information: 
listen to our 24hr recorded conference call at 1-212-796-6870

To get started after listening to the 3 minute message, you will need the following information:
Sponsor ID:  22-1569104
Sponsor Phone: 1-800-636-6773 ext 4533
Let me know if you decide to join so I can help you receive your FREE phone by next week.






From stuffed at stuffed.net  Fri Sep 11 09:35:23 1998
From: stuffed at stuffed.net (STUFFED NEWS DAILY)
Date: Fri, 11 Sep 1998 09:35:23 -0700 (PDT)
Subject: NEW MEGA FAST INTERFACE + 30 ULTRA HOT JPEGS AT LIGHTNING DOWNLOAD SPEED
Message-ID: <19980911071000.26675.qmail@eureka.abc-web.com>


In today's super-fast, totally revamped Stuffed
you'll find there's much more than ever before!

   IN TODAY'S ISSUE: X-RATED BASEBALL; ARMPIT
   ASS ATTRACTER; 10 BEST AND WORST THINGS A
     GUY CAN DO AFTER SEX; THE PERFECT BABE;
    THE PERFECT DUDE; BEST OF EUREKA; OCEAN
     LOVE POTION; CALIFORNIA COCK-TASTING
      PARTY; PUBLIC STRIPPING; ORGASM DRUG
                  DISCOVERED

       ---->   http://stuffed.net/98/9/11/   <----

Welcome to  today's  issue of Stuffed. To read it you should
click on the URL above.  If it is not made clickable by your
email program  you will need to  use your mouse to highlight
the URL,  copy it and then paste it into your browser  (then
press Return).

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!

       ---->   http://stuffed.net/98/9/11/   <----





From petro at playboy.com  Thu Sep 10 18:44:33 1998
From: petro at playboy.com (Petro)
Date: Fri, 11 Sep 1998 09:44:33 +0800
Subject: Happy Fourth
In-Reply-To: 
Message-ID: 



At 6:11 PM -0500 9/10/98, Michael Motyka wrote:
>I'm -almost- ready to admit defeat and move on.
>
>> Did you see the part where I mention that I am (a) an ex-marine,
>IMHO Marines burn just like the rest of us wimps. They just don't scream
>as much.

	Yeah, but the part you cut was about being afraid of fire. I am
not, I respect it, but it doesn't frighten me.

>> You ever seen 3000 gallons of jet fuel burn,
>AOED the biggest fire I've seen was the fire here in CA last month. 6-8
>Million tires. Nobody had the balls to put that one out. At peak 1000X
>your jet fuel deal. Scary. Very.

	Yeah, but the 3000 gals. of waste fuel was deliberate, for training.

	Burning tires really suck. Almost impossible to get water, or any
coolant down into where the fire is burning, and the heating of the rubber
gives of some really noxious fumes.

>> 5 gals. of burning gasoline is NOT a problem.
>ISASI ( it sure as shit is ) if you're wearing it on your back.
>> 5 Gals. cooking off in a sealed container IS a problem.
>FYI 5 ounces mixed with compressed air in a metal container could easily
>be fatal.

	If you read my original post again, I talk about this very problem.

>> Fuck you.
>Yes, yes, PTMYT ( pleased to meet you too ).

	You suggested that I belong on AOL. I say again, Fuck You.

>Remember, shit draws flies. There'll just be more geniuses asking how to

	This is cypherpunks, we talk about what we want. Ask Tim.

>make noncryptographic devices. I would enjoy some crypto-tech talk.

	Ok, how about using fires as a source of entropy?

>Found any cool primitive polynomials lately? Got a good block cipher
>with a 4096 bit block size and an even bigger key space? Got some time
>to donate to actually put together some good HW/SW systems?

	Nope, not right now.

petro at playboy.com----for work related issues. I don't speak for Playboy.
petro at bounty.org-----for everthing else.      They wouldn't like that.
                                              They REALLY
Economic speech IS political speech.          wouldn't like that.






From ptrei at securitydynamics.com  Thu Sep 10 18:50:59 1998
From: ptrei at securitydynamics.com (Trei, Peter)
Date: Fri, 11 Sep 1998 09:50:59 +0800
Subject: A Cypherpunk Trial, Yes
Message-ID: 




	Graham-John Bullers [SMTP:real at EDMC.net] wrote:

	>As i'am one of persons mention in Toto's posts I
	>would just like to say I think the posts were a
	>joke.  With the help of of Vullis I was a pain to
	>the list and this was Toto's way of acknowledging
	>this To the government readers of this list,the
	>cigar was Cuban,will you put Bill in the cell with
	>Toto.

	I, too, was suprised to find myself mentioned in
	one of the postings John Young has highlighted.  I
	hadn't noticed this before, since Toto's rants
	were among the 50%+ of cpunks postings I marked as
	read without actually reading them.

	The Poster Currently Known As Toto mentioned an
	awful lot of people by name, purportedly engaged
	in all kinds of nefarious activities.  The same
	post also names Tim May, Adam Back, Declan
	McCullagh, Ulf Moller, Kent Crispen, and Blanc
	Weber. I'm let off easy, being characterized 
	as only a 'terroist [sic] InterNet forger'. 
	I think that this is because I once complained 
	when someone (possibly Toto) forged a message 
	in my name. To put it in the plainest possible
	terms: I have never in my life forged a message.

	Peter Trei





From sbryan at vendorsystems.com  Thu Sep 10 18:52:37 1998
From: sbryan at vendorsystems.com (Steve Bryan)
Date: Fri, 11 Sep 1998 09:52:37 +0800
Subject: Bits are Bits
In-Reply-To: <33CCFE438B9DD01192E800A024C84A1928463C@mossbay.chaffeyhomes.com>
Message-ID: 



>* Software: OK to resell if license allows it, if original is destroyed, if
>no copies are kept, blah blah blah. (Very complicated.) Not legal to rent
>software since around the mid-80s, when software rental stores stopped.
...
>-- rental of videos is allowed. (Why videos but not CDs? What about books
>on tape? What about books on CD, either audio or CD-ROM?)

Another weird twist in this topic is the "distinction" that is made between
video games for consoles and the same games for computers. It is legal to
rent a PSX title such as Tomb Raider but the same title ported to the PC is
not legal to rent. I read about this a few years ago in an article by Trip
Hawkins, CEO of 3DO, so maybe this information is out of date. But I have
not yet seen CD-ROMs for rent or even available to check out for home use
from the public library. I think this distinction is sometimes confused
because a publisher can choose to allow a CD-ROM title to be rentable but
has to explicitly sanction that. But a publisher of game console CD's
cannot prevent its products from being rented.

Steve Bryan
Vendorsystems International
email: sbryan at vendorsystems.com
icq: 5263678
pgp fingerprint: D758 183C 8B79 B28E 6D4C  2653 E476 82E6 DA7C 9AC5






From declan at well.com  Thu Sep 10 19:16:31 1998
From: declan at well.com (Declan McCullagh)
Date: Fri, 11 Sep 1998 10:16:31 +0800
Subject: U.S. House only has a T-1
Message-ID: 




          http://cgi.pathfinder.com/netly/0,2326,201980911-14598,00.html







From ravage at einstein.ssz.com  Thu Sep 10 19:19:26 1998
From: ravage at einstein.ssz.com (Jim Choate)
Date: Fri, 11 Sep 1998 10:19:26 +0800
Subject: Rental of PC software...
Message-ID: <199809111540.KAA11397@einstein.ssz.com>



Hi,

For those of you who believe it is completely illegal to rent PC software
should contact:

Star Techs
9222 Burnet Rd.
Austin, Tx.
512-719-4263

(sorry for the earlier mis-spelling of the name)

I'll also forward a reference regarding loaning copyrighted material and
who owns the rights to decide whether it is allowed or not.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage at ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------





From whgiii at invweb.net  Thu Sep 10 19:20:20 1998
From: whgiii at invweb.net (William H. Geiger III)
Date: Fri, 11 Sep 1998 10:20:20 +0800
Subject: Replay
In-Reply-To: <35F91060.1DA7BFC3@workmail.com>
Message-ID: <199809111520.LAA13955@domains.invweb.net>



-----BEGIN PGP SIGNED MESSAGE-----

In <35F91060.1DA7BFC3 at workmail.com>, on 09/11/98 
   at 07:58 AM, Soren  said:


>Why isn't remailer at replay.com posting to cypherpunks?  I've sent several
>and none have shown up -- rants up in smoke.

So your this anonymous fellow we have been looking for. :)

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://www.openpgp.net
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html
- ---------------------------------------------------------------
 
Tag-O-Matic: OS/2: Your brain.  Windows: Your brain on drugs.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNflBmo9Co1n+aLhhAQEF+wP/d/2AmHCcgSjugQPRbQ10VFAT9QRriW2t
0vso7OhXTjOrdFMwRBj8NgDhiH9rpv8sz/9yXaSY1OOizhxBalcKdMXEC9TPVY7X
AutqpnVJvhAglBaLZUhAmeeCrUG4HCaBKhAgjc7qqidbYo+IVf20vqBSiYx+SihH
fDwfWkz13FU=
=+wnK
-----END PGP SIGNATURE-----





From qacado1 at dallas.net  Fri Sep 11 10:37:32 1998
From: qacado1 at dallas.net (amz4 ent., inc.)
Date: Fri, 11 Sep 1998 10:37:32 -0700 (PDT)
Subject: <>
Message-ID: <199809112222GAA55723@abc.npn.net>




PROFESSIONAL CONSULTANTS



Our corporation, through a network of professional
consultants, markets a radical cutting edge  "DATA BASE"
tool to corporations throughout North America that 
in turn, assisted these companies increase their sales
from 10 to 100 percent.

We are seeking a few select key individuals in specific 
geographic areas who will, in association with 
ourselves, offer our program to local companies.

A six figure income is possible in the first year, with
strong residual income in the future years.

There is an $8,250 investment.

To receive a complete package of printed information
by regular mail,  please call  our voice mail system
at:(214)984-3099 and leave your name and address.


Thank you for your time.

  
  
1-1998





From whgiii at invweb.net  Thu Sep 10 19:42:18 1998
From: whgiii at invweb.net (William H. Geiger III)
Date: Fri, 11 Sep 1998 10:42:18 +0800
Subject: Rental of PC software...
In-Reply-To: <199809111540.KAA11397@einstein.ssz.com>
Message-ID: <199809111542.LAA14230@domains.invweb.net>



-----BEGIN PGP SIGNED MESSAGE-----

In <199809111540.KAA11397 at einstein.ssz.com>, on 09/11/98 
   at 10:40 AM, Jim Choate  said:

>For those of you who believe it is completely illegal to rent PC software
>should contact:

>Star Techs
>9222 Burnet Rd.
>Austin, Tx.
>512-719-4263

>(sorry for the earlier mis-spelling of the name)

>I'll also forward a reference regarding loaning copyrighted material and
>who owns the rights to decide whether it is allowed or not.

We used to have a store here called AtoZ Software that opened up a couple
of years back. They were srtictly a software rental store and were doing
*very* good business from it. They ran into quite a bit of trouble (SPA et
al) over it. I didn't follow it too close but I don't think that they rent
software any more. :(

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://www.openpgp.net
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html
- ---------------------------------------------------------------
 
Tag-O-Matic: It's OS/2, Jim, but not OS/2 as we know it.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNflG0I9Co1n+aLhhAQGjVAQAhd8hUnctdsZ4jzxG3V8FYKw6xAplYqik
shu6lqVV9JWAhnEb3FisgI1GX2qx640eH6+lRqqn1kFA6TZhKBixyO1ECl4e8lhT
leCMjDLr2BXAUOEfobl7/1l5rB4JC0SXDbMJu5Uq+eP1GGcdaWETUr5baxXpyUz0
A7kyFJ+OD8g=
=5CPM
-----END PGP SIGNATURE-----





From ravage at einstein.ssz.com  Thu Sep 10 19:51:08 1998
From: ravage at einstein.ssz.com (Jim Choate)
Date: Fri, 11 Sep 1998 10:51:08 +0800
Subject: Copyright - Who has the right to loan?
Message-ID: <199809111613.LAA11683@einstein.ssz.com>







From guy at panix.com  Thu Sep 10 19:51:21 1998
From: guy at panix.com (Information Security)
Date: Fri, 11 Sep 1998 10:51:21 +0800
Subject: A Cypherpunk Trial, Yes
Message-ID: <199809111551.LAA25938@panix7.panix.com>



   >   	Graham-John Bullers [SMTP:real at EDMC.net] wrote:
   >
   >   	>As i'am one of persons mention in Toto's posts I
   >   	>would just like to say I think the posts were a
   >   	>joke.  With the help of of Vullis I was a pain to
   >   	>the list and this was Toto's way of acknowledging
   >   	>this.
   >
   >    > To the government readers of this list...

Ah, yes, the good old days when Vulis was here.
---guy



*  Re: State Charges in Weaver Case
*
*  Dr.Dimitri Vulis KOTM (dlv at bwalk.dm.com)
*  Fri, 22 Aug 97 02:09:13 EDT
*
*  Mike Duvos  writes:
*  >
*  > Shouldn't it be ... involuntary
*  > manslaughter for using possibly excessive force against an armed
*  > attacker?
*
*  No, it should be a $100 reward for icing a motherfucking fed.
*
*  ---
*
*  Dr.Dimitri Vulis KOTM
*  Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps


...and elsewhere in Usenet...

...soliciting funds for terrorist groups to kill a jewish couple:
 
#   Subject:      The final solution for the premature ejaculation problem
#   From:         shlomo at bwalk.dm.com (Rabbi Shlomo Ruthenberg)
#   Date:         1996/06/05
#   Organization: Young Israel of Red Hook
#   Newsgroups:   soc.culture.israel,soc.culture.jewish,alt.religion.islam,
#             alt.politics.white-Power,alt.2600,alt.revenge,alt.revisionism
#
#
#      As a religious Jew, I am shocked that none of: Hamas / Hizballah /
#      Party of God / Revolutionary Justice Organization / Organization
#      for the Oppressed on Earth / Islamic Jihad for the Liberation of
#      Palestine / Popular Democratic Front for the Liberation of Palestine
#      / Ansar Allah / Palestine Liberation Front / Followers of the
#      Prophet Muhammad / Revolutionary Organization of Socialist Muslims
#      / Fatah Revolutionary Council / Arab Revolutionary Brigades /
#      Islamic Resistance Movement / Vanguards of Conquest (whew!) have
#      gotten around porking the Jewish Fascist Yoni Kamens or his zonah
#      wife. You can help by mailing your donations (cash only) to:
#
#      Dr. Ramadan Abdullah Mohamed Shallah
#      Dr. Musa Abu-Marzuq
#      c/o Arab Republic of Palestine Mission to the United Nations
#      115 E 65 St, New York, NY 10023, tel: (212) 288-8500
#
#      Be sure to mark all envelopes "for the Yoni Kamens fund"!





From jya at pipeline.com  Thu Sep 10 19:56:22 1998
From: jya at pipeline.com (John Young)
Date: Fri, 11 Sep 1998 10:56:22 +0800
Subject: U.S. House only has a T-1
In-Reply-To: 
Message-ID: <199809111556.LAA02877@dewdrop2.mindspring.com>



Good piece, Declan. Is Time getting access to the restricted
Congressional Web site which offers the Starr report early for
members only drooling? Or are the major mediums getting
preferential copies in concert with the deliberately under-provided
House/Thomas/GPO rigs?

These are the four public access sites given by the NYT today,
which notes that no one yet knows the digital format -- text,
word processor or PDF images:

    http://www.house.gov/icreport/ (House Information Resources) 

    http://www.house.gov/judiciary (House Judiciary Committee) 

    http://thomas.loc.gov/icreport/ (Library of Congress) 

    http://www.access.gpo.gov/congress/icreport/ (Government Printing Office) 

If its PDF then the delay is surely deliberately planned to favor
those with scratchback access.







From whgiii at invweb.net  Thu Sep 10 19:56:55 1998
From: whgiii at invweb.net (William H. Geiger III)
Date: Fri, 11 Sep 1998 10:56:55 +0800
Subject: SNET: [FP] Alaska: Nearly 93% of new parents choose Enumeration At Birth (EAB)
In-Reply-To: <199809110836.BAA11054@netcom13.netcom.com>
Message-ID: <199809111557.LAA14444@domains.invweb.net>



-----BEGIN PGP SIGNED MESSAGE-----

In <199809110836.BAA11054 at netcom13.netcom.com>, on 09/11/98 
   at 01:36 AM, "Vladimir Z. Nuri"  said:

>This program has proven to be so popular with new parents that
>nearly 93% of all births transmitted to the Bureau request a social
>security number.

Of all the evils governments have done over the years, by far the worst
was convincing the slaves that they were really free.

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://www.openpgp.net
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html
- ---------------------------------------------------------------
 
Tag-O-Matic: Dos: Venerable.  Windows: Vulnerable.  OS/2: Viable.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNflKaI9Co1n+aLhhAQE2ZQP/Qd5m+8stY1CL7elrdGQUEEXbb2Kz2PYs
Y4XlBDd6AzkZ1nH82HnuK04vCbX9X8MwKBD299BYnwQ7kaDbOqiUwQFpNZc7P8Yf
Vknwil+DSqUclrur0lL7OGMNbIlqlA+NYj/ylkicy/T0bHxX+fGPaK3lnjMGQQLE
DoEBNFxz+Mk=
=RTFY
-----END PGP SIGNATURE-----





From nobody at replay.com  Thu Sep 10 19:59:57 1998
From: nobody at replay.com (Anonymous)
Date: Fri, 11 Sep 1998 10:59:57 +0800
Subject: Clinton's fake apologies
Message-ID: <199809111600.SAA12943@replay.com>



The annoying thing about Clinton's recent behavior is that he never
comes right out and apologizes, but the press always says he does.

Case in point:

> WASHINGTON (Reuters) - Saying ``I have sinned,'' a tearful President
> Clinton made an impassioned plea Friday for forgiveness from Monica
> Lewinsky and others and vowed to fight hard to keep his job.

But what did he say?

> ``I don't think there is a fancy way to say that I have sinned,''
> Clinton said, hours before independent counsel Kenneth Starr's report
> to Congress on his eight-month investigation into the Lewinsky scandal
> was to be made public.

He didn't say that he had sinned, he said that there wasn't a fancy way
to say that he had sinned.  He never came right out and said, "I have
sinned".

Another example:

> ``It is important to me that everybody who has been hurt know that the
> sorrow I feel is genuine -- first and most important my family, also my
> friends, my staff, my cabinet, Monica Lewinsky and her family, and the
> American people. I have asked all for their forgiveness,'' said Clinton.
> 
> It was the first time he had actually asked publicly for the forgiveness
> of Lewinsky...

But he didn't ask publicly for the forgiveness of Lewinsky.  He said that
he had already asked her for forgiveness.  Is this really true?  Has he
really spoken with her?  Or is it another lie?

Another example, from while Clinton was in Ireland:

> DUBLIN, Ireland (AP) - President Clinton said for the first time Friday
> ``I'm sorry'' about his affair with Monica Lewinsky, describing his
> behavior as indefensible as he sought to calm the growing storm that
> has shaken his presidency.

Here's what he actually said:

> ``I've already said that I made a bad mistake, it was indefensible and
> I'm sorry about it,'' Clinton said, questioned at a photo opportunity
> with Irish Prime Minister Bertie Ahern. It was the first time he had
> used the word ``sorry.''

The wording is not quite as obvious here, but in the video record it was
clear that he was saying that he had already said that his behavior was
indefensible and that he was sorry about it.  Of course, this is not true,
he had never said that.

Knowing Clinton's lawyerlike mind, we can only assume that his wording
is carefully chosen.  He could easily have said, "I don't think there is
a fancy way to say it, but I have sinned," or, with regard to Lewinsky
and company, "I ask here for forgiveness from them all."

No doubt he takes a measure of satisfaction in knowing that his calculated
public contriteness is carefully arranged to make it seem like he is
saying things which he actually is not.  Clinton loves lies, and it
must be thrilling to lie brazenly and to be praised for his openness
and honesty as he does so.  For a professional hypocrite like Clinton,
there can be no greater reward.





From whgiii at invweb.net  Thu Sep 10 20:02:23 1998
From: whgiii at invweb.net (William H. Geiger III)
Date: Fri, 11 Sep 1998 11:02:23 +0800
Subject: U.S. House only has a T-1
In-Reply-To: <199809111556.LAA02877@dewdrop2.mindspring.com>
Message-ID: <199809111602.MAA14549@domains.invweb.net>



-----BEGIN PGP SIGNED MESSAGE-----

In <199809111556.LAA02877 at dewdrop2.mindspring.com>, on 09/11/98 
   at 11:50 AM, John Young  said:

>If its PDF then the delay is surely deliberately planned to favor those
>with scratchback access.

Well, considering that congress is still debating how much of the report
(if any) will go public I doubt that there are any great backscratching
conspiracies afoot.

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://www.openpgp.net
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html
- ---------------------------------------------------------------
 
Tag-O-Matic: When DOS grows up it wants to be OS/2!

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNflLn49Co1n+aLhhAQGZCgQAoObOqtvQhg7nJGz8ZtCtonLOkeI+4r3f
HW+x90496EiIvLxJy4ChWZSIuuMrB3tmoOCneJmnReCpU9oN5mjmAA7ORFfjJmTc
hbeAqQ/PDJdlz6nTWPoU3cRLAKFAXHdoIz+Lcr46T9ZXo7dcVSQ8q9xv0/VBnV0A
visY22/Z6fw=
=S9J9
-----END PGP SIGNATURE-----





From tcmay at got.net  Thu Sep 10 20:11:28 1998
From: tcmay at got.net (Tim May)
Date: Fri, 11 Sep 1998 11:11:28 +0800
Subject: A Cypherpunk Trial, Yes
In-Reply-To: 
Message-ID: 



At 7:52 AM -0700 9/11/98, Trei, Peter wrote:

>	I, too, was suprised to find myself mentioned in
>	one of the postings John Young has highlighted.  I
>	hadn't noticed this before, since Toto's rants
>	were among the 50%+ of cpunks postings I marked as
>	read without actually reading them.

As I've said, I started deleting the posts from Toto, TruthMonger, Human
Gus-Peter, Linda Reed, and other totonyms about a year ago. I did this, "in
toto," one might say. As soon as I saw a long rant with a bunch of odd
stuff, mixtures of caps, references to Country Porn, Space Aliens,
Bienfait, etc., I hit the delete button.

But before this, I saw of course that we were playing starring roles in his
fantastical rants.

And Toto often forged our names on his rants and threats. I count this as a
kind of blessing, in that any attempt to prosecute us based on our posts
will run smack into this forgery issue...at least a speed bump in the
process of proving in court that some text fragment was actually written by
someone they claim it was written by.


>
>	The Poster Currently Known As Toto mentioned an
>	awful lot of people by name, purportedly engaged
>	in all kinds of nefarious activities.  The same
>	post also names Tim May, Adam Back, Declan
>	McCullagh, Ulf Moller, Kent Crispen, and Blanc
>	Weber. I'm let off easy, being characterized
>	as only a 'terroist [sic] InterNet forger'.
>	I think that this is because I once complained
>	when someone (possibly Toto) forged a message
>	in my name. To put it in the plainest possible
>	terms: I have never in my life forged a message.

Yep. I expect several of us may get subpoenas in this case. Either to
refute what is claimed, to support what is claimed, or just to clarify who
wrote what.

I plan to rely only on my memory. If they want me to try to reconstruct my
own e-mail archives, currently resident on several different disk drives,
some on CD-ROM, some in my gun safe, some in my safe deposit box, well,
this would require much work on my part. I presume they'll pay my
consulting fees for doing this work. Otherwise, it'll be just my memory.

"No, I have no direct recollection of the post you mention...."

--Tim May

(This space left blank pending determ. of acceptability to the gov't.)
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.







From declan at well.com  Thu Sep 10 20:31:11 1998
From: declan at well.com (Declan McCullagh)
Date: Fri, 11 Sep 1998 11:31:11 +0800
Subject: U.S. House only has a T-1
In-Reply-To: <199809111556.LAA02877@dewdrop2.mindspring.com>
Message-ID: 



Well, let me just say this: We expect to have the document in electronic
form as early as possible. 

Also, while we're not relying on AP, the company is making the file
available on a passworded FTP site for its members. And FNS is promising
to OCR it if necessary and send it to its subscribers this evening for
$85. 

-Declan


On Fri, 11 Sep 1998, John Young wrote:

> Good piece, Declan. Is Time getting access to the restricted
> Congressional Web site which offers the Starr report early for
> members only drooling? Or are the major mediums getting
> preferential copies in concert with the deliberately under-provided
> House/Thomas/GPO rigs?
> 
> These are the four public access sites given by the NYT today,
> which notes that no one yet knows the digital format -- text,
> word processor or PDF images:
> 
>     http://www.house.gov/icreport/ (House Information Resources) 
> 
>     http://www.house.gov/judiciary (House Judiciary Committee) 
> 
>     http://thomas.loc.gov/icreport/ (Library of Congress) 
> 
>     http://www.access.gpo.gov/congress/icreport/ (Government Printing Office) 
> 
> If its PDF then the delay is surely deliberately planned to favor
> those with scratchback access.
> 
> 
> 
> 
> 





From mmotyka at lsil.com  Thu Sep 10 20:35:53 1998
From: mmotyka at lsil.com (Michael Motyka)
Date: Fri, 11 Sep 1998 11:35:53 +0800
Subject: radio net (fwd)
In-Reply-To: <33CCFE438B9DD01192E800A024C84A19284623@mossbay.chaffeyhomes.com>
Message-ID: <35F951FA.71B@lsil.com>



Hi Bill,

Bill Stewart wrote:

> Not per se, though there _is_ still one major restriction -
> the Defense Department gets a crack at patent applications,
> so if you try to patent a crypto algorithm or crypto phone,
> they can seize and classify your patent application and
> working materials, using the excuse of "national security".
>
I suppose we need more altruistic gestures placing good stuff into the
public domain.

> Sure there are - my $150 cordless phone uses spread-spectrum,
> partly for better sound quality, partly for better privacy,
> and partly because it's simpler than picking individual channels.
>
The security is only between the handset and the base unit. Once the
signal hits the POTS it's the same old story - open line.

ALSO - the channels and the hopping sequence used in the
"spread-spectrum" systems are predefined. Kind of like making a stream
cipher with a very short bitstream you got from the government printing
orifice. Using any other sequence is a crime.

The real purpose of the spread spectrum phones is to allow increased
signal levels. The security is not robust.

Try this one:

Not particularly original - I would guess that Tim's 3DES phone is
something like this.

Wal Mart Plastics for the housing ( ever tooled plastics? $$$ )
Custom board
	Dedicated DSP for voice compression/decompression
	Modem chipset for POTS connect ( direct or ISP )
	Fast microP for encryption/protocol
	Any encryption algorithm you desire
	Software Developer's Kit ( roll your own algorithm )

This will work very nicely at home or with any cell phone that has a
modem port. It's really nothing but a dedicated version of a PC based
PGP phone. It's just smaller and cheaper than a PC and has no MS DLLs on
it.

Regards,
Mike





From declan at well.com  Thu Sep 10 20:57:17 1998
From: declan at well.com (Declan McCullagh)
Date: Fri, 11 Sep 1998 11:57:17 +0800
Subject: Clinton's fake apologies
In-Reply-To: <199809111600.SAA12943@replay.com>
Message-ID: 





On Fri, 11 Sep 1998, Anonymous wrote:

> The annoying thing about Clinton's recent behavior is that he never
> comes right out and apologizes, but the press always says he does.
> 
> Case in point:
> 
> > WASHINGTON (Reuters) - Saying ``I have sinned,'' a tearful President
> > Clinton made an impassioned plea Friday for forgiveness from Monica
> > Lewinsky and others and vowed to fight hard to keep his job.

Reuters' lede seems right:


	First, I want to say to all of you that, as you might imagine, I
have been on quite a journey these last few weeks to get to the end
of this, to the rock bottom truth of where I am and where we all are.
I agree with those who have said that in my first statement after I
testified I was not contrite enough.  I don't think there is a fancy
way to say that I have sinned.
	It is important to me that everybody who has been hurt know that
the sorrow I feel is genuine: first and most important, my family;
also my friends, my staff, my Cabinet, Monica Lewinsky and her
family, and the American people.  I have asked all for their
forgiveness.
	But I believe that to be forgiven, more than sorrow is required
-- at least two more things.  First, genuine repentance -- a
determination to change and to repair breaches of my own making.  I
have repented.  Second, what my bible calls a "broken spirit"; an
understanding that I must have God's help to be the person that I
want to be; a willingness to give the very forgiveness I seek; a
renunciation of the pride and the anger which cloud judgment, lead
people to excuse and compare and to blame and complain.
	Now, what does all this mean for me and for us?  First, I will
instruct my lawyers to mount a vigorous defense, using all available
appropriate arguments.  But legal language must not obscure the fact
that I have done wrong.  Second, I will continue on the path of
repentance, seeking pastoral support and that of other caring people
so that they can hold me accountable for my own commitment.
	Third, I will intensify my efforts to lead our country and the
world toward peace and freedom, prosperity and harmony, in the hope
that with a broken spirit and a still strong heart I can be used for
greater good, for we have many blessings and many challenges and so
much work to do.
	In this, I ask for your prayers and for your help in healing our
nation.  And though I cannot move beyond or forget this -- indeed, I
must always keep it as a caution light in my life -- it is very
important that our nation move forward.





From ptrei at securitydynamics.com  Thu Sep 10 21:07:54 1998
From: ptrei at securitydynamics.com (Trei, Peter)
Date: Fri, 11 Sep 1998 12:07:54 +0800
Subject: Bits are Bits
Message-ID: 





> -----Original Message-----
> From:	Steve Bryan [SMTP:sbryan at vendorsystems.com]
	[...]
>  But I have not yet seen CD-ROMs for rent or even available to 
> check out for home use  from the public library. 
	[...]
	[forgive the lame quoting format - I'm using
	a Microsoft product.]

	I was in my town library yesterday, and they
	were loaning CDROMs. I was in a hurry, so did
	not check the details. At least one was made by
	National Geographic. (BTW: You can get the *entire*
	*run* of NG on CDROM, which I think is pretty neat.)

	Peter Trei





From sunder at brainlink.com  Thu Sep 10 21:12:34 1998
From: sunder at brainlink.com (Ray Arachelian)
Date: Fri, 11 Sep 1998 12:12:34 +0800
Subject: Fighting DMV clerical errors in NYC:
Message-ID: <35F9594E.6CCD7C2F@brainlink.com>



A friend of mine asked me to forward this question to you guys:

IMHO he needs a good lawyer, but maybe someone here knows more:

-----------------------------------------------------------------------------

> Any particular thing you want to fight @ the DMV or just in general?

They are preventing me from renewing my license due to a clerical error they 
made over a year ago. Since I did not respond to their letter (I didn't 
understand what they were talking about) they suspended my license. That 
caused my insurance company to drop me. When I renewed my insurance (a 
second error, if you have a suspension you can not get insurance) they told 
me it was cleared.

I need to talk to someone who can help me resolve this without me having to 
hand in my license and plate for the 90 day penalty


-- 

=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.|  Ray Arachelian    |Prying open my 3rd eye.  So good to see |./|\.
..\|/..|sunder at sundernet.com|you once again. I thought you were      |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
======================= http://www.sundernet.com ==========================





From carolann at censored.org  Thu Sep 10 21:33:32 1998
From: carolann at censored.org (Carol Anne Cypherpunk)
Date: Fri, 11 Sep 1998 12:33:32 +0800
Subject: Fighting DMV clerical errors in NYC:
In-Reply-To: <35F9594E.6CCD7C2F@brainlink.com>
Message-ID: <3.0.2.32.19980911123006.006ddfc4@pop.primenet.com>



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"

As a former NYC cabbie, the best way to resolve a DMV dispute
is to take the train to Albany and deal with it there. This way you
can access higher and higher levels of the DMV until the problem
is fixed. Albany has no where near the level of hassle that NY has.

cab8

At 01:09 PM 9/11/98 -0400, you wrote:
>
>A friend of mine asked me to forward this question to you guys:
>
>IMHO he needs a good lawyer, but maybe someone here knows mor
Member Internet Society  - Certified Mining Co. Guide  -  Webmistress
***********************************************************************
Carol Anne Braddock (cab8)  carolann at censored.org   206.165.50.96
My Homepage
The Cyberdoc
***********************************************************************
Will lobby Congress for Food & Expenses!!!
-----BEGIN PGP SIGNATURE-----
Version: PGP Personal Privacy 6.0
Comment: Totally uncensored from censored.org

iQA/AwUBNfleITiM2656VXArEQLc1wCeML7Kh1e0rQdCE/quIXcE9ge9RDAAn36+
znj/4ya+s8pHMj8tCl9o6tGy
=RdDc
-----END PGP SIGNATURE-----





From declan at well.com  Thu Sep 10 21:34:49 1998
From: declan at well.com (Declan McCullagh)
Date: Fri, 11 Sep 1998 12:34:49 +0800
Subject: U.S. House only has a T-1
In-Reply-To: 
Message-ID: 



/cat:V/pri:U/sld:A/por:1/for:5/slu:BC-STARRREPORTTEXT Advisory -----
@TEXT
	BC-Starr Report Text, Advisory,0057

MANAGING EDITORS:

WIRE EDITORS:

We are still awaiting the Starr report. We will advise immediately when the report is available. Until then, please refrain from logging onto the ftp sites. Otherwise, there is a danger of jamming the sites and preventing us from posting the report. The AP

HOME BASED BUSINESS THE NEW FRONTIER !

SOMEONE STARTS A NEW HOME BASED BUSINESS EVERY 11 SECONDS RESULTING IN 8,000 NEW HOME BASED BUSINESSES DAILY ! ! THE GROWTH OF THIS INDUSTRY IS NOTHING SHORT OF A SILENT REVOLUTION, SOON TO REACH $500 BILLION ANNUAL REVENUES. 44% OF ALL HOUSEHOLDS WILL SUPPORT SOME SORT OF HOME BASED BUSINESS BY THE YEAR 2000. THE AVEREAGE HOME BASED BUSINESS EARNS $50,250 PER YEAR - - NEARLY DOUBLE THE NATIONAL AVERAGE OF THOSE WORKING FOR SOMEONE ELSE ! ! LET ME TELL YOU A LITTLE ABOUT OUR GREAT OPPORTUNITY IN THE HOME BASED BUSINESS FIELD. OUR PEOPLE TYPICALLY WORK FROM 2 TO 4 HOURS DAILY WITH 23% ELECTING TO DO IT FULL TIME. 1. THEY DO NO SELLING 2. THEY MAKE NO PHONE CALLS 3. THEY DO NOT CARRY INVENTORY 4. THEY MAKE NO PRESENTATIONS 5. THEY DO NO RUNNING AROUND OUR COMPANY EMPLOYS PROFESSIONAL ONLINE RECRUITERS AND USES NEWSPAPER AND RADIO ADS TO HELP YOU PROMOTE YOUR BUSINESS. WE HELP YOU GET YOUR BUSINESS STARTED AND IT COSTS YOU NOTHING - - ALL YOU HAVE TO DO IS JOIN AND BECOME AN ACTIVE MEMBER OF OUR #1 TEAM. WHAT DO YOU HAVE TO LOSE? CLICK BELOW AND WE WILL TAKE YOU ON A TOUR OF OUR COMPANY. WE WILL INTRODUCE YOU TO OUR PRODUCTS, SHOW YOU HOW WE OPERATE OUR BUSINESS, LET YOU CALCULATE YOUR EARNINGS POTENTIAL BASED ON YOUR EXPECTED LEVEL OF PARTICIPATION AND SHOW YOU HOW TO ENROLL ! [ Click Here > > > for YOUR Tour and Opportunity.... ]

Responsible Emailing 100% No Hassle Connection

If you would not like to receive any future mail concerning money making opportunities, please click on the link below and type in the word "Remove" in the subject line of your email. You will be removed from our data base. Sorry for any inconvenience we may have caused you.. [ Type "REMOVE" in the subject line of your email ]

From jya at pipeline.com Wed Sep 16 03:19:29 1998 From: jya at pipeline.com (John Young) Date: Wed, 16 Sep 1998 18:19:29 +0800 Subject: Gore, Others on Crypto Policy Message-ID: <199809162314.TAA00055@camel14.mindspring.com> There's a transcript of today's White House press conference on the new US encryption policy at: http://jya.com/vp091698.htm VP Gore, Justice, FBI, DoD, NSA, CIA, BXA and cooperating industry were there explaining the way it's supposed to satisfy all interests of the agencies and a few good businesses if not the citizenry. Domestic crypto restrictions? Well, take a look at how that was punted. And what the FBI is setting up to see that law enforcement needs are met, and what DoD is planning for surveilling the globe, strong crypto or not. Not a word about backdoors, TA, DIRT, keyboard snooping, covert chip features, compromising emanations, national technical means, just assurances that the plan satisfies the interests of the protectors. From rah at shipwright.com Wed Sep 16 03:24:33 1998 From: rah at shipwright.com (Robert Hettinga) Date: Wed, 16 Sep 1998 18:24:33 +0800 Subject: Announcement: Mac-Crypto Conference Oct 6-9, 1998 Message-ID: --- begin forwarded text From: vinnie at vmeng.com Date: Wed, 16 Sep 1998 15:47:54 -0700 Subject: Announcement: Mac-Crypto Conference Oct 6-9, 1998 MIME-Version: 1.0 X-Priority: 3 To: undisclosed-recipients:; -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 The Membership of the Mac-Crypto List invites you to The Third Annual Macintosh Cryptography and Internet Commerce Software Development Workshop October 6 - 9th, 1998 Town Hall Auditorium Apple R&D Campus 4 Infinite Loop, Cupertino, CA, USA Keeping with tradition, this is still free workshop, but we'd *really* like it if you register (see below). We are once again hosting our annual workshop, where you are sure to find the latest and greatest information about whats going on in the Macintosh cryptography world. A lot has happened in the past year in the world of the Internet and Cryptography, so this year, thanks to popular demand we have allocated more time and a larger hall for developers to talk about what they are working on. PRELIMINARY WORKSHOP TOPICS: (more to come) Introductions and Overviews: Intro to Crypto Systems Export Controls & Crypto software Crypto Opportunities for the Mac Tech Stuff: AppleShare Authentication Architecture PGPticket - A Secure Authorization Protocol The AltaVec PowerPC Architecture Apple Security Architecture Overview. Apple Keychain / Subwoofer update OpenPGP & the IETF standards process Overview of Crypto API's and Toolkits Applications of Cryptography RC5 cracking effort & the Mac PGPUAM - Appleshare Public Key Authentication Graphically displaying the Web of Trust Anonymous Communications and the Macintosh Open Sessions: As requested we scheduled lots of time for developer demos and open discussions plus the much asked for and a PGP Keysigning party ... and plenty of time for developers to network with each other and Apple. We have also left time open for a few last-minute speakers. If you would like to present a paper or give a talk, please contact Vinnie Moscaritolo at vinnie at apple.com To find out more about previous Mac-Crypto workshops check out our webpage at http://www.vmeng.com/mc/ REGISTRATION: To register, complete the following form, and email it to mac-crypto-conference at vmeng.com with the subject line REGISTRATION Registration is limited to 300 attendees, so be sure to register early. _______________________________________________________________________ * Name: * Email Address: Title: Affliation: Address: Telephone: Comments: _______________________________________________________________________ Local Hotels: Cupertino Inn, 800-222-4828 Pretty much Across the Street. Cupertino Courtyard by Marriot, 800-321-2211 5 Minute Drive Inn at Saratoga 408-867-5020 About 3 Miles See you in Cupertino on October 6 - 9th! Vinnie Moscaritolo Apple World Wide Developer Support DSS/DH: 3F903472C3AF622D5D918D9BD8B100090B3EF042 -----BEGIN PGP SIGNATURE----- Version: PGP 6.0 iQA/AwUBNgA9BR16LYZvFyoKEQKYAACfXK7uA40tX1DRy44zTaqkesDs5TkAoKS3 Fx/5lcgO9b6Wqfsibdpc1MRz =c+ZP -----END PGP SIGNATURE----- --- end forwarded text ----------------- Robert A. Hettinga Philodox Financial Technology Evangelism 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From edsmith at IntNet.net Wed Sep 16 04:01:47 1998 From: edsmith at IntNet.net (Edwin E. Smith) Date: Wed, 16 Sep 1998 19:01:47 +0800 Subject: Voices In-Reply-To: <3.0.2.32.19980915225715.007afe50@mailhost.IntNet.net> Message-ID: <3.0.2.32.19980916195534.008081d0@mailhost.IntNet.net> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Thank you for your thoughtful and honest response. I am interested in the two meanings of "Just". When you say you have blind spots do you mean that you delude yourself in some ways? I would say this is true of all of us, however I would say that by recognizing that you do have shortcomings you are making an effort at improving. I also have many shortcomings and I am trying to improve. I tend to be rather intolerant of stupid people who think they are so superior and that their way is the only way people should live. They will never hesitate to lecture others about their concept of morality, which usually involves the use of weapons and stealing, for the greater good. Such is the morality of the current occupant of the Whitehouse. I tend to lecture people about the value of freedom and peaceful persuasion to get what I want. It is a benifit to many to trade peacefully rather than take what we want by force. This is my concept of what is just. It is my concept of the "Greater Good." I carry this to the extreme that if it comes down to the issue of if my survival can only be secured by the use of force to steal from others thereby taking their life or any part of it, then it is right that I should die. I don't have any children so I cannot say what I would do if it came down to the life of one of mine. I would be very much more tolerant of a mother who was put in this situation. I once, long ago had it explained to me the difference between charity and welfare. Don Tarbell explained that if he were to see a person who was starving. He would help them in whatever way he wanted short of stealing. Welfare on the other hand steals from people who might have contributed voluntarily but then resent being forced to help. Welfare is unjust. I have recently began reading what promises to be a very good book. It is "People of the Lie" by M. Scott Peck M. D. It is about human evil. One of the responses to a quote from the book which I posted was "Ask the antelope if he thinks the lion is evil, perhaps you have this view because no animal considers you a tasty morsel." This is non-responsive in that we are talking about Human Evil and BTW there are many animals which would consider me much more than a "tasty morsel." We have very large aligators here in Florida which often eat small children, however very few people consider them evil by human standards, they are simply doing what they do. The difference is that humans have, by deciding to be civil toward one another, decided that they will not eat each other and eat lower forms of life instead. Perhaps we should ask cows if they think WE are evil. As to freedom of speech. I believe that I have much to gain by listening to what others have to say. This is a rational attitude I think because communication is what separates us from the lower forms of animals. It allows us, with our short lifespans to capitalize on creative ideas which our larger brains made possible. Without communication those ideas would die with us. We would be very little better off than chimpanzies. Perhaps able to fashion tools but unable to show others how to do the same. Each creation would have to be repeated in each individual. But because I can communicate that idea which I have created to another, even though I didn't act upon it, the idea will outlive me and be a benifit to many. The wheel is an invention so old that it is impossible to discover when it was first used. But although it was surely created over and over many times it's spread was accomplished many times faster because the concept could be drawn on the wall of a cave with another very useful invention. This is the vaule of communication and "free speech." Speech and the written word and now the internet. Not many realize that the internet is the most significant advance in technological evolution to have happened in a very long time. Why do I say this? Because it has enhanced communication manyfold. Radio and TV are one- way only and are inferior to the printing press so don''t represent much of an advance. Any attempt by governments to curtail this enhanced speech is, in my opinion evil. Edwin At 05:10 PM 9/16/98 -0500, you wrote: >Am I Just? That is a difficult question to answer because "just" has two >distinctly different definitions, and several nuances in the one definition >which your use of the word implies. I am reasonable--or try to be-- but I >do have my blind spots. Also, I am "just" in that I recognized in your >statement about "voices" the essence of a healthy belief in freedom of >speech with your strongly stated recognition that it is an endangered >freedom when access to the means of distributing speech is limited to a >chosen few who represent a very narrow spectrum of ideas. The Internet has >provided a marvelous solution to that problem. It will be fascinating to >observe how this freedom of access to the means of distributing speech on a >global scale will affect the cultures of all nations whose citizens are >allowed to get "on line" and participate in the exchange of ideas and the >discussion that ensues. > >Elizabeth >> -----BEGIN PGP SIGNATURE----- Version: PGP for Personal Privacy 5.0 Charset: noconv iQA/AwUBNgBP9UmNf6b56PAtEQL0PQCfdySiIPGgD0YcIhsJofO9MEDS06UAoJK9 z3c+1YDfVnq/RF9L2O1d01ei =3hNv -----END PGP SIGNATURE----- From nobody at replay.com Wed Sep 16 04:45:01 1998 From: nobody at replay.com (Anonymous) Date: Wed, 16 Sep 1998 19:45:01 +0800 Subject: The AOL Chronicles Message-ID: <199809170045.CAA23060@replay.com> Every time one of these AOL wars start, the AOLers claim that there are a few intelligent people on AOL and that our shunning of them based on statistics is unjustified. We all know what the statistics are, but I don't think anybody has done this for Cypherpunks yet. It has been done other places. This isn't scientific with margins of error and everything, but it's good enough to illustrate the point. I went through every posting originating from AOL which was sent to Cypherpunks between July and September 16th, which is today. I classified postings as either "clueful" or "clueless," with the latter determined by relevance to the list, literacy, quoting, and whether it makes any sense at all. Anything completely stupid is also classed as "clueless." "Clueful" is anything which is even remotely relevant to the list, and includes quoted material if a followup. In addition, if an AOL user sends something clueless to the list then gets flamed, that posting and any subsequent postings in that thread by the original author are counted as clueless unless it's an apology, at which point it isn't counted at all. The flames of said user are counted as defense, not as clueless. Also, if I looked at the message but couldn't tell what the hell the author was talking about because he didn't bother to quote, I classed the posting as clueless. A "*" denotes that the portion I quote is the entire message. A "+" denotes that there was either no quoted material in the message or that it used the "<<>>" style. Keep in mind that messages which are original would not have quoted material, but still have a "+". A "H" means that it contained HTML. I removed all new lines from the quotes to make them more compact. If the posting was large, I quoted only some parts. Clueless posts from AOL: 1) "At least they have TCP/IP protocols now with Win 95 ex: Hiroshima 45, Tsjernobyl 86, Windows 95 (Please, correct my spelling if I misspelled Tsjernobyl)" -- FTPPork at aol.com (Porker), 18 Aug 1998, (+) 2) "Ibelive by spooks he ment goverment agents not a racial slur so lay off." -- ILovToHack at aol.com, 31 Aug 1998, (+*) 3) "judy -- how about let's go shopping first and then watch the show remotely together????" -- Syniker at aol.com, 16 Jul 1998, (+) 4) "please i need some suggestions with topics for my informative speech, or may some infromative speeches already outlined to use it for refrence. thankyou." -- KMHAsfaha at aol.com, 17 Jul 1998, (*+) 5) "d" -- Saxgrim at aol.com, 18 Jul 1998, (*+) 6) "send me the book (e/mail me back" -- JackeI466 at aol.com, 19 Jul 1998, (+*) 7) "Hello: My name is Enisa, I'm 13 years old. I write an online e-zine that for teens. We have over 150+ members. We just started a few days ago. We are looking for sponsors to sponsor our contests. These are some of the things we are able to do for you..." -- Craz8Grl at aol.com, 20 Jul 1998, (+H) 8) "you got it?" -- LrdWill at aol.com, 20 Jul 1998, (+*) 9) "would love to see info re; international credit cards." -- TTrump5646 at aol.com, 21 Jul 1998, (+*) 10) "i would be very delighted if u gave me a free download for 5.0 realplayer.if u would send it to mike111495 at aol.com and indoe29c at aol.com we will be very honored to receive them. thankx and goodbye" -- Mike111495 at aol.com, 22 Jul 1998, (+*) 11) [A bunch of asterisks and screaming] "I was recently informed from sorces who choose to remain annomous about a viri that uses macafe's update tool to detect when it is found then it modifys its code and forms a new strain of the virus this pattern continues although it has only been tested through a clone of macafees server to 100 mutations it looks like it could be a big problem I will inform you of any more information i learn about it but for now "THE TRUTH IS OUT THERE"" -- ILovToHack at aol.com, 22 Jul 1998, (+*) 12) "WHY CANT I FIND ANY WHITE AMERICAN YOUTH ALBUMS ANYWHERE?" -- koitch at aol.com, 23 Jul 1998, (+*) 13) [Subject: Pipe bombs r better] "they rule!" -- Ant6menace at aol.com, 23 Jul 1998, (+*) 14) "Actually, AOL, along with being an acceptable ISP with built in authentication of sender, has an easily used Mail interface. (Even if it doesn't exactly follow the standards.)" -- MMerlynne at aol.com, 24 Jul 1998, (+*), in response to #12. 15) "HELLO, IS THERE ANY WAY TO GET MY HANDS ON S BOOK THAT SHOWS THE REAL BASEBALL PEOPLE AUTOGRAPHS AND THE FAKES SO I KNOW WHAT TO LOOK FOR??? PLEASE REPLY" -- AT666IND at aol.com, 25 Jul 1998, (+*) 16) "I am trying to find my brother, "Allen Thomas Taylor" I am not sure what year he was born but I think it was l922, l923. We have the same Father[...]" -- CEr1942929 at aol.com (Christine Ernest), 26 Jul 1998, (+) 17) "Hey: Who made up the term "Politically Correct"? Not Christians and not Republicans. Your side did. How does wanting a smaller government, less taxes, the freedom to CHOOSE to pray in schools, the rights of the un-born( of[...] CHOKE ON IT YOU HYPOCRITE" -- JBrown4330 at aol.com, 27 Jul 1998, (+) 18) "do you have music vinyl stickers , if so , could i get them wholesale?" -- Babybee390 at aol.com, 29 Jul 1998, (+*) 19) "I'm looking for Lynrd Skynrds Freebird on a window sticker for my car. Do you know where I can find one?" -- Vox9869 at aol.com, 28 Jul 1998, (+*) 20) "More!" -- CLCTCHR at aol.com, 29 Jul 1998, (+*) 21) "Can you do a 5 color process? 4x4". Price on 500,1000,1500" -- ELarson100 at aol.com, 4 Aug 1998, (+*) 22) [Subject: whut up] "looking for a place to have some Band stickers made, can you email me a phone number so we can check out some prices.....thanks TIm" -- FRETELUCO at aol.com, 6 Aug 1998, (+*) 23) "Could you please send me the Anarchy Cookbook.....I really want it and I cant find it anywhere! Thanx for your help.. Mike Jonhson" -- XoVoX123 at aol.com, 9 Aug 1998, (+*) 24) [Subject: .] "" (Yes, nothing.) -- EpicTeU at aol.com, 9 Aug 1998, (+*) 25) "Come on thake it easy on the guy at least he aint on AOL or somthing stuped." -- ILovToHack at aol.com, 13 Aug 1998, () 26) [Subject: Subject: LOL. Made me look] "" (Yes, nothing.) -- Seabiner at aol.com, 14 Aug 1998, (+*) 27) "about: Hello, I am trying to start a VB 32 bit code bank you can send any code you want to exept codes for aol addons... . 1nce a week most likely on fridays I will check the hotmail account specifyed below and I will take all the codes and put them in a txt file and send it to everyone who sent a code in since I am [...] To send Codes for the ML Send E-mail to VB32Coders at Hotmail.com In the sbject field write anonymous / Code topic if you don't want your E-Mail address to show up when I send the Codes out or else just type the topic of the code you are sending.. ." -- EpicTeU at aol.com, 14 Aug 1998, (+) 28) "Because the American Justice system is screwed up royally... for instance - Kevin Mitnick... www.KevinMitnick.com" -- FTPPork at aol.com, 17 Aug 1998, (+*) 29) "I am interested in travel between Knoxville, Tennessee and Des Moines, Iowa. I would also be interested in Nashville, Tennessee and Des Moines, Iowa or Atlanta and Des Moines, Iowa. Please notify me of specials in these markets. Thanks, Linda Tisue ltisue at aol.com" -- Ltisue at aol.com, 18 Aug 1998, (+*) 30) "I am looking to distribute a product and I was wondering if you can tell me how to get mass e mail addresses. I look forward to hearing from you." -- LHilley488 at aol.com, 19 Aug 1998, (+*) 31) "Send me info on how to make a pipe bomb. HoppyF1315" -- HOPPYF1215 at aol.com (Hoppy Head), 19 Aug 1998, (+*) 32) "I take that statement as an insult, and it really isn't true about all of us AOL users. [...] Actually, some of us know what real hacking is...[...] Anyway, try not to stereotype people so much, because, with the Advent of 32 bit AOL, we can actually use all of the TCP/IP protocols, etc..." -- FTPPork at aol.com, 20 Aug 1998, (+) 33) [Subject: anarchy cookbook] "Is any one home?" -- Spazherp at aol.com, 21 Aug 1998, (+*) 34) "I did not say anywhere that 32 bit would fix problems of cluelessness - or ignorance in your case. I said, it is a little better because we can now use TCP/IP protocols. Did I ever say that the people on AOL were smarter because of it? Well, let's go read over that post - - - nope... I didn't. I think some people should read a little more carefully, or just don't read at all." -- FTPPork at aol.com, 22 Aug 1998, (+*) (As I recall, this one was in response to a set of flames which cited his assertion in #32.) 35) [Subject: can you help me make virses please tell me who to make one step by step] "I need help i want to know how to make a virses in c\c++ please help me." -- VXF32 at aol.com, 21 Aug 1998, (+*) 36) "Tell me how to get tons of free stuff! Thank You ." -- RAGOD5597 at aol.com, 21 Aug 1998, (+*) 37) "Here we go again" -- FTPPork at aol.com, 22 Aug 1998, (+*) 38) [Subject: tell me] "hola and good tidings send some info on spooks please i will be grateful" -- RyanFord at aol.com, 29 Aug 1998, (+*) 39) [Subject: h] "how did u do it" -- CRBREW9802 at aol.com, 7 Sep 1998, (+*) 40) " HaCkaZ OnlY Da EliTeHelLO YaLL DiS is Da MaDD AAOOLL HaCka Ima startin a GreWp fOR HaCs Only So In OthA WerDS yA gOttA KnOw The WAreZ anD HoW toO UsEr FaTe AnD AOL So MaIl Or Im Me FoR Da TeTaIls If YeR LeeTo K Pe at CE FrOmE The LeeTs HacKJeFFrO)" -- Jrjeffro at aol.com, 9 Sep 1998, (+*) 41) Message quoting the above, which wasn't originally sent to the list, in "<< >>" style, adding only: "What the hell is this? No wonder why AOLers have a bad name Im going to Flame this guy" -- EpicTeU at aol.com, 10 Sep 1998, (+*) 42) "Preach on brother =)" -- AIMSX at aol.com, 15 Sep 1998, (+*), copied to 25 other recipients, plus the list. 43) "I read that book" -- AIMSX at aol.com, 15 Sep 1998, (+*) 44) "All Creatures Great and Small - that one... =) I also read an Aasimov a while back in fifth grade - unfortunately, I can't remember even the name... I need to pick some of his books up again... One book I can remember reading since 5th grade (and every summer thereafter) is "IT" by Stephen King - one of his few really good books. I have read it 8 times since. I greatly recommend it =)" -- AIMSX at aol.com, 15 Sep 1998, (+*) 45) "We are sending you an invitation to be one of our special guests this year, big harry ass lawsuits are always of interest. Bring a friend if you like, but I have to warn you, Liberatarians are not welcome. This years menu includes red meat and poptarts. Clothing is optional. Sincerely, Beth" -- BUFFU at aol.com, 17 Jul 1998, (+*) 46) "That's why I suggest listening to I Robot by Alan Parson's Project." -- StanSqncrs at aol.com, 18 Jul 1998, (+*) 47) "If sombody offers you some FedGov, just say NO!" -- Nilsphone at aol.com, 23 Jul 1998, (), copied to 32 recipients, including the list. Note the "+" ratings on the below. (Semi-)Clueful postings from AOL: 1) "It's the easy way out (and I mean DOWN and OUT)! I mean, if we're simply going to change them out everytime, why bother to figure out which ones a going to change them out everytime, why bother to figure out which ones aren't evil/stupid (I mean, out of all those politicians, there's got to be 1 or 2! I think. ;-) )? See, if we just simply change politicians at every chance, then we throw the baby out with the bathwater, so to speak. The simple solutions aren't always the best ones." -- StanSqncrs at aol.com, 17 Jul 1998, (+*) 2) "ROFLOL! What's coincidental? The latest tune that my band, Nobody's Business (in which I play bass and sing) has learned, is Cheap Sunglasses by ZZ Top. If it ain't coinicidence, I got a 'scarecrow' in my band. " -- StanSqncrs at aol.com, 18 Jul 1998, (+) 3) [Subject: Subject: Nomination of Lyndon Larouche to the UNITED NATIONS OF THE FRINGE] "Hey Punks, As a United Nations OF the Cyber Fringe Member, I am asking for your input on giving Lyndon a nomination. So far his war crimes only include[...]" -- BUFFU at aol.com, 20 Jul 1998, (+) 4) "If you would like information about tempest monitors, computers, printers or secure fax machines, please contact me." -- CompSec01 at aol.com (Karen Azoff), 22 Jul 1998, (+) I gave up at this point because the clueless list just kept growing. The ratio isn't encouraging, especially since I was being generous with what is considered a "clueful post." From whgiii at invweb.net Wed Sep 16 04:54:58 1998 From: whgiii at invweb.net (William H. Geiger III) Date: Wed, 16 Sep 1998 19:54:58 +0800 Subject: It's finally over (was Re: Explanation of Harald Fragner and cypherpunks) In-Reply-To: <33CCFE438B9DD01192E800A024C84A19284687@mossbay.chaffeyhomes.com> Message-ID: <199809170055.UAA28232@domains.invweb.net> -----BEGIN PGP SIGNED MESSAGE----- In <33CCFE438B9DD01192E800A024C84A19284687 at mossbay.chaffeyhomes.com>, on 09/16/98 at 12:37 PM, Matthew James Gering said: >What we really need is an automated system that could authorize/deny an >address prior to the code/password being sent that would keep track of >distribution list addresses and such. >Perhaps I'll create one myself soon. PGP, Digital signatures, CA's, Authentication, ... This *is* a crypto related group isn't it? How does Thwart, Verisign, or the other CA's handle authentication of an e-mail address in there low level certs? - -- - --------------------------------------------------------------- William H. Geiger III http://www.openpgp.net Geiger Consulting Cooking With Warp 4.0 Author of E-Secure - PGP Front End for MR/2 Ice PGP & MR/2 the only way for secure e-mail. OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html - --------------------------------------------------------------- Tag-O-Matic: Windows? Homey don't play that! -----BEGIN PGP SIGNATURE----- Version: 2.6.3a-sha1 Charset: cp850 Comment: Registered_User_E-Secure_v1.1b1_ES000000 iQCVAwUBNgAY+49Co1n+aLhhAQGPqgP7BKyRdt9xZhk6jWVoOgHU8RuonrTpj7jh TLOhzOy/F8UyycDnaIUtVlESmbCvCpkTIMyvEo9opcrUOD7Mm3I0JWAQ+nNPSN9T 8lQ45PEyjyYf9jhCySCpvzfan8vGQBFY0eGNFobcp4an7SKxJG1Yib5QRppkfghN nhd4Wz1GRQA= =l6Cf -----END PGP SIGNATURE----- Tag-O-Matic: I use OS/2 2.0 and I don't care who knows! From nobody at replay.com Wed Sep 16 05:04:06 1998 From: nobody at replay.com (Anonymous) Date: Wed, 16 Sep 1998 20:04:06 +0800 Subject: It's finally over (was Re: Explanation of Harald Fragner and cyph Message-ID: <199809170105.DAA24665@replay.com> > > And thanks, but we have enough magazine subscriptions already. :) > > > > Mark > > > > Bart Troyan wrote: > > > > > > The real-world analogy would be for me and all my friends to get a bunch of > > > magazines, rip out all those postage-paid subscription flaps, and fill out > > > your name and address on each of them, then you'd have unwanted trial > > > subscriptions to lots and lots of magazines. > > > > > > hmmmm... > > > MacroView > > > 90 William Street, Suite 301 > > > New York, NY 10038 > > > > > > Wouldn't that suck? Can you imagine if 1000 people did that to you all the > > > same day? (this is *not* a threat, just an example). You'd have bags and > > > bags of zines and bills coming in daily... This sounds like a plan. In fact, we can do this for all spam domains. Interested, Tim? Registrant: MacroView (SIXDEGREES-DOM) 90 William Street, Suite 301 New York, NY 10038 Domain Name: SIXDEGREES.COM From mgering at ecosystems.net Wed Sep 16 05:04:12 1998 From: mgering at ecosystems.net (Matthew James Gering) Date: Wed, 16 Sep 1998 20:04:12 +0800 Subject: It's finally over (was Re: Explanation of Harald Fragner and cypherpunks) Message-ID: <33CCFE438B9DD01192E800A024C84A1928469C@mossbay.chaffeyhomes.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Yes, but you can't expect the masses sign all their email, not yet anyway, so you cannot require cryptographic authentication for mailing lists and services subscriptions (esp. for-profit services that would not like to turn away anyone). That is what you are talking about isn't it? Matt > -----Original Message----- > From: William H. Geiger III [mailto:whgiii at invweb.net] > >What we really need is an automated system that could > >authorize/deny an address prior to the code/password > >being sent that would keep track of distribution list > >addresses and such. > > >Perhaps I'll create one myself soon. > > PGP, Digital signatures, CA's, Authentication, ... This *is* a crypto > related group isn't it? > > How does Thwart, Verisign, or the other CA's handle > authentication of an e-mail address in there low level cert -----BEGIN PGP SIGNATURE----- Version: PGP for Personal Privacy 5.0 Charset: noconv iQA/AwUBNgBgOxU5HlNX4dnFEQKQSACghI+z9TK3uXdAbUQMfX2e+ksuk38An3s9 aV7TVzna/+S+cxFXrOmzoxOW =n91J -----END PGP SIGNATURE----- From lazlototh at hempseed.com Wed Sep 16 05:10:32 1998 From: lazlototh at hempseed.com (Lazlo Toth) Date: Wed, 16 Sep 1998 20:10:32 +0800 Subject: Caligula, My Father, Bill Clinton Message-ID: I think people are finding it much easier to relate to your Mr. Clinton lately... -Lazlo ------------- Caligula, My Father, Bill Clinton by Sam Lipsyte >From Nerve Magazine http://www.nervemag.com/Lipsyte/caligula/ >... > Of course you want her breasts first. I want her breasts first. I >want her in the blue-black dress and I want her breasts first. > I am the President. I've been doing this shit all my life, and I want >her breasts first. I can tell what they will look like already, round and >full and pale with a tiny beautiful vein like a quiet river running to >her heart. I want to squeeze and suckle. That's all I ever really ever >ever wanted. The suits, the speeches, sure, the airplane, sure, but those >fuckers are always after me for more and more of me and this is all I ever >wanted. > I want her ass and her belly and her hair and her lips. > Those fuckers. >... From lazlototh at hempseed.com Wed Sep 16 05:36:27 1998 From: lazlototh at hempseed.com (Lazlo Toth) Date: Wed, 16 Sep 1998 20:36:27 +0800 Subject: Your new password Message-ID: I predict that naughty cypherpunks will use these passwords to repeatedly add the following names to "Schlomo"'s list of contacts: mark at sixdegrees.com webmaster at sixdegrees.com postmaster at sixdegrees.com issues at sixdegrees.com If that doesn't work, really naughty cypherpunks may also add the addresses of prominent journalists. Of course, those things would be WRONG. -Lazlo >Name: Schlomo CyberPoopy >sixdegrees password: linkcusp > >Congratulations Schlomo. You're well on your way to >becoming a full sixdegrees(tm) member. Here is your member >password: linkcusp. Use it to log-in on the home page >at the sixdegrees Web site, http://www.sixdegrees.com. >We'll ask you for a little more information to complete your >registration, and then you'll be ready to start networking. > >It's important that you return to the site and log-in. Your >membership will not be complete until you do so. > >Once you've successfully logged in with your password, just go >to Personal Profile and you'll be able to choose your own >password. > >Thanks for becoming part of sixdegrees. We're looking forward >to seeing you at the site. > >==================================================================== >PLEASE NOTE: All replies to this address are processed by a computer. >If you believe you received this e-mail in error, and it was not your >intention to become a sixdegrees member, or if you have any problems, >questions or requests send an e-mail to issues at sixdegrees.com >and someone will get back to you as soon as possible. >==================================================================== > > >E.SI.BAM.1 From billp at nmol.com Wed Sep 16 05:40:18 1998 From: billp at nmol.com (bill payne) Date: Wed, 16 Sep 1998 20:40:18 +0800 Subject: bill soper & brains Message-ID: <36006423.7B29@nmol.com> Wednesday 9/16/98 6:56 PM Underwood More than 40 years ago Armand [bunky] Larive, I, and others took history of philosphy from bill soper. Laivre is an an episcopal priest in Pullman now. http://www.web-x.com/wazzu.net/restaurantguide/index.html I don't see sopher listed in the faculty directory. http://people.whitman.edu/faculty_homepages.html Sopher invited an attractive articulate lady from the B'Hai religion to lecture our class. The LADY put forth an argument on why we should all believe. In the next lecture Soper, as a philospher should, went into every detail why her arguments were falacious. The contemplation of things as they are, without error or confusion, without substitution or imposture, is in itself a nobler thing than a whole harvest of invention. Francis Bacon I think Lairve was present at the lecture and analysis. I PROFITED FROM YOUR differential equations AND elementary mathematics from an advanced standpoint courses. But this has been about 40 years ago. I still have the books used in your classes. And my education at Whitman. Then, too, I profited from Zirakzaheh's higher alegraba course in the summer of 1958 at U Colorado. Let's hope this gets settled before someone gets NUKED. We know these guys. http://www.wpiran.org/ http://www.taliban.com/ http://www.netlink.co.uk/users/impact/namir/namirm.html And we SPECULATE that they are NOT HAPPY ABOUT WHAT HAPPENED. bill ---- Subject: Politicians, lawyers, and crypto Date: Wed, 16 Sep 1998 16:50:15 -0600 From: bill payne To: john_ashcroft at ashcroft.senate.gov Subject: Politicians, lawyers, and crypto Date: Wed, 16 Sep 1998 16:48:32 -0600 From: bill payne To: senator_leahy at leahy.senate.gov, conrad_burns at burns.senate.gov Subject: Politicians, lawyers, and crypto Date: Wed, 16 Sep 1998 16:46:11 -0600 From: bill payne To: john_kerry at kerry.senate.gov Subject: Politicians, lawyers, and crypto Date: Wed, 16 Sep 1998 16:44:26 -0600 From: bill payne To: info at kyl.senate.gov CC: senator_mccain at mccain.senate.gov, grassley , cynthia mckinney Kyl I am reading http://www.cdt.org/crypto/jonkyl.html Please help get this MESS settled. bill ---- Subject: crypto nonsense Date: Wed, 16 Sep 1998 16:38:25 -0600 From: bill payne To: abd at cdt.org, info at cdt.org, webmaster at cdt.org CHRYSLER AWARD NOMINATION STATEMENT 9/16/9812:50 PM American forefathers drafted the Constitution and laws of our country shortly after having suffered injustice. Fresh in their minds were strategies used by their oppressors. Writers of the Constitution and laws anticipated ways to subvert our system. Therefore, our forefathers designed safeguards into our legal system to prevent future injustice. But these safeguards DON�T appear to be working today. Morales and Payne designed a strategy using the National Security Agency [NSA], Sandia National Laboratories, the US Federal Court System, and publication on Internet to illustrate how the US government has deteriorated. Arthur Morales WAS a supervisor at Sandia Labs in 1991. Morales and Manuel Garcia organized a class action lawsuit on behalf of Hispanics against Sandia. Sandia settled Morales� and Garcia�s lawsuit. Department of Energy acknowledged from Freedom of Information Act [FOIA] requests that as of December 31, 1995 Morales cost Sandia $567,137 in legal fees. Sandia retaliated against Morales. Morales sued Sandia in New Mexico District Court. Morales lost. William Payne wrote a technical report describing �deficiencies� in NSA�s cryptographic algorithms http://jya.com/da/whpda.htm. Sandia transferred Payne to break electronics locks for the Federal Bureau of Invesitgation [FBI]. Payne refused to do illegal work. http://www.jya.com/whp1.htm. Payne sued Sandia in Federal Court. Payne lost and court records were sealed. FBI agent Bernardo Perez led a class action lawsuit against the FBI for race discrimination against Hispanic FBI agents. http://www.usdoj.gov/osg/1995/w951482w.txt Perez won. Perez was assigned agent-in-charge of the FBI in Albuquerque for settlement. But Perez lost money. Morales and Payne learned that the FBI extorted an inexpensive settlement from Perez by telling Perez that the FBI was GUARANTEED to win on appeal in Federal Circuit. With Perez� and others knowledge of circuit courts, Morales and Payne appealed their respective cases pro se to the Tenth Circuit. In Payne�s case Sandia failed to submit its Brief of the Appellees on time. Then falsified its certificate of service when Payne filed to remand. In Morales� case Sandia submitted a deficient Brief of the Appellees which was returned but failed to serve Morales with its brief. Payne and Morales both won at the Tenth Circuit on technicalities. But judges awarded the wins to Sandia. All attempts by Morales and Payne to get copies of the docket for their respective Tenth Circuit cases failed. Therefore, Morales and Payne hatched a plan to get the dockets and expose government misconduct. Payne previously made FOIA requests to NSA for copies of messages and translations given to Iraq during the Iraq/Iran war, copies of Libyan messages intercepted by NSA, and NSA cryptographic algorithms Payne thought contained deficiencies. Morales and Payne sued NSA pro se for the documents. Lawsuit progress was broadcast on Internet through e- mail and http://www.aci.net/kalliste/speccoll.htm http://jya.com/whpfiles.htm And Payne wrote Black and White Test of Cryptographic Algorithms criticizing the US government�s crypto contest. http://zolatimes.com. Morales and Payne FINALLY got copies of dockets from their respective cases from the Tenth Circuit using Internet as an innovative tool. /\/\/\/\/\/\ Date: Wed, 09 Sep 1998 11:08:39 -0700 From: The Electronic Zola To: biru Subject: Re: Interested LATER? Hi Biru, > In > > Non-random Cryptographic Keys Defeat Key Escrow > > I will introduce, by example, readers to deBruijn diagrams and > statistical tests. > Both will be related to random number and pseudorandom number > generation. Sounds good to us. We know mathematics scares our readers. But some of our editors like it just fine. And we don't care much for the Great Satan around here. Cheers, Z --- I am not reading e-mail. From mgering at ecosystems.net Wed Sep 16 05:45:40 1998 From: mgering at ecosystems.net (Matthew James Gering) Date: Wed, 16 Sep 1998 20:45:40 +0800 Subject: Democracy... (fwd) Message-ID: <33CCFE438B9DD01192E800A024C84A192846A1@mossbay.chaffeyhomes.com> > So if a Texas DPS officer pulled over a car from Louisiana he couldn't > hassle them in regards to the pot they had in the car. Even > though it was illegal for Texas citizens. Wow, you learn something new every day. I had always thought state laws applied to anyone in the states borders, not solely to those people declared citizens of that state. In fact if this were the case, why then would it be necessary for the recently bill/proposal allowing people with a valid concealed weapons permit in the jurisdiction in which they work to carry that home (different jurisdiction). In fact wouldn't he need a permit in his home jurisdiction and NOT his work jurisdiction? How could he get a concealed weapons permit in his work jurisdiction if the laws can't apply to him? Surely there is something amiss. Matt From CHerr58414 at aol.com Wed Sep 16 05:47:56 1998 From: CHerr58414 at aol.com (CHerr58414 at aol.com) Date: Wed, 16 Sep 1998 20:47:56 +0800 Subject: software Message-ID: <63f88dc4.36006a60@aol.com> if u got any freeware for encripting and decodeing that would be great so if you can mail me back some info. Thanks From ravage at EINSTEIN.ssz.com Wed Sep 16 05:51:00 1998 From: ravage at EINSTEIN.ssz.com (Jim Choate) Date: Wed, 16 Sep 1998 20:51:00 +0800 Subject: Democracy... (fwd) Message-ID: <199809170216.VAA11232@einstein.ssz.com> Forwarded message: > From: Matthew James Gering > Subject: RE: Democracy... (fwd) > Date: Wed, 16 Sep 1998 18:46:04 -0700 > > So if a Texas DPS officer pulled over a car from Louisiana he couldn't > > hassle them in regards to the pot they had in the car. Even > > though it was illegal for Texas citizens. > > Wow, you learn something new every day. You didn't learn anything because you weren't paying attention. This was supposition based on a strict interpretation of the Constitution. You should try reading *every* word. ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From AIMSX at aol.com Wed Sep 16 05:52:50 1998 From: AIMSX at aol.com (AIMSX at aol.com) Date: Wed, 16 Sep 1998 20:52:50 +0800 Subject: Larry Gilbert, AOLers, and the Hyper-real flamer Message-ID: <5e38fbca.36006a19@aol.com> Hmm... have you ever thought... that my mother may not exactly love the idea of me having access to other people's accounts... so I need to do what she DOES condone? You just don't seem to be using your brain. >Some of them have over 100 accounts on the same ISP, and are >truly so full of shit, that they're swimming in it. Kid, by bullshiting, all >you're doing is enforcing the view that AOL users are really AOLusers. From mmotyka at lsil.com Wed Sep 16 05:58:36 1998 From: mmotyka at lsil.com (Michael Motyka) Date: Wed, 16 Sep 1998 20:58:36 +0800 Subject: Gore, Others on Crypto Policy In-Reply-To: <199809162314.TAA00055@camel14.mindspring.com> Message-ID: <36006D6A.15DF@lsil.com> > Not a word about backdoors, TA, DIRT, keyboard snooping, covert > chip features, compromising emanations, national technical means, > just assurances that the plan satisfies the interests of the protectors. > They sound too satisfied; as if they don't really need domestic controls anymore. I see the references to Cisco and the promotion of GAK. I choose "d) All of the above." Have they been hanging around Intel, Sun and Microsoft lately? I expect also that some key congresspeople have signed up. The recent embassy events may have eased their minds about the Constitution. Isn't this technique referred to as the "We'd have to kill you if we told you but if only you knew what we know..." routine? We can expect some sort of suspension-of-the-Bill-of-Rights-if-crypto-is-involved laws to begin their journey next year. You're free to use any crypto you want to but if we say 'give us the key' you'll be in jail until you do, 1st, 4th and 5th be damned. Isn't that more or less the case with controlled substances? Need a clean machine and an on-line machine now. Copper room. Sneakernet between the two. What is 'TA'? What is 'National Technical Means'? Mike From nobody at sind.hyperreal.art.pl Wed Sep 16 06:23:47 1998 From: nobody at sind.hyperreal.art.pl (HyperReal-Anon) Date: Wed, 16 Sep 1998 21:23:47 +0800 Subject: software Message-ID: <30e187c88ea73d04fcdabbe178de992f@anonymous> On Wed, 16 Sep 1998 CHerr58414 at aol.com wrote: > > if u got any freeware for encripting and decodeing that would be great so if > you can mail me back some info. Thanks > > we gots lotz of hardware for people of ur abillitiez in fact our hardware is really really hard so if u got any pictures of urself that would be great so if you can mail us back some. Thanks LamenessMonger From paulmerrill at acm.org Wed Sep 16 07:10:32 1998 From: paulmerrill at acm.org (Paul H. Merrill) Date: Wed, 16 Sep 1998 22:10:32 +0800 Subject: The AOL Chronicles In-Reply-To: <199809170045.CAA23060@replay.com> Message-ID: <3600A7C2.4322F295@acm.org> I hate to break it to you but, while most are pretty damn clueless, there were some in that list that show that either you should go find a clue (because the thought expressed went right over your head) or you are placing all things which you disagree with in the clueless category. PHM Anonymous wrote: > > Every time one of these AOL wars start, the AOLers claim that there are a > few intelligent people on AOL and that our shunning of them based on > statistics is unjustified. We all know what the statistics are, but I > don't think anybody has done this for Cypherpunks yet. It has been done > other places. This isn't scientific with margins of error and everything, > but it's good enough to illustrate the point. > > I went through every posting originating from AOL which was sent to > Cypherpunks between July and September 16th, which is today. I classified > postings as either "clueful" or "clueless," with the latter determined by > relevance to the list, literacy, quoting, and whether it makes any sense > at all. Anything completely stupid is also classed as "clueless." > "Clueful" is anything which is even remotely relevant to the list, and > includes quoted material if a followup. > > In addition, if an AOL user sends something clueless to the list then gets > flamed, that posting and any subsequent postings in that thread by the > original author are counted as clueless unless it's an apology, at which > point it isn't counted at all. The flames of said user are counted as > defense, not as clueless. Also, if I looked at the message but couldn't > tell what the hell the author was talking about because he didn't bother > to quote, I classed the posting as clueless. > > A "*" denotes that the portion I quote is the entire message. A "+" > denotes that there was either no quoted material in the message or that it > used the "<<>>" style. Keep in mind that messages which are original would > not have quoted material, but still have a "+". A "H" means that it > contained HTML. I removed all new lines from the quotes to make them more > compact. If the posting was large, I quoted only some parts. > > Clueless posts from AOL: > > 1) "At least they have TCP/IP protocols now with Win 95 ex: Hiroshima > 45, Tsjernobyl 86, Windows 95 (Please, correct my spelling if I > misspelled Tsjernobyl)" -- FTPPork at aol.com (Porker), 18 Aug 1998, (+) > > 2) "Ibelive by spooks he ment goverment agents not a racial slur so lay > off." -- ILovToHack at aol.com, 31 Aug 1998, (+*) > > 3) "judy -- how about let's go shopping first and then watch the show > remotely together????" -- Syniker at aol.com, 16 Jul 1998, (+) > > 4) "please i need some suggestions with topics for my informative speech, > or may some infromative speeches already outlined to use it for > refrence. thankyou." -- KMHAsfaha at aol.com, 17 Jul 1998, (*+) > > 5) "d" -- Saxgrim at aol.com, 18 Jul 1998, (*+) > > 6) "send me the book (e/mail me back" -- JackeI466 at aol.com, 19 Jul 1998, > (+*) > > 7) "Hello: My name is Enisa, I'm 13 years old. I write an online e-zine > that for teens. We have over 150+ members. We just started a few days > ago. We are looking for sponsors to sponsor our contests. These are > some of the things we are able to do for you..." -- Craz8Grl at aol.com, > 20 Jul 1998, (+H) > > 8) "you got it?" -- LrdWill at aol.com, 20 Jul 1998, (+*) > > 9) "would love to see info re; international credit cards." -- > TTrump5646 at aol.com, 21 Jul 1998, (+*) > > 10) "i would be very delighted if u gave me a free download for 5.0 > realplayer.if u would send it to mike111495 at aol.com and > indoe29c at aol.com we will be very honored to receive them. thankx and > goodbye" -- Mike111495 at aol.com, 22 Jul 1998, (+*) > > 11) [A bunch of asterisks and screaming] "I was recently informed from > sorces who choose to remain annomous about a viri that uses macafe's > update tool to detect when it is found then it modifys its code and > forms a new strain of the virus this pattern continues although it has > only been tested through a clone of macafees server to 100 mutations > it looks like it could be a big problem I will inform you of any more > information i learn about it but for now "THE TRUTH IS OUT THERE"" > -- ILovToHack at aol.com, 22 Jul 1998, (+*) > > 12) "WHY CANT I FIND ANY WHITE AMERICAN YOUTH ALBUMS ANYWHERE?" -- > koitch at aol.com, 23 Jul 1998, (+*) > > 13) [Subject: Pipe bombs r better] "they rule!" -- Ant6menace at aol.com, 23 > Jul 1998, (+*) > > 14) "Actually, AOL, along with being an acceptable ISP with built in > authentication of sender, has an easily used Mail interface. (Even if > it doesn't exactly follow the standards.)" -- MMerlynne at aol.com, 24 > Jul 1998, (+*), in response to #12. > > 15) "HELLO, IS THERE ANY WAY TO GET MY HANDS ON S BOOK THAT SHOWS THE REAL > BASEBALL PEOPLE AUTOGRAPHS AND THE FAKES SO I KNOW WHAT TO LOOK FOR??? > PLEASE REPLY" -- AT666IND at aol.com, 25 Jul 1998, (+*) > > 16) "I am trying to find my brother, "Allen Thomas Taylor" I am not sure > what year he was born but I think it was l922, l923. We have the same > Father[...]" -- CEr1942929 at aol.com (Christine Ernest), 26 Jul 1998, > (+) > > 17) "Hey: Who made up the term "Politically Correct"? Not Christians and > not Republicans. Your side did. How does wanting a smaller > government, less taxes, the freedom to CHOOSE to pray in schools, the > rights of the un-born( of[...] CHOKE ON IT YOU HYPOCRITE" -- > JBrown4330 at aol.com, 27 Jul 1998, (+) > > 18) "do you have music vinyl stickers , if so , could i get them > wholesale?" -- Babybee390 at aol.com, 29 Jul 1998, (+*) > > 19) "I'm looking for Lynrd Skynrds Freebird on a window sticker for my > car. Do you know where I can find one?" -- Vox9869 at aol.com, 28 Jul > 1998, (+*) > > 20) "More!" -- CLCTCHR at aol.com, 29 Jul 1998, (+*) > > 21) "Can you do a 5 color process? 4x4". Price on 500,1000,1500" -- > ELarson100 at aol.com, 4 Aug 1998, (+*) > > 22) [Subject: whut up] "looking for a place to have some Band stickers > made, can you email me a phone number so we can check out some > prices.....thanks TIm" -- FRETELUCO at aol.com, 6 Aug 1998, (+*) > > 23) "Could you please send me the Anarchy Cookbook.....I really want it > and I cant find it anywhere! Thanx for your help.. Mike Jonhson" -- > XoVoX123 at aol.com, 9 Aug 1998, (+*) > > 24) [Subject: .] "" (Yes, nothing.) -- EpicTeU at aol.com, 9 Aug 1998, (+*) > > 25) "Come on thake it easy on the guy at least he aint on AOL or somthing > stuped." -- ILovToHack at aol.com, 13 Aug 1998, () > > 26) [Subject: Subject: LOL. Made me look] "" (Yes, nothing.) -- > Seabiner at aol.com, 14 Aug 1998, (+*) > > 27) "about: Hello, I am trying to start a VB 32 bit code bank you can send > any code you want to exept codes for aol addons... . 1nce a week most > likely on fridays I will check the hotmail account specifyed below and > I will take all the codes and put them in a txt file and send it to > everyone who sent a code in since I am [...] To send Codes for the ML > Send E-mail to VB32Coders at Hotmail.com In the sbject field write > anonymous / Code topic if you don't want your E-Mail address to show > up when I send the Codes out or else just type the topic of the code > you are sending.. ." -- EpicTeU at aol.com, 14 Aug 1998, (+) > > 28) "Because the American Justice system is screwed up royally... for > instance - Kevin Mitnick... www.KevinMitnick.com" -- FTPPork at aol.com, > 17 Aug 1998, (+*) > > 29) "I am interested in travel between Knoxville, Tennessee and Des > Moines, Iowa. I would also be interested in Nashville, Tennessee and > Des Moines, Iowa or Atlanta and Des Moines, Iowa. Please notify me of > specials in these markets. Thanks, Linda Tisue ltisue at aol.com" -- > Ltisue at aol.com, 18 Aug 1998, (+*) > > 30) "I am looking to distribute a product and I was wondering if you can > tell me how to get mass e mail addresses. I look forward to hearing > from you." -- LHilley488 at aol.com, 19 Aug 1998, (+*) > > 31) "Send me info on how to make a pipe bomb. HoppyF1315" -- > HOPPYF1215 at aol.com (Hoppy Head), 19 Aug 1998, (+*) > > 32) "I take that statement as an insult, and it really isn't true about > all of us AOL users. [...] Actually, some of us know what real hacking > is...[...] Anyway, try not to stereotype people so much, because, with > the Advent of 32 bit AOL, we can actually use all of the TCP/IP > protocols, etc..." -- FTPPork at aol.com, 20 Aug 1998, (+) > > 33) [Subject: anarchy cookbook] "Is any one home?" -- Spazherp at aol.com, 21 > Aug 1998, (+*) > > 34) "I did not say anywhere that 32 bit would fix problems of cluelessness > - or ignorance in your case. I said, it is a little better because we > can now use TCP/IP protocols. Did I ever say that the people on AOL > were smarter because of it? Well, let's go read over that post - - - > nope... I didn't. I think some people should read a little more > carefully, or just don't read at all." -- FTPPork at aol.com, 22 Aug 1998, > (+*) (As I recall, this one was in response to a set of flames which > cited his assertion in #32.) > > 35) [Subject: can you help me make virses please tell me who to make one > step by step] "I need help i want to know how to make a virses in > c\c++ please help me." -- VXF32 at aol.com, 21 Aug 1998, (+*) > > 36) "Tell me how to get tons of free stuff! Thank You ." -- > RAGOD5597 at aol.com, 21 Aug 1998, (+*) > > 37) "Here we go again" -- FTPPork at aol.com, 22 Aug 1998, (+*) > > 38) [Subject: tell me] "hola and good tidings send some info on spooks > please i will be grateful" -- RyanFord at aol.com, 29 Aug 1998, (+*) > > 39) [Subject: h] "how did u do it" -- CRBREW9802 at aol.com, 7 Sep 1998, (+*) > > 40) " HaCkaZ OnlY Da EliTeHelLO YaLL DiS is Da MaDD AAOOLL HaCka Ima > startin a GreWp fOR HaCs Only So In OthA WerDS yA gOttA KnOw The WAreZ > anD HoW toO UsEr FaTe AnD AOL So MaIl Or Im Me FoR Da TeTaIls If YeR > LeeTo K Pe at CE FrOmE The LeeTs HacKJeFFrO)" -- Jrjeffro at aol.com, 9 Sep > 1998, (+*) > > 41) Message quoting the above, which wasn't originally sent to the list, > in "<< >>" style, adding only: "What the hell is this? No wonder why > AOLers have a bad name Im going to Flame this guy" -- EpicTeU at aol.com, > 10 Sep 1998, (+*) > > 42) "Preach on brother =)" -- AIMSX at aol.com, 15 Sep 1998, (+*), copied to > 25 other recipients, plus the list. > > 43) "I read that book" -- AIMSX at aol.com, 15 Sep 1998, (+*) > > 44) "All Creatures Great and Small - that one... =) I also read an Aasimov > a while back in fifth grade - unfortunately, I can't remember even the > name... I need to pick some of his books up again... One book I can > remember reading since 5th grade (and every summer thereafter) is "IT" > by Stephen King - one of his few really good books. I have read it 8 > times since. I greatly recommend it =)" -- AIMSX at aol.com, 15 Sep 1998, > (+*) > > 45) "We are sending you an invitation to be one of our special guests this > year, big harry ass lawsuits are always of interest. Bring a friend > if you like, but I have to warn you, Liberatarians are not welcome. > This years menu includes red meat and poptarts. Clothing is optional. > Sincerely, Beth" -- BUFFU at aol.com, 17 Jul 1998, (+*) > > 46) "That's why I suggest listening to I Robot by Alan Parson's Project." > -- StanSqncrs at aol.com, 18 Jul 1998, (+*) > > 47) "If sombody offers you some FedGov, just say NO!" -- > Nilsphone at aol.com, 23 Jul 1998, (), copied to 32 recipients, including > the list. > > Note the "+" ratings on the below. (Semi-)Clueful postings from AOL: > > 1) "It's the easy way out (and I mean DOWN and OUT)! I mean, if we're > simply going to change them out everytime, why bother to figure out > which ones a going to change them out everytime, why bother to figure > out which ones aren't evil/stupid (I mean, out of all those > politicians, there's got to be 1 or 2! I think. ;-) )? See, if we just > simply change politicians at every chance, then we throw the baby out > with the bathwater, so to speak. The simple solutions aren't always > the best ones." -- StanSqncrs at aol.com, 17 Jul 1998, (+*) > > 2) "ROFLOL! What's coincidental? The latest tune that my band, Nobody's > Business (in which I play bass and sing) has learned, is Cheap > Sunglasses by ZZ Top. If it ain't coinicidence, I got a 'scarecrow' in > my band. " -- StanSqncrs at aol.com, 18 Jul 1998, (+) > > 3) [Subject: Subject: Nomination of Lyndon Larouche to the UNITED NATIONS > OF THE FRINGE] "Hey Punks, As a United Nations OF the Cyber Fringe > Member, I am asking for your input on giving Lyndon a nomination. So > far his war crimes only include[...]" -- BUFFU at aol.com, 20 Jul 1998, > (+) > > 4) "If you would like information about tempest monitors, computers, > printers or secure fax machines, please contact me." -- > CompSec01 at aol.com (Karen Azoff), 22 Jul 1998, (+) > > I gave up at this point because the clueless list just kept growing. The > ratio isn't encouraging, especially since I was being generous with what > is considered a "clueful post." From dbrown at alaska.net Wed Sep 16 07:10:42 1998 From: dbrown at alaska.net (Dave Brown) Date: Wed, 16 Sep 1998 22:10:42 +0800 Subject: A personal response to your email to sixdegrees In-Reply-To: <35FFD638.DB6920D3@sixdegrees.com> Message-ID: <3.0.6.32.19980916190741.00a8eb80@alaska.net> And don't allow them to be listed again.....It'll only piss off more people. --Dave At 10:09 AM 9/16/98 -0700, Declan McCullagh wrote: > >Mark, trust me on this: remove all five cypherpunks addresses from your >lists. > >Really. > >-Declan > > >On Wed, 16 Sep 1998, Mark Salamon wrote: > >> (I was not sure which email address to send this to, as the return >> address was: nobody at replay.com. I also do not know who to address this >> email to.) >> >> I am the WHOIS contact at sixdegrees you sent this email to, and since >> this is a peronal reply to your email, it is certainly NOT spam and I >> would appreciate it if you would take the time to read it and respond. >> >> I am very confused by your email. I understand that you do not wish to >> receive emails from sixdegrees, but it is very easy to solve this >> problem. If anyone ever sponsors you for sixdegrees, simply reply to >> the email and put the word "remove" in the header. (This is pretty >> standard stuff across the Internet, as I am sure you are aware.) If >> that occurs, in the future we will not send emails to the email address >> that received the original email from us. >> >> Unfortunately, if you have many email addresses (as it appears, from the >> bottom of your email), the only way for us to remove each is to have a >> sixdegrees email go to each of these email address accounts and then >> received a "remove" reply to each of these emails. (We have in our >> records references to 5 different cypherpunks email addresses: >> @toad.com, @cypherpunks.net, @cypherpunks.org, @algebra.com, and >> @ssz.com. If you wish for us not to contact you again at any of these >> addresses, we will need to confirm that you in fact control these email >> addresses. The best way for you to do this is to send an email to >> cancel at sixdegrees.com, and ask to have these email addresses removed. >> We will then send a reply to each email address you listed, asking you >> to confirm that you in fact control those email addresses and wish to >> have them removed. Once we receive your confirmation, we will adjust >> our records so you receive no further emails from us to those email >> addresses. For example, if I receive an email from you to this email, I >> will assume that you control the @toad.com email address and I will have >> that removed.) >> >> What is confusing to me is that the email you received from sixdegrees >> (with the subject: Harald Fragner) is one that would be sent ONLY to a >> CONFIRMED sixdegrees user. That means that once upon a time, whether >> you remember or not, you joined sixdegrees (as have over 1,000,000 >> people to date). It also appears that you listed Harald Fragner as a >> contact, and he recently denied his sixdegrees relationship with you. >> Thus, it is not surprising that you would receive emails from >> sixdegrees, as you had registered for our service at one time. (I >> assume that the email address you used to register with sixdegrees was >> the @toad.com one.) >> >> sixdegrees is purely a voluntary service, and if you do not want to >> participate in it, then we are happy to accommodate you. We do not send >> out spam and take great efforts to ensure that no one receives unwanted >> email from us. >> >> I look forward to receiving your reply to this email. >> >> Mark Salamon >> General Counsel >> MacroView Communications Corp. >> >> >> >> Anonymous wrote: >> > >> > On Tue, 15 Sep 1998, the shitheads at sixdegrees spammed the Cypherpunks >> > list with: >> > >> > > Just a quick update from sixdegrees(tm). Unfortunately Harald >> > > Fragner (harald at fragner.net) asked not to be listed as your >> > > contact with sixdegrees. >> > > >> > > We also wanted to make sure you were aware that you currently >> > > have no other confirmed contacts, so it will be hard for you to >> > > have a productive sixdegrees experience. As you probably know, >> > > without any confirmed contacts, you won't get any results from our >> > > networking searches. >> > > >> > > So, we just wanted to recommend that you head over to >> > > http://www.sixdegrees.com , log-in, and go to MY CONTACTS >> > > to list additional relationships. >> > > >> > > >> > > ==================================================================== >> > > PLEASE NOTE: All replies to this address are processed by a computer. >> > > If you have any problems, questions or requests send an e-mail to >> > > issues at sixdegrees.com and someone will get back to you as soon as >> > > possible. >> > > ==================================================================== >> > > >> > > >> > > E.DB.BRESP.3 >> > > >> > > >> > >> > Just a quick update from the Cypherpunks(tm). Fortunately, we don't want >> > anything to do with your worthless, pathetic, spamming selves. We don't >> > want to be your friends and, in fact, we'd prefer it if you would crawl >> > under a rock and die because that seems to be the only way you'll stop >> > spamming our mailing list. >> > >> > We also wanted to make sure that you were aware that you currently have no >> > confirmed redeeming qualities, so it will be hard for you to be taken >> > seriously by those of us who do have a clue. As you probably know, without >> > any redeeming qualities, you will get lots of results every time you send >> > out a batch of spam. >> > >> > So, we just wanted to recommend that you head on over to your bathtub with >> > the rest of your coworkers, fill it up, jump in together, and then drop in >> > a large, plugged-in, turned-on electric heater into the water and remain >> > in until you stop twitching and cardiac activity ceases. >> > >> > C.LU.EFULS.2000 >> > >> > You people don't give a fuck how much excrement you shoot all over the >> > net, so long as you let people know of your pathetic, worthless, >> > disgusting service. If you can get somebody's mailing list to relay your >> > shit for you, so much the better, because then you don't have to >> > personally send it. >> > >> > Sorry, but I've had it with Sixdegrees. I've personally told you idiots >> > very nicely what the Cypherpunks list is, and asked you nicely to stop >> > spamming it. I've personally told you a method to keep people from >> > submitting these addresses to your worthless spam haven. Other people have >> > done the same thing. You haven't fixed it, indicating that you don't care. >> > I'm no longer asking nicely. >> > >> > A copy is being sent to your technical contact, on the assumption that >> > maybe he is a little more responsible, though I doubt it. >> > >> > -- The Cypherpunks List > > cypherpunks@*.cyberpass.net, cypherpunks@*.ssz.com, >> > cypherpunks at algebra.com, and others> >> >> >> >> > > From jpenrod at sihope.com Wed Sep 16 07:15:49 1998 From: jpenrod at sihope.com (Jeff Penrod) Date: Wed, 16 Sep 1998 22:15:49 +0800 Subject: Voices In-Reply-To: <3.0.2.32.19980915190932.007fb350@mailhost.IntNet.net> Message-ID: <199809170307.WAA08854@unix1.sihope.com> At 07:09 PM 9/15/98 -0400, Edwin E. Smith wrote: >I confess that sometimes I troll >for flames to get the dialog going. >To all of you who are offended by what you read or have been attacked >and shirk away I say, stick around, learn and grow. The words which >come to you can not hurt you if you don't let them. If you are to >timid to endure a few flames then woe be unto you if anyone comes at >you with actual violence on his mind. You aren't cscoville at tns-inc.com, are you? Regards, Jeff From 1dbe50n5 at auto.sixdegrees.com Wed Sep 16 07:21:05 1998 From: 1dbe50n5 at auto.sixdegrees.com (sixdegrees) Date: Wed, 16 Sep 1998 22:21:05 +0800 Subject: Nita Daniel Message-ID: <199809170316.UAA00177@toad.com> Just a quick update from sixdegrees(tm). Unfortunately Nita Daniel (machita at gurlmail.com) asked not to be listed as your contact with sixdegrees. We also wanted to make sure you were aware that you currently have no other confirmed contacts, so it will be hard for you to have a productive sixdegrees experience. As you probably know, without any confirmed contacts, you won't get any results from our networking searches. So, we just wanted to recommend that you head over to http://www.sixdegrees.com , log-in, and go to MY CONTACTS to list additional relationships. ==================================================================== PLEASE NOTE: All replies to this address are processed by a computer. If you have any problems, questions or requests send an e-mail to issues at sixdegrees.com and someone will get back to you as soon as possible. ==================================================================== E.DB.BRESP.3 From brianbr at together.net Wed Sep 16 07:22:26 1998 From: brianbr at together.net (Brian B. Riley) Date: Wed, 16 Sep 1998 22:22:26 +0800 Subject: Democracy... Message-ID: <199809170315.XAA26801@mx02.together.net> On 9/15/98 10:27 PM, Jaeger (Jaeger at hempseed.com) passed this wisdom: > >hey, would you care to show us where "seperation of church and state" is >to be found in the constitution/bill of rights? absolute right and >wrong is not a religious belief (necessarily).. your religious beliefs >do not affect the nature of reality. there are absolute truths by [snip] >> Ever heard of seperation of church and state? Democracy? the rights of >> >> the individual? While you certainly have the right to practice your >> religion in what ever manner you so choose demanding that everyone >> else >> does, or that the president of the us of ais subject to you PERSONAL >> faith decisions is outragous The first amendment states only that there shall not be 'an establishment of religion' it says nada about 'separation of church and state.' The intention was simple; that there would never be an 'official' state religion. It didn't say religion had no place. They were escaping a regime with an established state religion that used the goverment to stamp out religious deviationism. That was the sole reason for that clause in the 1st amendment. Brian B. Riley --> http://members.macconnect.com/~brianbr For PGP Keys "...if you drink much from a bottle marked "poison." and it is almost certain to disagree with you, sooner or later" _Alice in Wonderland_: (Lewis Carroll) From bbt at mudspring.uplb.edu.ph Wed Sep 16 07:26:23 1998 From: bbt at mudspring.uplb.edu.ph (Bernardo B. Terrado) Date: Wed, 16 Sep 1998 22:26:23 +0800 Subject: Fwd: I don't care if this is real or not! In-Reply-To: <199809161001.MAA18320@replay.com> Message-ID: On Wed, 16 Sep 1998, Anonymous wrote: > You suck... Die prick, die I second your motion (or is it second the motion, anyway I hate fwd mails it only make my eyes sore). > > > > Crack head wrote: > > > > > > >Received: from 136.148.1.253 by www.hotmail.com with HTTP; > > > Tue, 15 Sep 1998 05:55:15 PDT > > >X-Originating-IP: [136.148.1.253] > > >From: "Dodwell Leung" > > >To: alexccl at hotmail.com, z2181727 at student.unsw.edu.au, > > antonylam at hotmail.com, chonga at sbu.ac.uk, > z2183890 at student.unsw.edu.au, > > lcy at qms.ndirect.co.uk, z2155343 at student.unsw.edu.au, > bahrid at hotmail.com, > > daner at mail.mkv.mh.se, Evert.P.deVries at SI.shell.com, > > harold.tan at mailexcite.com, ivanyip at hotmail.com, catkoo at hotmail.com, > > jennyshek at hotmail.com, BKKsomporb at mail.nomura.com.hk, > > joe621 at netvigator.com, heyloe at hotmail.com, kmyk at hotmail.com, > > kenjess at apanet.com.au, lawhon at hotmail.com, lfan at mail.uoknor.edu, > > 95481624J at hkpucc.polyu.edu.hk, shukai at netvigator.com, > > z2188635 at student.unsw.edu.au, mattgow at hotmail.com, > > z2192026 at student.unsw.edu.au, z2174314 at student.unsw.edu.au, > > Steeve.Genot at wanadoo.fr, hsp996 at hotmail.com, physpot at asiaonline.net, > > pixie_tan at hotmail.com, pooi_lee_chow at hotmail.com, > eeyatir at hotmail.com, > > saralee at chevalier.net, patelsu at sbu.ac.uk, beetch at pacific.net.sg, > > z2188232 at student.unsw.edu.au, simpsonngan at hotmail.com, > > yoon at pacific.net.sg, hamster.sol at lineone.net, stepcom at hkstar.com, > > ext3366 at yahoo.com, tinyau1 at netvigator.com, > z2193851 at student.unsw.edu.au, > > huvl at sbu.ac.uk, z2193612 at student.unsw.edu.au, willmilk at hotmail.com, > > wswinnie at netvigator.com, brackeye at hkstar.com, takleung at wisdom.com.hk > > >Subject: I don't care if this is real or not! But forwarding is not > > hard for me if I help > > >Content-Type: text/plain > > >Date: Tue, 15 Sep 1998 05:55:15 PDT > > > > > > > > >>Received: from 202.184.46.2 by www.hotmail.com with HTTP; > > >> Tue, 15 Sep 1998 01:39:48 PDT > > >>X-Originating-IP: [202.184.46.2] > > >>From: "san san" > > >>To: alanling at usa.net, calviny at mol.net.my, chowpin at edb.gov.sg, > > >chan911 at pc.jaring.my, gary_wang at hotmail.com, junifer at pl.jaring.my, > > >karren at deakin.edu.au, klay at okstate.edu, lkhoong at pc.jaring.my, > > >mcch at hotmail.com, murphy_l at hotmail.com, simfong at pl.jaring.my, > > >stchai at pl.jaring.my, mote at hotmail.com, tlliew at tm.net.my, > > >wthong at pl.jaring.my, dodwellleung at hotmail.com > > >>Subject: Fwd: This is serious PLEEEEEEASE PLEASE DON'T DELETE!!!!! > > >>Content-Type: text/plain > > >>Date: Tue, 15 Sep 1998 01:39:48 PDT > > >> > > >> > > >>>Received: from 202.188.25.160 by www.hotmail.com with HTTP; > > >>> Mon, 14 Sep 1998 06:27:23 PDT > > >>>X-Originating-IP: [202.188.25.160] > > >>>From: "Lim Huey" > > >>>To: alexlimyk at hotmail.com, audrey.looi at mailexcite.com, > > >>kianwah19 at hotmail.com, enyen at hotmail.com, s9812221 at unitele.com.my, > > >>rckj at hotmail.com, seliness at hotmail.com, stanchow at tm.net.my, > > >>bhchua7 at hotmail.com, csheng at rocketmail.com, yoongyow at hotmail.com, > > >>ching20 at hotmail.com, lphoo at hotmail.com, ken_thong at rocketmail.com, > > >>twinsck at hotmail.com, poaysun at yahoo.com, mda97mk at sheffield.ac.uk, > > >>yongqiang13 at hotmail.com, sammy_lee_79 at hotmail.com, > > >>tungweileong at hotmail.com, lifesignx at yahoo.com, elim331 at yahoo.com, > > >>lwloh at hotmail.com, audrey.looi at mailcity.com, sokyee at pc.jaring.my, > > >>kah_kit at hotmail.com, siewgar at hotmail.com, chiane at mailcity.com, > > >>Vvpenguin at hotmail.com, pkleong at hotmail.com, phangf at hotmail.com, > > >>rolandhii at hotmail.com, stjdanzel at hotmail.com, > leesiehui at hotmail.com, > > >>jeennwei at hotmail.com, chouyong at hotmail.com, ttc1979 at yahoo.com, > > >>guatyen at hotmail.com, chonkit at hotmail.com, thongyp at hotmail.com, > > >>soonfung at hotmail.com, tsueyyin at hotmail.com, feiyy at hotmail.com > > >>>Subject: Fwd: This is serious PLEEEEEEASE PLEASE DON'T DELETE!!!!! > > >>>Content-Type: text/plain > > >>>Date: Mon, 14 Sep 1998 06:27:23 PDT > > >>> > > >>> > > >>> > > >>> > > >>>>Date: Mon, 14 Sep 1998 04:25:43 -0700 (PDT) > > >>>>From: CHEW JUNN WENG > > >>>>Subject: This is serious PLEEEEEEASE PLEASE DON'T DELETE!!!!! > > >>>>To: lmoonc at hotmail.com, pvcheo at essex.ac.uk, cwnsim at essex.ac.uk, > > >>>> yoongyow at hotmail.com, lenelene at hotmail.com, > gcping38 at mailcity.com, > > >>>> gthong at rocketmail.com, ching20 at hotmail.com, > > lcchuan at rocketmail.com, > > >>>> moon at tm.net.my, shaohuey at hotmail.com, janelsl at tm.net.my, > > >>>> csheng at rocketmail.com, hwooi at yahoo.com, dianacn at hotmail.com, > > >>>> stjdanzel at hotmail.com, effyjungle at hotmail.com, > > >bus_tard at hotmail.com, > > >>>> lphoo at hotmail.com, yakasaki at hotmail.com, colint79 at hotmail.com > > >>>>Cc: anniesia at hotmail.com, pearlng at hotmail.com, > liangser at hotmail.com, > > >>>> choopar at hotmail.com > > >>>> > > >>>> > > >>>> > > >>>> > > >>>> > > >>>> > > >>>> > > >>>>Hello, my name is David "Darren" Bucklew. I live in > > >>>>Pittsburgh PA where I attend Bethel Park High School > > >>>>and participate in many sports. I have severe > > >>>>ostriopliosis of the liver. (My liver is extremely > > >>>>inflamed). > > >>>>Modern Science has yet to find a cure. Valley > > >>>>Childrens hospital > > >>>>> has agreed to donate 7 cents to the National > > >>>>Diesese Society for every name > > >>>> on this letter.Please send it around as much as you > > >>>>can. > > >>>>Thank you, > > >>>>Darren > > >>>> > > >>>>PS: For those of you who dont take 5 minutes to do > > >>>>this, what goes around comes around. You can help > > >>>>sick people, and it costs you nothing,yet you are too > > >>>>lazy to do it? You will get what you deserve. > > >>>> > > >>>>_________________________________________________________ > > >>>>DO YOU YAHOO!? > > >>>>Get your free @yahoo.com address at http://mail.yahoo.com > > >>>> > > >>>> > > >>> > > >>> > > >>>______________________________________________________ > > >>>Get Your Private, Free Email at http://www.hotmail.com > > >> > > >> > > >>______________________________________________________ > > >>Get Your Private, Free Email at http://www.hotmail.com > > > > > > > > >______________________________________________________ > > >Get Your Private, Free Email at http://www.hotmail.com > > > > > > ______________________________________________________ > > Get Your Private, Free Email at http://www.hotmail.com > > > > > > == > "The same thing we do every night Pinkey, > try to take over the WORLD!" > - The brain > _________________________________________________________ > DO YOU YAHOO!? > Get your free @yahoo.com address at http://mail.yahoo.com > > From Jaeger at hempseed.com Wed Sep 16 07:26:33 1998 From: Jaeger at hempseed.com (Jaeger) Date: Wed, 16 Sep 1998 22:26:33 +0800 Subject: Democracy... In-Reply-To: <35FF220A.F88B87F6@hempseed.com> Message-ID: <36008052.C8B84516@hempseed.com> I reply to this message going point by point, within the original text... so scroll down if you care to read what I wrote.. > AI recently saw a posting about right v. wrong or good v. evil. These > are subjective terms as any good semanticist knows. But what is real Neither good nor evil is subjective to anything... if something is absolutely evil, then there is nothing that will make it good... (and vice versa ) > and what is unreal is a much more difficult thing to determine. It > requires rigorous thinking without prejudice or belief getting in the > way. > As to law. The first of the Bill of Rights says: > > Congress shall make no law respecting an establishment of religion, > or prohibiting the free exercise thereof; or abridging the freedom of > speech, or of the press; or the right of the people peaceably to > assemble, and to petition the Government for a redress of grievances. > > If you are going to quote something, do it fully and accurately. It > isn't that hard and if you don't have a copy of the constitution > laying around then either get one or keep your damn mouth shut until > you know what you are talking about. > as to the above thing about quoting, I agree... > No, the words "seperation of church and state" do not appear but then > neither does "privacy", but it is damn well implied by the 4th > amendment. > I disagree with the above... I'll explain later > Those self-righteous pricks who want bible reading in the schools and > speaking of invalid arguments... might the above be an ad hominem (abusive) attack ?!? > rail against those who recite the 1st amendment either lack > understanding of the term "reading" or are being dishonest by > ditto to my previous comment > insisting that disallowing teachers to read the bible to students is > wrong and that the constitution needs to be amended. Anyone with any > honesty would realize that the first amendment doesn't prohibit bible > reading by students or even bible study in a historical context. It > as for the teachers reading the Bible to their classes, I would agree that that is a violation of the first amendment... however, the Bible is a useful teaching tool as far as understanding history, as much of history is influenced by the Bible or parts of it (the crusades, the inquisition, various countries' foundings/gov't systems, and, of course, the United States' history). Using the Bible in a historical context passes the Lemon test (guidelines laid out by the USSC regarding gov't attitude towards religion) > merely prohibits tax-paid teachers from "respecting an establishment > of religion, or prohibiting the free exercise thereof;". If I see > just one more bible-thumping zealot message about "would you care to > show us where "seperation of church and state" is to be found in the > constitution/bill of rights?" I will be tempted to take him out in > the parking lot and pound sand into the parts which are unaccustomed > to this substance. > okay, so this is a new kind of fallacy... the appeal to a physical threat as a means of winning an argument... great... you seem to be very well rounded in making a variety of false arguments... > I am all for separation of school and state. Show me where in the > constitution/bill of rights everyone is entitled to a theft/tax > funded education. This would solve church and state in schools > I defintiely agree with the above... > wouldn't it. If you don't like your kids getting a non-religious > education from the godless state, you are free to pull them out and > put them into a private school of your choice. But of course it isn't > I was homeschooled for four years...(against my will) > your kids you are worried about is it? It's all those other peoples > kids that aren't getting the benefit of the word of the one true > Christian god that you want to help isn't it! > no, actually it's more the insistence of the schools to present only the humanist approach (which I consider a religion), rather than presenting the facts as they are that bothers me... > Hypocrisy is the Vaseline(tm) of political intercourse! > > Edwin E. Smith > how lovely.... Jaeger From nobody at replay.com Wed Sep 16 07:28:06 1998 From: nobody at replay.com (Anonymous) Date: Wed, 16 Sep 1998 22:28:06 +0800 Subject: No Subject Message-ID: <199809170324.FAA02439@replay.com> "Electronic Security & Counterintelligence" must become pervasive, and this is only possible if we release the private sector from artificial constraints on encryption, and if we return to our democratic foundation, the respect for personal privacy. We cannot regulate this, we can only nurture this fundamental national security arena. TAKEDOWN: Targets, Tools, & Technocracy Robert David Steele http://carlisle-www.army.mil/usassi/ssipubs/stratcon/steele.htm Another excerpt: 2.The greatest obstacle our government faces today in assuring national security and national competitiveness�the cause of causes for conflict and economic loss�is the growing gap between those with power and those with knowledge. From jamesd at echeque.com Wed Sep 16 07:34:33 1998 From: jamesd at echeque.com (James A. Donald) Date: Wed, 16 Sep 1998 22:34:33 +0800 Subject: Clinton--Why I am Chortling In-Reply-To: <199809151339.GAA02542@proxy4.ba.best.com> Message-ID: <199809170333.UAA10220@proxy3.ba.best.com> -- At 06:21 AM 9/15/98 -0700, James A. Donald wrote: > > According to the law applied to normal people, Monica was > > the victim. At 06:15 PM 9/15/98 -0400, Lynne L. Harrison wrote: > What law? This was consensual sex. Female subordinates have no power to consent under current civil law, any more than children do. If a boss has sex with a secretary, he is liable, irrespective of her consent. > > Also according to the law applied to normal people, > > Clinton was required to spill his guts about all of his > > sex life, because some woman sued him, whereas the woman > > suing was completely protected against any questions > > concerning her sex life. > Clinton, like anyone else, is required to tell the truth > when being deposed or testifying in front of a Grand Jury, > i.e., making any statement under oath. But there are limits as to what questions he can ask his accusers, and until recently there were limits as to what question his accusers could ask him. The limits have been abolished for one side, and tightened for the other side. These laws are flagrantly unjust, but the Democrats introduced them and applied them. Feminists supported and continue to support Clinton precisely because he supported and supports laws that he flagrantly broke. If these laws are to be repealed for politicians, they should be repealed for normal people as well. --digsig James A. Donald 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG QB9Z4ortNHgkN9yG7H79cPWyP8aJ14vaNHIzH2mw 4e/ezaLT9rXZibxZ66vyTVK4/ZHHPiLy3k+K5WHn3 ----------------------------------------------------- We have the right to defend ourselves and our property, because of the kind of animals that we are. True law derives from this right, not from the arbitrary power of the omnipotent state. http://www.jim.com/jamesd/����� James A. Donald From 4hce50m3 at auto.sixdegrees.com Wed Sep 16 07:56:20 1998 From: 4hce50m3 at auto.sixdegrees.com (sixdegrees) Date: Wed, 16 Sep 1998 22:56:20 +0800 Subject: serene rebel Message-ID: <199809170349.UAA00533@toad.com> Just a quick update from sixdegrees(tm). Unfortunately serene rebel (serene_rebel at hotmail.com) asked not to be listed as your contact with sixdegrees. We also wanted to make sure you were aware that you currently have no other confirmed contacts, so it will be hard for you to have a productive sixdegrees experience. As you probably know, without any confirmed contacts, you won't get any results from our networking searches. So, we just wanted to recommend that you head over to http://www.sixdegrees.com , log-in, and go to MY CONTACTS to list additional relationships. ==================================================================== PLEASE NOTE: All replies to this address are processed by a computer. If you have any problems, questions or requests send an e-mail to issues at sixdegrees.com and someone will get back to you as soon as possible. ==================================================================== E.DB.BRESP.3 From kriek at bigfoot.com Wed Sep 16 07:57:47 1998 From: kriek at bigfoot.com (Neels Kriek) Date: Wed, 16 Sep 1998 22:57:47 +0800 Subject: Encrypting files. Message-ID: <001201bde1ee$b19c04a0$93060cd1@alien> Try DataSafe. Dunno which algo it uses but easy to use and anything is better than zip ;) www.novastor.com hope this helps -----Original Message----- From: Sunder To: Lars Weitze Cc: Cypherpunks Date: Wednesday, September 16, 1998 18:25 Subject: Re: Encrypting files. >Lars Weitze wrote: >> >> Does anyone now a program for WindozeNT to store encrypted data on harddisk. >> At the moment i use >> ZIP-Files with a Password on them (I now it is not very secure). >> I am living outside USA and do not want any software with backdoors >> ,"masterkeys" or stuff like that. > >http://www.pcdynamics.com/SafeHouse/ > >-- > >=====================================Kaos=Keraunos=Kybernetos============== >.+.^.+.| Sunder |Prying open my 3rd eye. So good to see |./|\. >..\|/..|sunder at sundernet.com|you once again. I thought you were |/\|/\ ><--*-->| ------------------ |hiding, and you thought that I had run |\/|\/ >../|\..| "A toast to Odin, |away chasing the tail of dogma. I opened|.\|/. >.+.v.+.|God of screwdrivers"|my eye and there we were.... |..... >======================= http://www.sundernet.com ========================== > > From bbt at mudspring.uplb.edu.ph Wed Sep 16 08:08:10 1998 From: bbt at mudspring.uplb.edu.ph (Bernardo B. Terrado) Date: Wed, 16 Sep 1998 23:08:10 +0800 Subject: PGP again.... In-Reply-To: Message-ID: I've tried looking for PGP and found many. All are platforms for IBM PC's (using ms dos, windows). Is there one for Sun Sparc and the likes or I'll just run the PGP for PC's in my Sparc (using unix or PC's using unix). (forgive me for my lack of info about PGP and platforms). ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Some people they might say that I'm hard to get to know. I go my own sweet way, well that maybe so. Something about the crowd that makes me walk alone. I never had a need in me to be the party's life and soul. It's me Bernie. metaphone at altavista.net `````````````````````````````````````````````````````````````````````````````` From vznuri at netcom.com Wed Sep 16 08:13:25 1998 From: vznuri at netcom.com (Vladimir Z. Nuri) Date: Wed, 16 Sep 1998 23:13:25 +0800 Subject: SNET: U.S. Patent Programmable subcutaneous visible implant Message-ID: <199809170414.VAA28118@netcom13.netcom.com> From: jeremy.compton at stonebow.otago.ac.nz (Jeremy Compton) Subject: SNET: U.S. Patent Programmable subcutaneous visible implant Date: Thu, 17 Sep 1998 01:35:49 +1200 To: snetnews at world.std.com -> SNETNEWS Mailing List United States Patent 5,638,832 Singer, et. al. Jun. 17, 1997 Programmable subcutaneous visible implant Abstract A subcutaneous implant for displaying various re-programmable information or decorative patterns beneath the surface of the skin of a person or an animal. A biologically inert subcutaneous implant is constructed of a flexible material so as to conform to the skin's surface. The subcutaneous implant includes a battery for providing power to the implant. The subcutaneous implant also includes a receiver for receiving programming information from a user, and a display for displaying the programming information through the skin. Inventors: Singer; Andrew J. (Palo Alto, CA); White; Sean (San Francisco, CA). Assignee: Interval Research Corporation (Palo Alto, CA). Appl. No.: 477,096 Filed: Jun. 7, 1995 Intl. Cl. : A61B 19/00 Current U.S. Cl.: 128/899 Field of Search: 128/897-899, 654 References Cited | [Referenced By] U.S. Patent Documents 4,233,964 Nov., 1980 Jefferts et al. 128/899 5,041,826 Aug., 1991 Milheiser 5,074,318 Dec., 1991 Campbell et al. 5,205,286 Apr., 1993 Soukup et al. 128/899 5,322,034 Jun., 1994 Willham et al. 5,324,940 Jun., 1994 Ekstrom 5,482,008 Jan., 1996 Stafford et al. 128/899 Primary Examiner: Cohen; Lee S. Assistant Examiner: Lacyk; John P. Attorney, Agent or Firm: Brooks & Kushman 19 Claims, 4 Drawing Figures -> Send "subscribe snetnews " to majordomo at world.std.com -> Posted by: jeremy.compton at stonebow.otago.ac.nz (Jeremy Compton) From vznuri at netcom.com Wed Sep 16 08:13:30 1998 From: vznuri at netcom.com (Vladimir Z. Nuri) Date: Wed, 16 Sep 1998 23:13:30 +0800 Subject: SNET: U S Patent: Identification system Message-ID: <199809170415.VAA28178@netcom13.netcom.com> From: jeremy.compton at stonebow.otago.ac.nz (Jeremy Compton) Subject: SNET: U S Patent: Identification system Date: Thu, 17 Sep 1998 01:35:51 +1200 To: snetnews at world.std.com -> SNETNEWS Mailing List United States Patent 5,041,826 Milheiser Aug. 20, 1991 Identification system Abstract A passive integrated transponder (PIT) is attached to or embedded in an item to be identified. It is excited via an inductive coupling from an interrogator. The PIT responds to the interrogator via the inductive coupling with a signal constituting a stream of data unique to the identified item. The signal is in the form of two different frequencies, a shift from one frequency to the second during a bit cell representing a data "one", and a shift from the second frequency to the first frequency representing a data "zero". The responsive signal is then detected and processed for utilization in a data storage or display device. Inventors: Milheiser; Thomas A. (Littleton, CO). Assignee: Destron/IDI Inc. (Boulder, CO). Appl. No.: 481,833 Filed: Feb. 16, 1990 Related U.S. Application Data Division of Ser No. 388,761, Aug. 2, 1989, abandoned, which is a continuation of Ser. No. 165,310, Mar. 8, 1988, abandoned, which is a division of Ser. No 814,492, Dec. 30, 1985, Pat. No. 4,730,188, which is a continuation-in-part of Ser. No. 580,401, Feb. 15, 1984, abandoned. Intl. Cl. : H04Q 1/00 Current U.S. Cl.: 340/825.54; 340/825.69; 375/272; 455/41 Field of Search: 340/825.54, 825.55, 825.69, 825.72, 825.34, 825.94, 572; 455/118, 41; 375/45, 62, 78, 81, 52; 370/53, 112 References Cited | [Referenced By] U.S. Patent Documents 3,109,143 Oct., 1963 Gluth 375/81 3,510,779 May, 1970 Klapper 375/81 3,689,885 Sept., 1972 Kaplan et al. 455/41 X 4,287,596 Sept., 1981 Chari 375/52 X 4,313,033 Jan., 1982 Walker et al. 370/112 X 4,368,439 Jan., 1983 Shibuya et al. 375/62 X 4,388,730 Jun., 1983 Nash et al. 375/81 X Primary Examiner: Weldon; Ulysses Attorney, Agent or Firm: Sirr; Francis A., Hancock; Earl C. 14 Claims, 8 Drawing Figures [USPTO] -> Send "subscribe snetnews " to majordomo at world.std.com -> Posted by: jeremy.compton at stonebow.otago.ac.nz (Jeremy Compton) From vznuri at netcom.com Wed Sep 16 08:13:35 1998 From: vznuri at netcom.com (Vladimir Z. Nuri) Date: Wed, 16 Sep 1998 23:13:35 +0800 Subject: IP: White House decision affects e-mail scrambling software Message-ID: <199809170415.VAA28324@netcom13.netcom.com> From: believer at telepath.com Subject: IP: White House decision affects e-mail scrambling software Date: Wed, 16 Sep 1998 18:17:36 -0500 To: believer at telepath.com Source: Fox News - AP White House decision affects e-mail scrambling software 6.56 p.m. ET (2256 GMT) September 16, 1998 By Ted Bridis, Associated Press WASHINGTON (AP) � The Clinton administration relaxed some restrictions Wednesday on the export of powerful data-scrambling technology � a decision that could help Americans who want to guarantee the privacy of their e-mail and other electronic information. The White House said U.S. companies can begin selling high-tech tools overseas that use the so-called 56-bit Data Encryption Standard or its equivalent, which has an unlocking key with 72 quadrillion possible combinations. The government imposes limits on exports of the most powerful scrambling technology � now anything above 56-bit � because it fears that authorities, even with a judge's permission, won't be able to read the messages of criminals or terrorists. The export limits do not directly affect Americans, who are legally free to use encryption technology of any strength. But U.S. companies are reluctant to develop one version of their technology for domestic use and a weaker overseas version, so they typically sell only the most powerful type that's legal for export, even to Americans. Vice President Al Gore called the new rule's balance between privacy and not helping criminals "probably one of the single-most difficult and complex issues that you can possibly imagine.'' "We must ensure that new technology does not mean new and sophisticated criminal and terrorist activity,'' Gore said. "And we must ensure that the sensitive financial and business transactions that now cruise along the information superhighway are 100 percent safe in cyberspace.'' Privacy advocates, though, derided Wednesday's announcement as a modest step, noting that a non-profit group of researchers demonstrated earlier this summer it can unscramble a 56-bit coded message in just days. Experts have suggested that scrambling sensitive e-mail or online credit-card transactions using less than 90 bits is vulnerable, while most experts consider 128-bit encryption practically unbreakable. Some companies that sell encryption products nonetheless praised the announcement. The president of the Business Software Alliance, Robert Holleyman, called it "a significant improvement over what we have today.'' The administration previously limited the export of 40-bit encryption technology, which has more than 1 trillion combinations. "It's a step but it's a small step,'' said Alan Davidson, an encryption expert for the Washington-based Center for Democracy and Technology. "We're worried that 56 bits is not enough.'' Barry Steinhardt, president of the Electronic Frontier Foundation, a San Francisco-based civil liberties group, said: "We assume this is done to throw a bone to industry at a time when the administration needs all the friends it can get.'' "But it's half a step, and it continues to rely on dangerous technologies,'' he said. The White House also said Wednesday that it will allow U.S. companies to use unlimited-strength encryption to communicate with their subsidiaries in all countries except seven terrorist nations: Iran, Iraq, Libya, Syria, Sudan, North Korea and Cuba. It also agreed to allow U.S. encryption companies to sell the most powerful scrambling tools overseas to insurance companies and health and medical organizations in more than 40 countries. And the administration said it will establish a technical support center for federal, state and local authorities who might be confronted with criminals using encryption. In June, the Electronic Frontier Foundation used a custom-built computer worth less than $250,000 to crack a 56-bit encrypted message in less than three days to win an industry contest. The EFF published a book describing exactly how to build a replica of its code-breaking computer. � 1998 Associated Press. All rights reserved. ----------------------- NOTE: In accordance with Title 17 U.S.C. section 107, this material is distributed without profit or payment to those who have expressed a prior interest in receiving this information for non-profit research and educational purposes only. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml ----------------------- ********************************************** To subscribe or unsubscribe, email: majordomo at majordomo.pobox.com with the message: (un)subscribe ignition-point email at address ********************************************** www.telepath.com/believer ********************************************** From vznuri at netcom.com Wed Sep 16 08:13:36 1998 From: vznuri at netcom.com (Vladimir Z. Nuri) Date: Wed, 16 Sep 1998 23:13:36 +0800 Subject: IP: Digital Biometrics Awarded Rhode Island State Contract Message-ID: <199809170415.VAA28262@netcom13.netcom.com> From: believer at telepath.com Subject: IP: Digital Biometrics Awarded Rhode Island State Contract Date: Wed, 16 Sep 1998 12:00:41 -0500 To: believer at telepath.com Source: PR Newswire http://www.prnewswire.com Digital Biometrics Awarded Rhode Island State Contract DBI Tenprinter 1133S Systems Selected For Rhode Island's Live-Scan Fingerprinting MINNEAPOLIS, Sept. 15 /PRNewswire/ -- Digital Biometrics, Inc. (Nasdaq: DBII) a leader in biometric identification systems integration company, today announced the award of the Rhode Island State contract for an initial order of six TENPRINTER 1133S live-scan fingerprinting systems. These systems will enable police agencies to eliminate the need for the traditional ink method of taking fingerprints, and significantly speed fingerprint processing of criminal and suspected criminal fingerprints with a higher degree of accuracy. Live-scan systems such as the 1133S are special-purpose computer-based systems which capture, digitize and transmit fingerprint images, and provide a significant improvement in image quality and ease-of-use compared to the traditional ink-based method of taking fingerprints. Live-scan systems are used in law enforcement and increasingly in non-law enforcement applications such as employment screening, new employee enrollment, firearms registration, and security screening. James C. Granger, President and Chief Executive Officer of Digital Biometrics commented, "We are very pleased that Rhode Island has chosen DBI for their fingerprinting network. Rhode Island joins the growing list of states that have chosen our live-scan technology." Rhode Island joins Minnesota, Michigan, Ohio, Pennsylvania, Connecticut, Oregon, Nevada, Alabama, Indiana, Illinois, North Carolina, Tennessee, Colorado, California and Virginia as recent U.S. purchasers of Digital Biometrics TENPRINTER Series live-scan fingerprinting systems. Digital Biometrics also supplies live-scan systems to the Scottish Criminal Records Office and has recently won an OEM agreement with TRW for England and Wales. Digital Biometrics is a provider of biometric identification systems and systems integration services. DBI is a leading supplier of computer systems-based products and services for fingerprint capture for law enforcement and commercial applications. In addition, its Integrated Identification Solutions Division delivers total solutions through customized applications and product integration to solve complex information systems problems, including identification problems, in commercial and government markets. SOURCE Digital Biometrics, Inc. �1998 PR Newswire. ----------------------- NOTE: In accordance with Title 17 U.S.C. section 107, this material is distributed without profit or payment to those who have expressed a prior interest in receiving this information for non-profit research and educational purposes only. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml ----------------------- ********************************************** To subscribe or unsubscribe, email: majordomo at majordomo.pobox.com with the message: (un)subscribe ignition-point email at address ********************************************** www.telepath.com/believer ********************************************** From vznuri at netcom.com Wed Sep 16 08:13:43 1998 From: vznuri at netcom.com (Vladimir Z. Nuri) Date: Wed, 16 Sep 1998 23:13:43 +0800 Subject: IP: ****British Police Attempt To Sidestep E-mail Protection Message-ID: <199809170415.VAA28313@netcom13.netcom.com> From: Richard Sampson Subject: IP: ****British Police Attempt To Sidestep E-mail Protection Date: Wed, 16 Sep 1998 14:15:28 -0400 To: "ignition-point at majordomo.pobox.com" ****British Police Attempt To Sidestep E-mail Protection LONDON, ENGLAND, 1998 SEP 16 (Newsbytes) -- By Steve Gold, Newsbytes. Newsbytes' sources have revealed that the Metropolitan Police have been holding a series of low-key discussions with major Internet service providers (ISPs) in the UK, aiming to streamline police access to e-mail and ISP user logs. According to one reliable source, the aim of the discussions is to develop a ground-breaking agreement between the police and ISPs so that, where the police have reasonable suspicion that an individual is sending or receiving e-mail, or downloading images that involve paedophilia, then they can formally request full details of the Internet user's mailbox and system logs, for example, from the ISP in question. While the aim of the project is to avoid the need for police to obtain a formal court order to access the ISP's computer systems, Newsbytes expects there to be a massive outcry from civil libertarian groups, since the police order could well be implemented against anyone with an account with a British ISP. Newsbytes understands that an expose on the police plans will be broadcast on Channel 4 news at 19:00 hours on British television this evening. Newsbytes' sources suggest that British ISPs are under immense pressure to comply with the police system since, if they do not comply and request a court order, the police could theoretically impound their computer systems, effectively putting an ISP out of action, and perhaps business, for an unknown period of time. "While I can understand the police wanting to gain access to Internet users' files who are accessing the Net for paedophile images, this does seem something of a steamroller approach," said one industry source who spoke to Newsbytes after agreeing anonymity. Newsbytes notes that a major flaw exists in the British police's modus operandi for the proposed system, since the e-mail file servers for America Online (AOL) and CompuServe (AOL is the UK's largest ISP) are held in the US. Only the company's sales and support operations are located in the UK. "It will be interesting to see how the management of AOL and CompuServe in the US react to the news that they have to willingly hand over user logs and e-mail files to the British police," said the anonymous source. As has been proven by various cases in the US, the normal legal protection afforded postal and telephone communications by anti- wiretap legislation is not automatically extended to include e-mail. In the UK, it had been thought that the Interception of Communications Act might apply to e-mail, but the law relating to e-mail remains unproven, Newsbytes notes. Reported by Newsbytes News Network, http://www.newsbytes.com . -0- (19980916/WIRES LEGAL, ONLINE/) News provided by COMTEX. [!BUSINESS] [!HIGHTECH] [!INFOTECH] [!PUBLIC+COMPANIES] [!WALL+STREET] [BUSINESS] [COMPUTER] [E-MAIL] [ENGLAND] [GOLD] [INTERNET] [LEGISLATION] [LONDON] [NBY] [NEWS] [NEWSGRID] [ONLINE] [POLICE] [SALES] [TELEVISION] -- ----------------------- NOTE: In accordance with Title 17 U.S.C. section 107, this material is distributed without profit or payment to those who have expressed a prior interest in receiving this information for non-profit research and educational purposes only. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml ----------------------- ********************************************** To subscribe or unsubscribe, email: majordomo at majordomo.pobox.com with the message: (un)subscribe ignition-point email at address ********************************************** www.telepath.com/believer ********************************************** From vznuri at netcom.com Wed Sep 16 08:13:50 1998 From: vznuri at netcom.com (Vladimir Z. Nuri) Date: Wed, 16 Sep 1998 23:13:50 +0800 Subject: IP: Biometrics: SAC Tech: Complete Electronic Security Solution Message-ID: <199809170415.VAA28279@netcom13.netcom.com> From: believer at telepath.com Subject: IP: Biometrics: SAC Tech: Complete Electronic Security Solution Date: Wed, 16 Sep 1998 12:02:58 -0500 To: believer at telepath.com Source: PR Newswire http://www.prnewswire.com SAC Technologies Showcases Complete Electronic Security Solution Company To Unveil Next Generation Biometrics Technology Prototype Product at Security 2001 Conference NEW YORK, Sept. 16 /PRNewswire/ -- SAC Technologies, Inc. (Nasdaq: SACM), a biometrics technology development company, today announced the Company will unveil a manufacturing prototype of its fully integrated solution for electronic security applications through biometrics identification technology at the September 16-17, 1998 Westergaard/Mallon Security 2001 Conference in New York. "A recent survey by the American Society for Industrial Security noted that losses due to intellectual theft have reached almost $300 billion," according to SAC CEO Mr. Barry Wendt. "Computer security is a major concern with electronic commerce, Internet transactions, on-line banking and security in general. Unlike other security measures such as PIN numbers, passwords or tokens which can easily be lost, stolen or forgotten, biometrics technology is based on an individual's physical characteristics, such as a fingerprint, so it requires the physical presence of an authorized user." SAC Technologies, Inc. plans to introduce the next evolution of its SACcat(TM) product at the two-day investment conference. Bundled with 'best of breed' biometrics technology consisting of fingerprint identification, voice verification and facial recognition, SACcat(TM) features software applications of computer log-on, screen-saver, and desktop security and configuration. Additional integrated software applications will include Bio-Key(TM) secured video teleconferencing and video e-mail and SAC_Secure(TM) for selectively encrypting program applications, data files and network communications using Certicom Corp.'s elliptic curve engine. At the heart of SAC's biometric identification technology is the Company's "Vector Line Type" Algorithm (VLTA) considered by some to be the most robust, reliable, scaleable and discriminating algorithm available today. VLTA represents a true paradigm shift from current industry minutiae-based methods of storing and analyzing fingerprints. VLTA processes the entire pattern of the fingerprint to derive a list of vector line types and their associated relationships. These unique characteristics of the fingerprint are subsequently transformed into a vector line type mathematical model or Bio-Key(TM), which is highly unique and easy to process for comparative purposes. Unlike biometric verification (one-to-one matching) processes produced by its competitors which require an additional identifier (pin number, token or password), SAC's technology provides for true, real-time identification (one-to-many) -- the process of comparing the biometric characteristics of an unknown individual against characteristics stored in a database to determine their identity. SAC's certified biometric identification technology can provide the necessary discrimination to determine the identity of a user and thereby insure the integrity of an application by eliminating the possibility of 'aliases' (multiple identities). SAC is the first, and currently remains the only, company in the world to earn the International Computer Security Association's (ICSA) biometric 'identification' certification. "This latest version of the SACcat(TM) product is a 'turn-key,' cost-effective hardware and software biometrics security and convenience solution for individual computer workstations and networks," said Mr. Wendt. "We believe that SACcat(TM) is an ideal complement to computer network security suites provided by such companies as Network Associates, Secure Computing, Check Point and Security Dynamics." "Within a year from now I am convinced that consumers will be asking whether biometrics security is included in their information systems and computer applications. Companies who do not add biometric security to their product offerings will lose market share. Compaq, one of the world's largest providers of PCs, will have a biometrics peripheral product available this fall. Other computer providers could gain competitive advantage by negotiating an exclusive license with the Company to manufacture, embed and distribute SACcat(TM) technology," added Mr. Wendt. Companies interested in SAC Technologies' SACcat(TM) biometric security solution should contact Mr. Barry Wendt at 708-798-9777 or for more information on the Company check out its website at http://www.sacman.com. Safe Harbor Statement Statements contained herein, other than historical data, may be forward-looking and are subject to risks and uncertainties including, but not limited to the Company's ability to successfully integrate its technology with other technologies, and its ability to achieve its sales and marketing plans while effectively managing costs and expenses, as well as those risks set forth in the Company's 10KSB, 10QSB, and other SEC filings. SOURCE SAC Technologies Web Site: http://www.sacman.com �1998 PR Newswire. ----------------------- NOTE: In accordance with Title 17 U.S.C. section 107, this material is distributed without profit or payment to those who have expressed a prior interest in receiving this information for non-profit research and educational purposes only. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml ----------------------- ********************************************** To subscribe or unsubscribe, email: majordomo at majordomo.pobox.com with the message: (un)subscribe ignition-point email at address ********************************************** www.telepath.com/believer ********************************************** From vznuri at netcom.com Wed Sep 16 08:14:21 1998 From: vznuri at netcom.com (Vladimir Z. Nuri) Date: Wed, 16 Sep 1998 23:14:21 +0800 Subject: IP: Redesigned $20 Bills Debut Sept. 24 Message-ID: <199809170415.VAA28233@netcom13.netcom.com> From: believer at telepath.com Subject: IP: Redesigned $20 Bills Debut Sept. 24 Date: Wed, 16 Sep 1998 10:08:59 -0500 To: believer at telepath.com Source: Department of Defense http://www.defenselink.mil/news/Sep1998/n09151998_9809157.html [Note: Images at this site if you want to look at the new bill.] Redesigned $20 Bills Debut Sept. 24 By Rudi Williams American Forces Press Service WASHINGTON - The government rolls out its new redesigned high- tech, tough-to-copy $20 bill worldwide Sept. 24. Revamped $50 and $100 notes are already in circulation. The $20 bill, though, is key to thwarting counterfeiters, because it's the most widely circulated "big bill" and the most counterfeited, Secret Service spokeswoman Chaun Yount said. The Secret Service -- the organization that guards the president -- is the Treasury Department unit that oversees counterfeiting issues. Both sides of the redesigned $20 bills include numerous anti-counterfeiting measures, she said. Security features include embedded threads with micro-printing; a watermark; a large, off-center portrait of President Andrew Jackson with micro-printed words and hard-to-copy engraved details; the Federal Reserve seal; and color-shifting ink. Yount said people are the first line of defense against counterfeiting. People need to be familiar with the new twenties because they'll be seeing a lot of them, she said. According to U.S. Treasury figures, the mints print $20 notes in numbers second only to $1 notes. "We always have $20 bills in our pocket, if we're lucky," she noted. "The general public pays little attention to the $20 bill because it's the most commonly used note. Counterfeiters look at that as an opportunity. They like twenties because of their 'nice profit margin'" -- they have the highest face value that doesn't draw most people's attention, and passable fake twenties cost no more to make than fake fives and tens. "People who are passing counterfeit money are looking for a high volume of cash," she said. "They target people who are rushed and don't take time to authenticate the bills." She said military people are not typical targets of counterfeiters. However, the Treasury Department has been working with possible targets, such as the military exchange services, to train employees on the look and security features of the new $20 bill. In 1995, $231 million worth of counterfeit U.S. money was seized worldwide, Yount noted. That dropped to $64 million in 1996 and 1997 after the similarly redesigned $100 and $50 notes were introduced. She said the new notes will spread as fast as financial institutions order $20 bills and circulate them. "So for some time, the old and new $20 bills will circulate at the same time," she noted. "As the old $20 bills wear out, they'll be replaced with the new ones. The life of a $20 bill is about two years." Treasury officials are working on new, high-tech $1, $5 and $10 notes with anti-counterfeiting features. For more information about redesigned U.S. currency, visit the Treasury Department Web sites at www.treas.gov or www.moneyfactory.com/currency/20.cfm. [IMAGE} Security features on the front of the new $20 note include an embedded security thread; a large, off-center portrait of President Andrew Jackson; the Federal Reserve seal; and color-shifting ink. U.S. Treasury Department [IMAGE} The backside of the new $20 note contains fine-line printing patterns; an easy-to-read large $20 numeral; and an embedded security thread. U.S. Treasury Department ----------------------- NOTE: In accordance with Title 17 U.S.C. section 107, this material is distributed without profit or payment to those who have expressed a prior interest in receiving this information for non-profit research and educational purposes only. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml ----------------------- ********************************************** To subscribe or unsubscribe, email: majordomo at majordomo.pobox.com with the message: (un)subscribe ignition-point email at address ********************************************** www.telepath.com/believer ********************************************** From vznuri at netcom.com Wed Sep 16 08:18:07 1998 From: vznuri at netcom.com (Vladimir Z. Nuri) Date: Wed, 16 Sep 1998 23:18:07 +0800 Subject: SNET: Satellite offers spy pictures by credit card Message-ID: <199809170415.VAA28196@netcom13.netcom.com> From: jeremy.compton at stonebow.otago.ac.nz (Jeremy Compton) Subject: SNET: Satellite offers spy pictures by credit card Date: Thu, 17 Sep 1998 03:06:46 +1200 To: snetnews at world.std.com -> SNETNEWS Mailing List http://www.mcs.net/~lpyleprn/jpfo.html <- Looks like a noble effort [jpfo at prn-bbs.org] JFPO Jews for Preservation of Firearms Ownership "The illegal we do immediately. The unconstitutional takes a little longer." --Henry Kissinger TODAY's COMMUNIQUE ================== Satellite offers spy pictures by credit card ============================================ First a little on the handy... BIG BROTHER WATCHING Has anybody thought about the fact why Goverments are pushing the GSM-Handys so much. More and more people will change over to the "handy" Handy, not thinking that this system is utterly unsafe. There are various A5 chips build-in which supposed to encrypt the conversation between the Handy and the nearby station. This encryption - if there is any at all - can be switched off and is a 4 Bit Kode which can be cracked in Minutes. But the biggest danger was exposed by the (Swiss) Berner Sonntagszeitung which wrote that the Swisscom - which really belongs to AT&T or another US-company (a subsidiary of the CIA/MOSSAD) is collecting data from every GSM-User and the movement of the owner for at least 6 Months (Bewegungs-Profile). The owner of a GSM Handy can be located with the GPS (General Position System and Sattelites) within few Meters, no matter if he uses the Phones or not. The complete German Text (article) you will find on the Ostara-Website http://www.ostara.org/autor/gsm.txt The question is now what can we do, because the same "big brother" things are going on everywhere and nobody knows who is exchanging data with whom. Not only the owner of the GSM will be recorded, but also the telefon Nr. of the receiver. And this warning goes even more for people using ISDN which is no problem to hack into. The Story of the LOTUS-NOTES where the US-Goverment holds the decryption key is well known by now - hopefully. If you have to use a Handy, use a anonymous Credit-card Handy where you can buy the cards in any communication shop with cash (no bankcredit-card). 30.12.1997 fwd from: Satellite offers spy pictures by credit card By Robert Uhlig, Technology Correspondent Electronic Telegraph UK. THE first civilian spy satellite will soon allow anyone with a credit card to peek into a neighbour's garden or a highly secret military base for as little as engl. Pounds 200,- EarlyBird 1, the first commercial spacecraft to use recently declassified spy technology, was successfully launched from a military base in eastern Russia last week, ending the 40-year monopoly of the world's most advanced military and intelligence services on gathering high-resolution pictures from space. EarthWatch Inc, the satellite's owner, confirmed yesterday that, subject to a last calibration and alignment test, it was ready to start broadcasting clandestine pictures from its orbit 295 miles above Earth. With the exception of the governments of Cuba, North Korea, Libya, Iraq and Iran, anybody can order highly-detailed images from anywhere in the world, for as little as 31.80 per square foot, subject to a 3200 minimum order. The sharpest commercial satellite images available now capture features no smaller than 33ft across, good enough for media pictures of the Tiananmen Square massacre but not detailed enough for covert examinations of neighbours' activities. However, once EarlyBird 1 starts taking pictures, customers will be able to control it via the Internet and place orders for black-and-white pictures that will show features as small as 10ft across. EarthWatch promises that pictures will be taken and sent to customers within two days of receiving the target co-ordinates. "It's detailed enough to distinguish a car from a truck, or to measure the size of a neighbour's extension," said Bob Wientzen, an EarthWatch spokesman. Colour pictures will also be offered, but with a resolution of only within 45ft. Most of the time, the satellite is expected to focus on targets related to town planning, map-making, disaster relief or mining. It will also allow the media and the public to scrutinise environmental and military crises. Some industry experts expect the biggest customers to be foreign governments and intelligence agencies who do not have access to spy satellite networks of their own. Companies in India, Israel, Russia, China and America plan to launch a further generation of spy satellites capable of distinguishing objects with a diameter of about three feet. --=====================_883451814==_-- http://TeamInfinity.com/~ralph/dl.html Electric Eye in the Sky is a song by ? [Take a guess] ====================================== The lyrics go like this. Electric Eye Up here in space I'm looking down on you. My lasers trace Everything you do. You think you've private lives Think nothing of the kind. There is no true escape I'm watching all the time. I'm made of metal My circuits gleam I am perpetual I keep the country clean. I'm elected, electric spy I'm protected, electric eye. Always in focus You can't feel my stare. I zoom in on you You dont know I 'm there. I take a pride in probing all your secret moves My tearless retina takes pictures that can proof. Electric eye, in the sky Feel my stare, always there There's nothing you can do about it. Develop and expose I feed upon your every thought And so my power grows. Protected... Detective... Electric Eye... If you would like to hear this song, please ask. In our neck of the woods, We have a new system called "Aggressive Driving Imaging" but the state will not divulge details of this system to us. I thought we paid their salaries, etc, how can they "not disclose the details of the system to us". With the numerous "Red Light" cameras ($50,000 a piece $5000 to install) up that automagically mail tickets to the OWNER of the car that ran the light, you will have friends and family (who borrowed the car) being forced to testify against themselves to prevent the owner from being deprived of his property. Since same cannot be forced to bear witness against themself, where is the due process that must precede the taking of the owners property, however small it may start out to be ? Keep in mind that if there is no victim there is no crime, and that you should always be able to face your accuser, and that the state cannot sue or be sued, fair is fair right ? i.e. the plaintiff MUST be an individual of flesh and blood. Also the right to travel by the means available in your day, is a RIGHT, not a priviledge, and as such CANNOT be licensed or taxed or infringed in any manner whatsoever against your will if noncommercial. (SEE: http://TeamInfinity.com/~ralph/dl.html) And how are eye level camera shots of people in their cars legal when there is NO PROBABLE CAUSE and no SIGNED SPECIFC WARRANT !? http://www.bts.gov/smart/cat/images/274/274F1.GIF Some urls to explore: http://webserv.dot.co.montgomery.md.us/jpgcap/camintro.html http://www.atmsonline.com (latest in this sick industry) http://www.truckers.com/trafcam.htm http://www.dcn.com/usa.html http://www.bts.gov/smart/cat/images/274/274F1.GIF http://TeamInfinity.com/~ralph/dl.html Looking for more maps of exact locations of these cameras and police state devices so we can share them with others and compile an exhaustive inventory of them. We should be allowed to know where the NO-PRIVACY ZONES ARE and start letting others know the scope breadth and depth. CAUGHT You used to watch television. Now it watches you. By Phil Patton _________________________________________________________________ It's early morning in the 'burbs. My eyes are barely open, but the video eye is on me. I stop by the convenience store for coffee and newspapers. On the grainy screen of a boxy monitor behind the clerk, I catch a glimpse of a tiny figure that, after a moment, I realize represents me. Opening my wallet reminds me that I'm as short of cash as usual, so I stop at the ATM. Through a one-way mirror, a video camera is recording the transaction. I drive along New Jersey's Route 3 toward New York City, quite possibly under the video observation of the New Jersey State Police, my state being one of several that have tested remote stations that capture radar-gun readings and license-plate numbers and mail out speeding tickets. As I descend the dread "helix" into the Lincoln Tunnel, I go on TV for Panasonic. Atop a huge billboard advertising the company's camcorders is the "Panasonic Traffic Cam," an absurdly tiny device that perches like an insect above a sign bearing the face of a white-knuckled driver. The driver looks a bit like the late John Candy - all exasperation as the kids behind him quibble and scream. I can tune the radio to 1010 WINS to hear what the camera sees: in a cunning marketing tie-in, I get "reports from the Panasonic Traffic Cam high above the helix - there's a 15 minute delay at the Lincoln...." CUT, if you would like to read the rest of this ESQUIRE MAGAZINE Article, let me know and I will forward it to you... ralph Phil Patton (pattonp at pipeline.com) is a contributing editor to Esquire. He is the author of Made in the USA. ------------------------------------------------------------------------ Write Peter.Navy at Rocketmail.com to find the BLOCKBUSTER suppressed book: "Tragedy & Hope" by Carroll Quigley ------------------------------------------------------------------------ To find out how to get the suppressed hush hush 384 page BLOCKBUSTER book: "FINAL JUDGEMENT" by Michael Collins Piper, that argues that ISRAEL's MOSSAD murdered President John F. Kennedy, or Myron Fagan's tapes, contact peter.navy at rocketmail.com and ask for a FREE copy of The SPOTLIGHT. --------------------------- TO RECEIVE email from ralph: send email to ralph at TeamInfinity.com and in the Subject make sure your email address and the word GO-RALPH (no spaces) is in the subject. TO STOP RECEIVING email from ralph: send email to ralph at TeamInfinity.com and in the Subject make sure your email address and the word WHOA-RALPH (no spaces) is in the subject. -> Send "subscribe snetnews " to majordomo at world.std.com -> Posted by: jeremy.compton at stonebow.otago.ac.nz (Jeremy Compton) From f8de50l5 at auto.sixdegrees.com Wed Sep 16 08:23:28 1998 From: f8de50l5 at auto.sixdegrees.com (sixdegrees) Date: Wed, 16 Sep 1998 23:23:28 +0800 Subject: Isaac Lee Message-ID: <199809170418.VAA00935@toad.com> Just a quick update from sixdegrees(tm). Unfortunately Isaac Lee (zac at pulp-fiction.com) asked not to be listed as your contact with sixdegrees. We also wanted to make sure you were aware that you currently have no other confirmed contacts, so it will be hard for you to have a productive sixdegrees experience. As you probably know, without any confirmed contacts, you won't get any results from our networking searches. So, we just wanted to recommend that you head over to http://www.sixdegrees.com , log-in, and go to MY CONTACTS to list additional relationships. ==================================================================== PLEASE NOTE: All replies to this address are processed by a computer. If you have any problems, questions or requests send an e-mail to issues at sixdegrees.com and someone will get back to you as soon as possible. ==================================================================== E.DB.BRESP.3 From nobody at replay.com Wed Sep 16 08:23:51 1998 From: nobody at replay.com (Anonymous) Date: Wed, 16 Sep 1998 23:23:51 +0800 Subject: No Subject Message-ID: <199809170420.GAA06902@replay.com> Run hands through hair. Tighten clothing on each arm using the opposite hand. Pull excess clothing around chest tight around chest, then pull clothing forward. Sweep back of hand through cleavage and under breasts. Loosen belt and sweep fingers through belt-line front to back. Use back of hand to sweep down zipper-line. Search legs using hands making very slow movements. Loosen shoes and sweep fingers through top of shoes. The president? No, the air force, searching personnel during 'Peace'. http://call.army.mil/call/trngqtr/tq2-99/hutton3.htm and cars: http://call.army.mil/call/trngqtr/tq2-99/hutton2.htm From bill.stewart at pobox.com Wed Sep 16 09:04:10 1998 From: bill.stewart at pobox.com (Bill Stewart) Date: Thu, 17 Sep 1998 00:04:10 +0800 Subject: DARPA Hires NetAss/TIS TO Develop Secure DNS In-Reply-To: <2.2.16.19980827140054.0dd7abc4@mailer.packet.net> Message-ID: <3.0.5.32.19980916190027.008d4dc0@idiom.com> This is somewhat tacky. SecureDNS exists, and TIS got export approval a while back to publish a "bones" version, minus encryption routines. John Gilmore and his lawyer decided that, since it only does authentication, not message encryption, it should be ok to publish _with_ the crypto algorithms, and it's been quietly sitting on his web pages. Recently the Feds sent him a letter saying "Oh, no, we didn't mean it was OK to publish/export this encryption-based authentication system just because the law says you can, so stop it".... Now they're paying for another version. Are they going to try something DSS-based instead of RSA, just so you don't need encryption-capable crypto with it, or is this going to be another scam? Or is it just different parts of the Feds not talking to each other? At 08:57 AM 8/28/98 -0400, Robert Hettinga wrote: >At 1:57 PM -0400 on 8/27/98, Edupage Editors wrote: >> DARPA LEADS FIGHT AGAINST DOMAIN-NAME HACKERS >> The Defense Advanced Research Projects Agency (DARPA) has awarded a $1.4 >> million contract to Network Associates to develop a cryptographic >> authentication system for the Internet's domain-address system. The new >> system will enable the Net's routing points to verify the origin of any >> given Web page, preventing hackers from corrupting Web page caches or >> rerouting domain traffic altogether. It will not, however, prevent hackers >> from breaking into individual Web servers and changing pages. "That's not >> part of this particular approach," says the director of Network Associates' >> TIS Labs. The company is working with the Internet Software Consortium, >> which will distribute the security system to Unix vendors when it becomes >> commercially available. Beta versions are expected to be ready in about six >> months, with a final product on the market in about 18 months. (TechWeb 26 >> Aug 98) Thanks! Bill Bill Stewart, bill.stewart at pobox.com PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639 From jamesd at echeque.com Wed Sep 16 09:04:50 1998 From: jamesd at echeque.com (James A. Donald) Date: Thu, 17 Sep 1998 00:04:50 +0800 Subject: LAST WORD: Re: Clinton--Why I am Chortling In-Reply-To: <3.0.5.32.19980915212954.008c0100@idiom.com> Message-ID: <4.0.2.19980916214403.00b11d50@shell11.ba.best.com> -- At 05:57 AM 9/16/98 -0400, Lynne L. Harrison wrote: > A woman who comes on to her male employer and, when he > accepts her "invitation", cannot turn around and allege: > "Poor me. I was a victim. He is so powerful." Yet no one seems to have any problem with this rule being applied to CEOs, only a problem with it being applied to presidents. --digsig James A. Donald 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG 2aVP9ftnkz+0wn/kd/N9HGp1JPE41U0bVQsUpt+h 467+NY0mNvo4pZtKEh4Iv9geyZ8ZmQ3GI4jFYWSxJ ----------------------------------------------------- We have the right to defend ourselves and our property, because of the kind of animals that we are. True law derives from this right, not from the arbitrary power of the omnipotent state. http://www.jim.com/jamesd/����� James A. Donald From yjia at sz.utl.com.hk Wed Sep 16 09:16:04 1998 From: yjia at sz.utl.com.hk (Jia Yan) Date: Thu, 17 Sep 1998 00:16:04 +0800 Subject: PGP again.... Message-ID: <00b101bde1f9$da5b1330$e600005e@kenix_pdc.sz.utl.com.hk> ftp://net-dist.mit.edu -----Original Message----- From: Bernardo B. Terrado To: cypherpunks at toad.com Date: Thursday, September 17, 1998 11:50 AM Subject: PGP again.... >I've tried looking for PGP and found many. >All are platforms for IBM PC's (using ms dos, windows). > >Is there one for Sun Sparc and the likes or I'll just run the PGP for >PC's in my Sparc (using unix or PC's using unix). > >(forgive me for my lack of info about PGP and platforms). > > > > > > > > > > > > > >~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~~~ >Some people they might say that I'm hard to get to know. >I go my own sweet way, well that maybe so. >Something about the crowd that makes me walk alone. >I never had a need in me to be the party's life and soul. > >It's me Bernie. >metaphone at altavista.net >``````````````````````````````````````````````````````````````````````````` ``` > > From euee50v0 at auto.sixdegrees.com Wed Sep 16 09:41:04 1998 From: euee50v0 at auto.sixdegrees.com (sixdegrees) Date: Thu, 17 Sep 1998 00:41:04 +0800 Subject: Your new password Message-ID: <199809170534.WAA01624@toad.com> Name: monkeyboy cypher-prik sixdegrees Password: leapsink In response to your request for a new sixdegrees(tm) password, we have sent you the following temporary password: leapsink. As soon as you come to the site, http://www.sixdegrees.com , and use it to log-in on the home page, it will become your official password, and your old password will be deactivated. (If you end up remembering your old password and use that to log-in at the site before using this new temporary password, the temporary password will be deactivated.) This may seem wacky, but it's for your security. And, either way, once you successfully log-in at the site, you can go to your personal profile and choose whatever password you like - in fact, we encourage you to do so. If you never requested a new password and got this message in error, just continue using your old password and e-mail us at issues at sixdegrees.com. ==================================================================== PLEASE NOTE: All replies to this address are processed by a computer. If you have any problems, questions or requests send an e-mail to issues at sixdegrees.com and someone will get back to you as soon as possible. ==================================================================== E.SI.REQPW.1 From alan at clueserver.org Wed Sep 16 09:49:24 1998 From: alan at clueserver.org (Alan Olsen) Date: Thu, 17 Sep 1998 00:49:24 +0800 Subject: DARPA Hires NetAss/TIS TO Develop Secure DNS In-Reply-To: <3.0.5.32.19980916190027.008d4dc0@idiom.com> Message-ID: On Wed, 16 Sep 1998, Bill Stewart wrote: > > This is somewhat tacky. SecureDNS exists, and TIS got export approval > a while back to publish a "bones" version, minus encryption routines. > John Gilmore and his lawyer decided that, since it only does authentication, > not message encryption, it should be ok to publish _with_ the crypto > algorithms, and it's been quietly sitting on his web pages. > Recently the Feds sent him a letter saying "Oh, no, we didn't mean > it was OK to publish/export this encryption-based authentication system > just because the law says you can, so stop it".... > Now they're paying for another version. Are they going to try something > DSS-based instead of RSA, just so you don't need encryption-capable > crypto with it, or is this going to be another scam? > Or is it just different parts of the Feds not talking to each other? Maybe they suddenly felt the need to be able to backdoor DNS hijacking. (Maybe the reason TIS is involved...) alan at ctrl-alt-del.com | Note to AOL users: for a quick shortcut to reply Alan Olsen | to my mail, just hit the ctrl, alt and del keys. From mclow at owl.csusm.edu Wed Sep 16 10:04:37 1998 From: mclow at owl.csusm.edu (Marshall Clow) Date: Thu, 17 Sep 1998 01:04:37 +0800 Subject: DARPA Hires NetAss/TIS TO Develop Secure DNS In-Reply-To: Message-ID: >This is somewhat tacky. SecureDNS exists, and TIS got export approval >a while back to publish a "bones" version, minus encryption routines. >John Gilmore and his lawyer decided that, since it only does authentication, >not message encryption, it should be ok to publish _with_ the crypto >algorithms, and it's been quietly sitting on his web pages. >Recently the Feds sent him a letter saying "Oh, no, we didn't mean >it was OK to publish/export this encryption-based authentication system >just because the law says you can, so stop it".... >Now they're paying for another version. Are they going to try something >DSS-based instead of RSA, just so you don't need encryption-capable >crypto with it, or is this going to be another scam? >Or is it just different parts of the Feds not talking to each other? > Delay is the deadliest form of denial. -- Marshall Marshall Clow Adobe Systems "I predict future happiness for Americans if they can prevent the government from wasting the labors of the people under the pretense of taking care of them." --Thomas Jefferson From N.Robidoux at massey.ac.nz Wed Sep 16 10:09:45 1998 From: N.Robidoux at massey.ac.nz (Nicolas Robidoux) Date: Thu, 17 Sep 1998 01:09:45 +0800 Subject: CAD $ In-Reply-To: <199809161614.MAA06660@cti06.citenet.net> Message-ID: <9809170556.AA07174@ma-kaka.massey.ac.nz> I will, in the next few days, see if there is a way I can get money this fast. I have a margin of credit at LL, so I could use that with my investements as collateral and reimbursement. I need to get myself sane and physically well, and this is not totally trivial. My boss, besides, is in his usual pre-bitching mood. So I need to watch out. nicolas From mixmaster at remail.obscura.com Wed Sep 16 10:40:48 1998 From: mixmaster at remail.obscura.com (Mixmaster) Date: Thu, 17 Sep 1998 01:40:48 +0800 Subject: radio net Message-ID: <577cde4f1b43b42c6f5bac07a97ab122@anonymous> On Thu, 10 Sep 1998, Robert Hettinga wrote: > > Hey, guys, > > Someone here already said it, but nobody else got it, so I'll repeat it: > SSB, or Single Sideband. It's commercial ham radio, if you will, and all > the ships use it. I expect that you can shove anything down an SSB set that > you want, including encrypted traffic. > > Ham radio is a government nerd subsidy, and as such, doesn't do much but > make more government funded/sactioned/approved/whatever nerds. :-). > > SSB would do just fine. It's an international standard, after all, and > probably not under the control of any one government, even.e Do you need a license for that one? Can someone explain what exactly the sidebands are? It rings a bell and I used to know, but it's been around 15 years since I played with this kind of thing. It's just under the surface of my brain, but I just can't place it. From stuffed at stuffed.net Thu Sep 17 01:46:24 1998 From: stuffed at stuffed.net (STUFFED NEWS DAILY) Date: Thu, 17 Sep 1998 01:46:24 -0700 (PDT) Subject: CLINTON SPECIAL ISSUE: The Oval Orifice/Clinton Sex Therapy/Multi-taskwinsky Message-ID: <19980917071001.17270.qmail@eureka.abc-web.com> We're having an impeachy time digging up the dirt and bringing you all the latest stories from Bubbagate! And in case you missed our erection coverage yesterday don't forget to check it out after you've read today's issue. GIVE THAT MAN A CIGAR! IN TODAY'S ISSUE: 30 NEW EXTRA HOT JPEGS! 5 NEW SIZZLING STORIES NIPPLED SALES MULTI-TASKWINSKY HOW TO KISS YOUR BABE GOOD-BYE THE BEST OF EUREKA! MASO-CASTING CALL CLINTON SEX THERAPY NICOLE KIDMAN'S TITS GRANNY PORN THE OVAL ORIFICE MUCH MORE! ----> http://stuffed.net/98/9/17/ <---- Welcome to today's issue of Stuffed. To read it you should click on the URL above. If it is not made clickable by your email program you will need to use your mouse to highlight the URL, copy it and then paste it into your browser (then press Return). This email is never sent unsolicited. Stuffed is the supplement for the Eureka newsletter you subscribed to. Full instructions on unsubscribing are in every issue of Eureka! ----> http://stuffed.net/98/9/17/ <---- From nobody at seclab.com Wed Sep 16 11:31:28 1998 From: nobody at seclab.com (User of DOOM) Date: Thu, 17 Sep 1998 02:31:28 +0800 Subject: Predictions: Crime and Criminal Justice in the 21st Century Message-ID: <199809170730.JAA08534@rogue.seclab.com> Predictions: Crime and Criminal Justice in the 21st Century 1. The United States will experience a significant economic recession/crisis very close to the turn of the Century. 2. As the large pool of young people born in the early 1990s become teenagers and young adults, there will be a dramatic increase in violent crime around the year 2005-2010. 3. America will experience sporadic civil disorders/riots in many of its urban areas during the next 10-15 years -- much of it related to racial/ethnic problems. 4. Terrorist acts by "fringe"/special issue groups will increase at a significant rate -- becoming a major law enforcement and security problem. 5. As faith in the criminal justice system declines, there will be a rise in vigilante-based incidents where citizens take the enforcement of crime problems into their own hands. 6. Much of middle- and upper-class America will take a "retreatist" attitude and move into private high-security communities located in suburban or rural areas. Because of technological advances, many companies and corporations will also move out of the urban environments as well. 7. Due to many of the predictions listed above, much of law enforcement and security in the 21st Century will become privatized and contractual. Traditional law enforcement agencies will primarily serve urban and rural communities. 8. Law enforcement will evolve into two major and divergent roles: traditional law enforcement and a more specialized military tactical role to deal with the growing urban violance and terrorist incidents. 9. Significant violence and unrest will plague our nation's prisons. Major prison riots will become a regular occurrence. 10. With the decrease of the possibility of major global warfare, the United States military will take on an increased domestic "peace-keeping" role with America's law enforcement agencies. John Young wrote: > > Tim asks: > > >Freeh and Company continue to mumble about "meeting > >the legitmate needs of law enforcement." What can they > >be speaking of? > ... > >Obviously his side is contemplating domestic crypto restrictions. > > Threat of terrorism will be the impetus for applying national security > restrictions domestically, for relaxing cold war limitations on spying > on Americans, for dissolving barriers between law enforcement > and military/intelligence agencies. > > Technical means for access to encrypted data will probably > come first in communications, then to stored material. There > will be an agreement for increased CALEA wiretap funding, which > is what the two cellular and wired suits against the FBI intend, > (paralleling what the hardware and software industries want from > federal buyers of security products). > > This will provide the infrastructural regime for the gov to monitor > and store domestic traffic as NSA does for the global, using the > same technology (NSA may provide service to domestic > LEA as it now does for other gov customers for intel). > > Other access will come through hardware and software for > computers, paralleling technology developed for telecomm tapping, > tracking and monitoring. > > Most probably through overt/covert features of microprocessors > and OS's, as reported recently of Wintel and others, but also > probably with special chips for DSP and software for modular > design -- why build from scratch when these handy kits are > available. > > As noted here, the features will appear first as optional, in response > to demand from commerce, from parents, from responsible > institutions, to meet public calls for protection, for privacy, for > combating threats to the American people. > > Like wiretap law, use of the features for preventative snooping will > initially require a court order, as provided in several of the crypto > legislative proposals. > > Like the wiretap orders, gradually there will be no secret court refusals > for requests to use the technology in the national interest. > > A publicity campain will proclaims that citizens with nothing to hide > will have nothing to fear. Assurance of safety will be transparent, > no clicks on the line. In a digital world, home-office devices will send > lifestyle data to the device manufacturers over the always monitoring > transparental Net. > > Personal privacy will evaporate almost unnoticeably, as with the tv > remote control, cp/defcon/bar brag, telephone, fax and forever-lovers > pillowtalk. From bbt at mudspring.uplb.edu.ph Wed Sep 16 12:33:29 1998 From: bbt at mudspring.uplb.edu.ph (Bernardo B. Terrado) Date: Thu, 17 Sep 1998 03:33:29 +0800 Subject: cryptography and encryption Message-ID: Could I interchange them. I know that the latter is under the former, but I'm still confused. Hope you'll understand. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Some people they might say that I'm hard to get to know. I go my own sweet way, well that maybe so. Something about the crowd that makes me walk alone. I never had a need in me to be the party's life and soul. It's me Bernie. metaphone at altavista.net `````````````````````````````````````````````````````````````````````````````` From bbt at mudspring.uplb.edu.ph Wed Sep 16 12:33:30 1998 From: bbt at mudspring.uplb.edu.ph (Bernardo B. Terrado) Date: Thu, 17 Sep 1998 03:33:30 +0800 Subject: PGP again.... In-Reply-To: <00b101bde1f9$da5b1330$e600005e@kenix_pdc.sz.utl.com.hk> Message-ID: On Thu, 17 Sep 1998, Jia Yan wrote: > ftp://net-dist.mit.edu It says permission denied the second time I've tried to enter. > >~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ > ~~~ > >Some people they might say that I'm hard to get to know. > >I go my own sweet way, well that maybe so. > >Something about the crowd that makes me walk alone. > >I never had a need in me to be the party's life and soul. > > > >It's me Bernie. > >metaphone at altavista.net > >``````````````````````````````````````````````````````````````````````````` > ``` > > > > > > From Richard.Bragg at ssa.co.uk Wed Sep 16 13:19:11 1998 From: Richard.Bragg at ssa.co.uk (Richard.Bragg at ssa.co.uk) Date: Thu, 17 Sep 1998 04:19:11 +0800 Subject: Democracy... Message-ID: <80256682.00312692.00@seunt002e.ssa.co.uk> mmotyka at lsil.com on 16/09/98 20:02:22 Please respond to mmotyka at lsil.com To: Richard Bragg/UK/SSA_EUROPE cc: cypherpunks at toad.com Subject: Re: Democracy... >> However, if you believe in something to be life changing and >> beneficial to both the >individual and society you'll want or be >> compelled to "pass it on". > >Altruistic on the surface. Regarding religion though, why do I always >get the feeling that when implemented and empowered it is judgemental >and intolerant of those who do not fall properly in line? > Because religion is dead. It is a set of man made rules interpreting what God has said. I do not want to live in a "religious" society any more than you do. Theocracy (rule by the church, small "c") is never a good idea. Deocracy??? (rule by God) is. God has already given us His instructions for healthy life and society. Most of our laws are based on them but we keep weakening them to account for our own failings and desires. >> What I wanted to illustrate is that there are absolutes, to say there >> are no obsolutes is in itself an absolute and so is self defeating. > >All right Mr. Logic, you're so sharp, give me ONE example of a *moral* >absolute. > It is wrong to abuse children. I reckon this is built in to just about all of us. It is in our nature to protect and defend our children. No matter where your are in the world this applies. Our differing cultures make some things acceptable to one and not to others but the underlying nature is still there. Also we may differ how we accomplish this. >> We must have absolutes. >> >We do: speed of light, mass of the electron, probably, but behavior? We >have behaviors that facilitate our persistance and propagation as a >species at ever increasing densities. Operating outside the boundaries >is neither right nor wrong, simply different. Not necessarily without >consequences, but simply different. Your yardstick is an hallucination >to which you cling to forlornly like a kitten clinging to a stick in a >raging river. > >Mike > >ps - is 'forlornly' really a word? I think so, but it looks odd today. Actually the speed of light varies depending on the medium and the mass of an electron with its velocity. You may deride my absolutes but if applied by all we would have no crime, no divorce etc. Boring?? Not really. Many diseases and social problems would cease or be reduced. From bbt at mudspring.uplb.edu.ph Wed Sep 16 14:16:21 1998 From: bbt at mudspring.uplb.edu.ph (Bernardo B. Terrado) Date: Thu, 17 Sep 1998 05:16:21 +0800 Subject: PGP Message-ID: Could you send me the source code of the most recent PGP. (for Unix) My server is very slow like a turtle. I don't mind if it's large. Could you please. Thank you. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Some people they might say that I'm hard to get to know. I go my own sweet way, well that maybe so. Something about the crowd that makes me walk alone. I never had a need in me to be the party's life and soul. It's me Bernie. metaphone at altavista.net `````````````````````````````````````````````````````````````````````````````` From diem at bk.bosch.de Wed Sep 16 15:05:24 1998 From: diem at bk.bosch.de (Wolfgang Diemert) Date: Thu, 17 Sep 1998 06:05:24 +0800 Subject: Child-Molesting Forger's Chilling Confession!!!1! Message-ID: <199809171105.NAA17588@bkrzu6.bk.bosch.de> A non-text attachment was scrubbed... Name: not available Type: application/x-www-form-urlencoded Size: 34 bytes Desc: not available URL: From mixmaster at remail.obscura.com Wed Sep 16 15:38:47 1998 From: mixmaster at remail.obscura.com (Mixmaster) Date: Thu, 17 Sep 1998 06:38:47 +0800 Subject: No Subject Message-ID: <85276ff4386bf1b830fc58b635f7aaa0@anonymous> looking around on various crypto sites I can't find any hashes ported to dos/win that are already compiled is anyone out there aware of a place with a copy o MD5 or SHA1 and my second question, I was also curious about PGP. In the latest version (cyberknights build) You can use 8kbits DH key or a 16Kbits RSA key, In my reasoning I would think that since DH was out before RSA and RSA was chosen for the first releases of PGP why switch to DH now, if it was better why not start out using that? From jya at pipeline.com Wed Sep 16 15:47:52 1998 From: jya at pipeline.com (John Young) Date: Thu, 17 Sep 1998 06:47:52 +0800 Subject: IRS Spam on CJ Message-ID: <199809171142.HAA13399@camel14.mindspring.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 This is a follow-up to the IRS Jim Bell spam last year, the IRS troll on CNN recently and other provocations. Anybody get IRS or other spam/troll about CJ? If so, we'd like to see the message with full headers (ID omitted if you like). Post here or send privately. Anon okay, probably best. We'll share what we get. If PGP preferred use the latest PK on the servers for , or any of the older ones. -----BEGIN PGP SIGNATURE----- Version: PGPfreeware 5.5.3 for non-commercial use iQA/AwUBNgDz7YNEX855Nu9gEQIVcgCfRebUik5OdC0JDOZC0U7/C815I3cAniER uOjU/6mmkkO/edw80+qMKnN8 =xEON -----END PGP SIGNATURE----- From 9kle5004 at auto.sixdegrees.com Wed Sep 16 16:10:19 1998 From: 9kle5004 at auto.sixdegrees.com (sixdegrees) Date: Thu, 17 Sep 1998 07:10:19 +0800 Subject: Beste Megan Message-ID: <199809171204.FAA04484@toad.com> Just a quick update from sixdegrees(tm). Unfortunately Beste Megan (mb6894a at american.edu) asked not to be listed as your contact with sixdegrees. We also wanted to make sure you were aware that you currently have no other confirmed contacts, so it will be hard for you to have a productive sixdegrees experience. As you probably know, without any confirmed contacts, you won't get any results from our networking searches. So, we just wanted to recommend that you head over to http://www.sixdegrees.com , log-in, and go to MY CONTACTS to list additional relationships. ==================================================================== PLEASE NOTE: All replies to this address are processed by a computer. If you have any problems, questions or requests send an e-mail to issues at sixdegrees.com and someone will get back to you as soon as possible. ==================================================================== E.DB.BRESP.3 From declan at well.com Wed Sep 16 16:10:31 1998 From: declan at well.com (Declan McCullagh) Date: Thu, 17 Sep 1998 07:10:31 +0800 Subject: A personal response to your email to sixdegrees In-Reply-To: Message-ID: Better yet, give anyone on the mailing list a veto over their new membership. Send a cookie to the address that was signed up, and an anti-cookie. If anyone returns the anti-cookie, in effect saying "we don't want to be part of your blasted service," put them on a list of do-not-contact people for half a year or so. That will minimise disruptions. It will also minimise disruptions to your service when pissed-off vigilantes decide to take matters into their own hands. -Declan On Wed, 16 Sep 1998, Tim May wrote: > At 10:09 AM -0700 9/16/98, Declan McCullagh wrote: > >Mark, trust me on this: remove all five cypherpunks addresses from your > >lists. > > > >Really. > > > > As others have noted, operations like "sixdegrees" need to be very careful > about how list addresses are signed up. This is a problem mailing lists > (formerly called "list exploders," until Congress began to rant about > Internet terrorists) have been dealing with for many years. > > "Lists subscribed to lists," with resulting circularity problems, is > something that can bring a list to standstill. > > >From the dozens of irate messages about "sixdegrees," and the joking > responses sent to "I hear you are my friend, but who are you?" queries seen > from hapless "sixdegrees" clients, the meltdown may be underway. > > There are concrete things you folks can do. When someone is nominated (or > whatever) as a potential contact, you can ask the contactee if he or she > wants this person to be a contact. In other words, take some of the > automation out of the loop. > > (Or add more of the right kind, such as sending a cookie or chit back to > the parties and require them to forward the cookies back. This, of course, > adds complexity for the "sixdegrees" customers and may actually cause many > of them to just give up in frustration.) > > If you do nothing, expect many of us to get more and more irate at the > abuses your service are facillitating. I expect some of the list > subscribers on lists your service "infects" will take the usual hackers > measures to crash your system. > > Not that I necessarily endorse this, but it's happened in the past. > > --Tim May > > (This space left blank pending determ. of acceptability to the gov't.) > ---------:---------:---------:---------:---------:---------:---------:---- > Timothy C. May | Crypto Anarchy: encryption, digital money, > ComSec 3DES: 831-728-0152 | anonymous networks, digital pseudonyms, zero > W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, > Licensed Ontologist | black markets, collapse of governments. > > > > > From sorens at workmail.com Wed Sep 16 16:50:01 1998 From: sorens at workmail.com (Soren) Date: Thu, 17 Sep 1998 07:50:01 +0800 Subject: It's finally over (was Re: Explanation of Harald Fragner and cypherpunks) In-Reply-To: <199809170055.UAA28232@domains.invweb.net> Message-ID: <360106B9.A408FF26@workmail.com> William H. Geiger III wrote: > ... How does Thwart, Verisign, or the other CA's handle authentication of > an > e-mail address in there low level certs? You generate a key pair on your machine (Netscape keygen tag or MS CrappyApi. The public key + other self-referential materiel is sent to Thawte/Verisign et al (actually I like Thwart better). This is via broken PKCS#10 for MS, or proprietary SPKAC for Netscape (ever wondered why there are multiple buttons for your browser type?). They then send you a reference number via email. You cut and paste the number back onto their site. A PKCS#7 mimetype is downloaded, causing your browser to grab and stash your new cert. Netscape stores the key in its own special way, and the cert in a PKCS#12 format. MS stores both in PKCS#12 format, which is rather easy to hack. If I was to request a cert from Thawte (the only really useful global, free, full strength one), and specify cyphers at punks.net (a well known interneting list) as my email address, then the email would be available to all subscribers of the list. Certs being public, this is not a problem. The crucial part being that the private key I originally generated, matching the public key in the cert, remains on my machine. I.e. I am the only one who can decrypt stuff encrypted with the cert's public key. This is an interesting way of receiving encrypted mail (pseudo-)anonymously. Expect to see a rash of Thawte "collect your new cert" emails, followed by much encrypted mail that only one list subscriber has the wherewithal to decrypt. Another alternative is to distribute the private key to selected buddies on the list, to provide a shared cert. Netscape specific: Migrating use of a cert requires an email to yourself that you will receive on your new machine, after copying the key*.db files and/or *.p12 files to the netscape/.../users dir, and importing it. As to how sexdegrees.com could use this technology ... this would require some degree of know-how which would probably preclude signing up in the first place. From rah at shipwright.com Wed Sep 16 16:54:31 1998 From: rah at shipwright.com (Robert Hettinga) Date: Thu, 17 Sep 1998 07:54:31 +0800 Subject: Catchy. Message-ID: --- begin forwarded text Resent-Date: Thu, 17 Sep 1998 08:51:14 -0400 X-Authentication-Warning: qnx.com: localhost [127.0.0.1] didn't use HELO protocol To: 0xdeadbeef at substance.abuse.blackdown.org Subject: Catchy. Date: Thu, 17 Sep 1998 08:34:49 -0400 From: glen mccready Resent-From: 0xdeadbeef at substance.abuse.blackdown.org X-Mailing-List: <0xdeadbeef at substance.abuse.blackdown.org> archive/latest/194 X-Loop: 0xdeadbeef at substance.abuse.blackdown.org Precedence: list Resent-Sender: 0xdeadbeef-request at substance.abuse.blackdown.org Forwarded-by: nev at bostic.com Forwarded-by: Kirk McKusick From: Rick Kawala I was with a friend in Cafe Flore the other night and I had to ask the counterperson what was playing on the stereo. Sort of techno but with vocals on some tracks, minorish key, really great. Anyway, the CD arrived and track 10 is called "PGP". And yes, they're talking about *that* PGP. My God, an ode to data privacy. This computer thing is getting out of hand. :) Rick --- end forwarded text ----------------- Robert A. Hettinga Philodox Financial Technology Evangelism 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From sorens at workmail.com Wed Sep 16 17:12:35 1998 From: sorens at workmail.com (Soren) Date: Thu, 17 Sep 1998 08:12:35 +0800 Subject: Democracy... In-Reply-To: <35FF220A.F88B87F6@hempseed.com> Message-ID: <36010BFB.E13E264B@workmail.com> Jaeger wrote: > I reply to this message going point by point, within the original > text... so scroll down if you care to read what I wrote.. > > > AI recently saw a posting about right v. wrong or good v. evil. These > > are subjective terms as any good semanticist knows. But what is real > > Neither good nor evil is subjective to anything... if something is > absolutely evil, then there is nothing that will make it good... (and > vice versa ) > IYHO. You've got to admire these great leaps of intuition. Now if we could only harness them to constructive acts instead of coercive? From asgaard at cor.sos.sll.se Wed Sep 16 17:22:07 1998 From: asgaard at cor.sos.sll.se (Asgaard) Date: Thu, 17 Sep 1998 08:22:07 +0800 Subject: Harald Fragner In-Reply-To: <199809161517.RAA08343@replay.com> Message-ID: On Wed, 16 Sep 1998, Anonymous wrote: >I think Harald Fragner has to take you off the list. >Talk to him about it. I remember Harald Fragner from a lot of forums on the Swedish Fidonet back in around 1991-1992. He was a trusted technophile who had an answer to every single IMB-PC related question (and most of his answers seemed accurate). A search has him now working for IDG Sweden, a publisher of computer magazines, as head of it's computer department. http://www1.idg.se/ harald.fragner at idg.se I'm sure that Harald could take anybody off any list but it's questionable if he has the time, or feels like it. :-) Asgaard From newsletter at info.industry.net Wed Sep 16 17:25:22 1998 From: newsletter at info.industry.net (Industry.net News) Date: Thu, 17 Sep 1998 08:25:22 +0800 Subject: Industry.net Announces Premium Membership Message-ID: <19980917062002.000045@langly.emailpub.com> As an Industry.net member, you already know how convenient it is to have one place to go for industry news, events, and sources of supply. In addition to this free content, Industry.net recently introduced Premium Membership, your gateway to engineering databases in the exclusive Data Depot and even more technical resources in the Reference Shelf. Sign up now and enjoy all the benefits of Premium Membership for the low, introductory price of $19.95 per year. Read on for more details or visit http://www.industry.net/pm-mktg/. Data Depot Industry.net's Data Depot is a gateway to comprehensive technical industrial products and components information. - Make design and specification decisions using complete technical product descriptions with Industry.net's exclusive Industrial Catalogs at http://www.industry.net/pm-mktg/icdescription.htm. As a Premium Member, for only $37.95 per month, you can access catalogs from over 15,000 manufacturers and distributors of industrial products and services. The Industrial Catalogs have been subject indexed and cross-referenced enabling you to quickly search and FIND the company or product you are interested in. Watch for future additions to Industry.net's Data Depot including online ordering of more than 200,000 technical standards, specifications, and reference documents; downloadable industry standards; and key supplier information on more than 12 million parts. Reference Shelf Industry.net's Reference Shelf provides fingertip access to many reference tools and resources that engineers use on a daily basis. - Make sure your technical documentation is in compliance with current industry standards with the online Drawing Requirements Manual. - Enjoy convenient, fingertip access to frequently used (but often forgotten) engineering equations and formulas. - Apply NASA technology to your commercial applications and product development. - Stay abreast of changing federal and state safety and compliance regulations. - Catch up with previously published Industry.net information in our Archives section. - Keep pace with manufacturing technology with the Integrated Manufacturing Technologies Roadmap (IMTR). - More to come Visit http://www.industry.net and get access to a world of information at your fingertips! In case you have forgotten your username, it is: crads. Would you like to participate in a focus group where we brainstorm enhancements to Industry.net? (send your response to feedback at industry.net) Would your company benefit from a presence on the Industry.net site? (send your response to sales at industry.net and provide the name of your marketing representative) If you would rather not be notified about new features on Industry.net, please unsubscribe by doing the following: (be assured that we respect your privacy and will not contact you further and we never send your name and/or e-mail address to other parties) Reply to this message or send e-mail to newsletter at info.industry.net with the subject line: "unsubscribe industry.net-news". From rwww60 at email.sps.mot.com Wed Sep 16 17:54:19 1998 From: rwww60 at email.sps.mot.com (Marty Levy) Date: Thu, 17 Sep 1998 08:54:19 +0800 Subject: British Police Attempt To Sidestep E-mail Protection Message-ID: <36011300.6ED2C07E@email.sps.mot.com> British Police Attempt To Sidestep E-mail Protection http://www.newsbytes.com/pubNews/118135.html (09/16/98); 12:22 PM CST By Steve Gold, Newsbytes LONDON, ENGLAND, Steve Gold, Newsbytes. Newsbytes' sources have revealed that the Metropolitan Police have been holding a series of low-key discussions with major Internet service providers (ISPs) in the UK, aiming to streamline police access to e-mail and ISP user logs. According to one reliable source, the aim of the discussions is to develop a ground-breaking agreement between the police and ISPs so that, where the police have reasonable suspicion that an individual is sending or receiving e-mail, or downloading images that involve paedophilia, then they can formally request full details of the Internet user's mailbox and system logs, for example, from the ISP in question. While the aim of the project is to avoid the need for police to obtain a formal court order to access the ISP's computer systems, Newsbytes expects there to be a massive outcry from civil libertarian groups, since the police order could well be implemented against anyone with an account with a British ISP. Newsbytes understands that an expose on the police plans will be broadcast on Channel 4 news at 19:00 hours on British television this evening. Newsbytes' sources suggest that British ISPs are under immense pressure to comply with the police system since, if they do not comply and request a court order, the police could theoretically impound their computer systems, effectively putting an ISP out of action, and perhaps business, for an unknown period of time. "While I can understand the police wanting to gain access to Internet users' files who are accessing the Net for paedophile images, this does seem something of a steamroller approach," said one industry source who spoke to Newsbytes after agreeing anonymity. Newsbytes notes that a major flaw exists in the British police's modus operandi for the proposed system, since the e-mail file servers for America Online (AOL) and CompuServe (AOL is the UK's largest ISP) are held in the US. Only the company's sales and support operations are located in the UK. "It will be interesting to see how the management of AOL and CompuServe in the US react to the news that they have to willingly hand over user logs and e-mail files to the British police," said the anonymous source. As has been proven by various cases in the US, the normal legal protection afforded postal and telephone communications by anti- wiretap legislation is not automatically extended to include e-mail. In the UK, it had been thought that the Interception of Communications Act might apply to e-mail, but the law relating to e-mail remains unproven, Newsbytes notes. Reported by Newsbytes News Network, http://www.newsbytes.com . 12:22 CST (19980916/WIRES LEGAL, ONLINE/) Copyright (c) Post-Newsweek Business Information, Inc. All rights reserved. ----------------------------------------------------------- From declan at well.com Wed Sep 16 18:24:41 1998 From: declan at well.com (Declan McCullagh) Date: Thu, 17 Sep 1998 09:24:41 +0800 Subject: CDA II up for subcommittee vote today in House Message-ID: ---------- Forwarded message ---------- Date: Thu, 17 Sep 1998 07:23:07 -0700 (PDT) From: Declan McCullagh To: politech at vorlon.mit.edu Subject: CDA II up for subcommittee vote today in House http://cgi.pathfinder.com/netly/0,2326,201980917-14617,00.html Time Digital Daily September 17, 1998 Congress to Debate CDA II This Morning By Declan McCullagh (declan at well.com) It was one thing to vote for the Communications Decency Act, as Congress did before the Supreme Court ruled that it was violently unconstitutional. It's quite another to knowingly circumvent that ruling by voting for its successor, as a Congressional panel may do this morning. At 10 AM this morning a House Commerce subcommittee is scheduled to debate Rep. Mike Oxley (R-Ohio)'s CDA II, and free speech advocates are in a tizzy. [...snip...] From CTIA_Daily_News at um2.unitymail.com Thu Sep 17 09:35:21 1998 From: CTIA_Daily_News at um2.unitymail.com (CTIA Daily News) Date: Thu, 17 Sep 1998 09:35:21 -0700 (PDT) Subject: CTIA Daily News from WOW-COM - September 17, 1998 Message-ID: <199809171629.LAA22564@mailstrom.revnet.com> ========================================== Welcome to today's edition of the CTIA Daily News from WOW-COM.� Please click on the icon / attachment for the most important news in wireless communications today. The Newest Most Comprehensive Tradeshow of Wireless Computing and Communications is Only a Month Away. Register TODAY! http://www.wirelessit.com/register.htm� Team WOW-COM wowcom at ctia.org =========================================== -------------- next part -------------- A non-text attachment was scrubbed... Name: bin00020.bin Type: application/octet-stream Size: 8613 bytes Desc: "CTIA_Daily_News_19980917.htm" URL: From nobody at replay.com Wed Sep 16 19:25:15 1998 From: nobody at replay.com (Anonymous) Date: Thu, 17 Sep 1998 10:25:15 +0800 Subject: Nita Daniel Message-ID: <199809171517.RAA22696@replay.com> Oh Nita baby, say it ain't so! What about all that time in the Congo? What about those wombat hunting trips on the aborigine plains? What about when we made sweet love in a pile of rhinoceros shit, your fecal fetish winning me over to our true love. What about when you swore you'd always be true, even as you were pissing in my mouth? Oh that acrid, bittersweet flavor of entrails running through my loins, that ache of razor sharp knives piercing my rectum, and you said you'd always be there for me baby! Well fine! If that's the way you want it, Nita, you parking meter, you pimple on the face of a whore, you jubilant muskrat sharpener! Go back to your twinkie stuffing, you'll never see me again! Hurting, Joe Camel At 11:15 PM 9/16/98 -0500, sixdegrees wrote: >Just a quick update from sixdegrees(tm). Unfortunately Nita >Daniel (machita at gurlmail.com) asked not to be listed as your >contact with sixdegrees. > >We also wanted to make sure you were aware that you currently >have no other confirmed contacts, so it will be hard for you to >have a productive sixdegrees experience. As you probably know, >without any confirmed contacts, you won't get any results from our >networking searches. > >So, we just wanted to recommend that you head over to >http://www.sixdegrees.com , log-in, and go to MY CONTACTS >to list additional relationships. > > >==================================================================== >PLEASE NOTE: All replies to this address are processed by a computer. >If you have any problems, questions or requests send an e-mail to >issues at sixdegrees.com and someone will get back to you as soon as >possible. >==================================================================== > > >E.DB.BRESP.3 > From nobody at replay.com Wed Sep 16 19:27:07 1998 From: nobody at replay.com (Anonymous) Date: Thu, 17 Sep 1998 10:27:07 +0800 Subject: Isaac Lee Message-ID: <199809171521.RAA23067@replay.com> Screw you Isaac Hayes! I never liked Shaft anyway. Go back to South Park you worm! Saddened, Joe CypherSyphen At 12:17 AM 9/17/98 -0500, sixdegrees wrote: >Just a quick update from sixdegrees(tm). Unfortunately Isaac >Lee (zac at pulp-fiction.com) asked not to be listed as your >contact with sixdegrees. > >We also wanted to make sure you were aware that you currently >have no other confirmed contacts, so it will be hard for you to >have a productive sixdegrees experience. As you probably know, >without any confirmed contacts, you won't get any results from our >networking searches. > >So, we just wanted to recommend that you head over to >http://www.sixdegrees.com , log-in, and go to MY CONTACTS >to list additional relationships. > > >==================================================================== >PLEASE NOTE: All replies to this address are processed by a computer. >If you have any problems, questions or requests send an e-mail to >issues at sixdegrees.com and someone will get back to you as soon as >possible. >==================================================================== > > >E.DB.BRESP.3 > From q1w2e3 at pacific.net.sg Wed Sep 16 19:52:03 1998 From: q1w2e3 at pacific.net.sg (zËRö) Date: Thu, 17 Sep 1998 10:52:03 +0800 Subject: remove Message-ID: <3602004C.D6D@pacific.net.sg> remove From feferman at math.princeton.edu Wed Sep 16 20:22:42 1998 From: feferman at math.princeton.edu (Nina H. Fefferman) Date: Thu, 17 Sep 1998 11:22:42 +0800 Subject: Coding theory, cryptography, and number theory conference at USNA Message-ID: I'm probably the only person in the world who doesn't already know about this, but just in case, the URL is http://web.usna.navy.mil/~wdj/talk98_30.htm Nina ------------------------------------------------------------------------ Preliminary information on Conference on Coding theory, Cryptology, and Number Theory version 9-14-98 Place: USNA Math Dept Time: October 25, 26 of 1998 Coding theory and crypology/number theory will be on Sunday the 25th, including talks by Carl Pomerance and Neil Sloane. More crypology/number theory on Monday and then Prof Hilton will speak Monday night the 26th. Main speakers: Peter Hilton, SUNY Binghamton (Oct 26th, 7-8pm) Carl Pomerance, U Georgia (Oct 25th, noon?) Neil Sloane, AT&T Research Labs (Oct 24th, 4-5pm?) Other speakers will probably be local: Bill Wardlaw (USNA), some speakers from NSA, etc. All material will be unclassified. We will try to have midshipman in attendence. This conference is being supported by a generous grant from the NSA. -- David Joyner, Assoc Prof of Math US Naval Academy, Annapolis, MD 21402 (410)293-6738 wdj at nadn.navy.mil http://web.usna.navy.mil/~wdj/homepage.html ++++++++++++++++++++++++++++++++++++++++++++ "A Mathematician is a machine for turning coffee into theorems." Alfred Renyi From aladdinspecials at LISTSERVER.DIGITALRIVER.COM Thu Sep 17 12:21:11 1998 From: aladdinspecials at LISTSERVER.DIGITALRIVER.COM (Aladdin Systems) Date: Thu, 17 Sep 1998 12:21:11 -0700 (PDT) Subject: Aladdin DropStuff for Windows - 25% off for you! Message-ID: <11be01bde26b$84f2e1d0$75d2d1d0@c-kosel.digitalriver.com> ************************************************ YOU HAVE RECEIVED THIS MAILING AS A RESULT OF JOINING OUR INFORMATION LIST. BY DOWNLOADING ALADDIN FREEWARE AND PROVIDING US WITH YOUR NAME AND EMAIL ADDRESS YOU INDICATED THAT YOU WOULD LIKE TO BE INFORMED OF SPECIAL INFORMATION FOR ALADDIN CUSTOMERS. IF YOU WOULD LIKE TO BE REMOVED FROM THIS LIST PLEASE REFER TO THE INSTRUCTIONS FOUND AT THE BOTTOM OF THIS EMAIL. ************************************************ Dear Aladdin Expander User, Did you know there's a new windows shareware utility from Aladdin that just made cross-platform communication easier? It's called Aladdin DropStuff, and if you send files back and forth to Mac users, it'll make your life a whole lot happier! Already, early users of DropStuff are telling us it's a godsend. For all the details now, click here http://www.digitalriver.com/AladdinDSWin10/PC. With Aladdin DropStuff for Windows, in addition to creating Zip archives, you can also compress in the StuffIt format, the compression standard for the Mac. So now, you can send a file from your PC to a Mac user, and they can open it, edit it, and send it back to you seamlessly and transparently! Or, if like lots of people, you use a Mac at home and a PC at the office, DropStuff makes it even easier to transmit and open files you send back and forth from home and work. DropStuff is loaded with the power user features you need, like the ability to compress and mail files in one easy step, right from the Windows desktop with just a right mouse click! Plus, DropStuff lets you join StuffIt file segments you may receive from a Mac user. With Aladdin DropStuff, it's like your PC just learned to speak a whole new language! Aladdin DropStuff for Windows is a great deal at $20. But for a limited time, we're offering DropStuff to Aladdin Expander users for the amazing price of just $14.95! That's a savings of 25% on the world's first universal compression utility for the PC! Get DropStuff now at http://www.digitalriver.com/AladdinDSWin10/PC This special price of $14.95 is for a limited time only! Don't miss out on the savings. ************************************************* If you would prefer to not receive Aladdin news and special offers in the future do NOT reply to this message, instead: 1. mailto:listserv at listserver.digitalriver.com 2. Put "UNSUBSCRIBE ALADDIN-WIN" (without quotes) in the FIRST LINE of the message BODY ************************************************* All the best, Marty McGillivray Aladdin DropStuff Product Manager From xasper8d at lobo.net Wed Sep 16 21:30:56 1998 From: xasper8d at lobo.net (X) Date: Thu, 17 Sep 1998 12:30:56 +0800 Subject: Your new password In-Reply-To: Message-ID: <000201bde25f$fa59c6c0$942580d0@ibm> The only thing that would be worse, and definitely should NOT be carried out by a cypherpunk, is if someone tracked down a certain list like srbeanies at interhop.net and somehow listed the sixdegrees as a friend. Seriously, don't even think of torturing those poor 2000 beaniebaby traders with a gag like this. X -----Original Message----- From: owner-cypherpunks at minder.net [mailto:owner-cypherpunks at minder.net] On Behalf Of Lazlo Toth Sent: Wednesday, September 16, 1998 7:29 PM To: cypherpunks at toad.com Subject: Re: Your new password I predict that naughty cypherpunks will use these passwords to repeatedly add the following names to "Schlomo"'s list of contacts: mark at sixdegrees.com webmaster at sixdegrees.com postmaster at sixdegrees.com issues at sixdegrees.com If that doesn't work, really naughty cypherpunks may also add the addresses of prominent journalists. Of course, those things would be WRONG. -Lazlo >Name: Schlomo CyberPoopy >sixdegrees password: linkcusp > >Congratulations Schlomo. You're well on your way to >becoming a full sixdegrees(tm) member. Here is your member >password: linkcusp. Use it to log-in on the home page >at the sixdegrees Web site, http://www.sixdegrees.com. >We'll ask you for a little more information to complete your >registration, and then you'll be ready to start networking. > >It's important that you return to the site and log-in. Your >membership will not be complete until you do so. > >Once you've successfully logged in with your password, just go >to Personal Profile and you'll be able to choose your own >password. > >Thanks for becoming part of sixdegrees. We're looking forward >to seeing you at the site. > >==================================================================== >PLEASE NOTE: All replies to this address are processed by a computer. >If you believe you received this e-mail in error, and it was not your >intention to become a sixdegrees member, or if you have any problems, >questions or requests send an e-mail to issues at sixdegrees.com >and someone will get back to you as soon as possible. >==================================================================== > > >E.SI.BAM.1 From xasper8d at lobo.net Wed Sep 16 21:31:02 1998 From: xasper8d at lobo.net (X) Date: Thu, 17 Sep 1998 12:31:02 +0800 Subject: software In-Reply-To: <63f88dc4.36006a60@aol.com> Message-ID: <000301bde260$d04bac80$942580d0@ibm> AOL. It had to, HAD to be AOL. Okay, here goes: Radio Shack sells an electromagnetic PCMCIA card that you slip in your computer, juice it up, and it will encrypt everything for free, to the extent that it will be unrecoverable by even the NSA. I think they're about three dollars American. Give it a shot. (Fridge magnets placed directly on the hard drive can help, but it's a long shot.) X -----Original Message----- From: owner-cypherpunks at minder.net [mailto:owner-cypherpunks at minder.net] On Behalf Of CHerr58414 at aol.com Sent: Wednesday, September 16, 1998 7:48 PM To: cypherpunks at cyberpass.net Subject: software if u got any freeware for encripting and decodeing that would be great so if you can mail me back some info. Thanks From mah248 at nyu.edu Wed Sep 16 21:53:04 1998 From: mah248 at nyu.edu (Michael Hohensee) Date: Thu, 17 Sep 1998 12:53:04 +0800 Subject: Larry Gilbert, AOLers, and the Hyper-real flamer In-Reply-To: <5e38fbca.36006a19@aol.com> Message-ID: <36014AD4.11C504D0@nyu.edu> This still doesn't explain why you think you need 100 accounts on the same ISP. All an account is is a login/password pair. wtf do you use 100 *different* accounts for? Email bombing? Some kinda sick means of avoiding spam mail from posting on Usenet? *rototflmao* I suppose that if your ISP has 100 computers on its internal network, and your login works on each one of them, you could say, technically, that you have 100 accounts. Of course, since your ISP is probably running Solaris, that's a somewhat silly thing to say, as it is likely that the /etc/passwd (or equivalent) file is NFS mounted over the whole network, and your home directories are almost certainly NFS mounted from a constant HD (located somewhere in the depths of the network), from machine to machine. Hell, I worked at Sun over the summer. *I* had an account there, and could login to any of the several hundred machines we had on our subnet of SWAN. Does that mean that I should go around saying "Yeah, I have like, 500 shell accounts where *I* work, which proves I'm a VSC (Very Smart Cookie), or at least not an AOLuser" *lol* Get over it kid, you've either got a single account, which exists on a bunch of different machines, or your ISP is even more retarded than AOL. :) AIMSX at aol.com wrote: > > Hmm... have you ever thought... that my mother may not exactly love the > idea > of me having access to other people's accounts... so I need to do what she > DOES condone? You just don't seem to be using your brain. > > >Some of them have over 100 accounts on the same ISP, and are > >truly so full of shit, that they're swimming in it. Kid, by bullshiting, > >all > >you're doing is enforcing the view that AOL users are really AOLusers. From mgering at ecosystems.net Wed Sep 16 22:29:42 1998 From: mgering at ecosystems.net (Matthew James Gering) Date: Thu, 17 Sep 1998 13:29:42 +0800 Subject: Democracy... (fwd) Message-ID: <33CCFE438B9DD01192E800A024C84A192846AD@mossbay.chaffeyhomes.com> > Atheism means that one believes that there is no God. You trying to claim atheism is a religion itself is like the christians always claiming non-christians are satin worshippers. Forget about the origination of the word, in today's reality most atheists simply forgo religion completely. There is no reason to think that a god does exist, so why would one even need to think about or believe in the negative. > Ah, so there are personal beliefs that aren't religion and > then there are personal beliefs that are? Yes, beliefs based on valid reason, empiricism and science are not religious, the generally follow the path from conjecture to theory to fact. You may hold lots of personal conjecture that do qualify as beliefs but are not religious in nature, they are not exempt from empirical evidence and the laws of thermodynamics. Beliefs based on faith and mysticism are religious. Religion is irrational. > What a self-rightous, pretentious, egotistical viewpoint. Thank you. > Actualy not, the vast majority of people believe in God, just not your > particular brand - which after all is what the 1st is all about. Perhaps in Bible-belt Texas, not around here (not in the city anyway). Matt From jya at pipeline.com Wed Sep 16 22:41:17 1998 From: jya at pipeline.com (John Young) Date: Thu, 17 Sep 1998 13:41:17 +0800 Subject: SecDef on Crypto, Privacy Message-ID: <199809171833.OAA01552@camel14.mindspring.com> Excerpt from DoD transcription of Secretary of Defense Cohen's remarks at the Council on Foreign Relations, New York City, September 14, 1998: [Begin] Let me say one other thing about terrorism. We in this country much recognize the tension which will exist as you ask us, and we will ask all successor administrations, to protect us. And you say, how do you protect someone against terrorists? It means increased intelligence. It means increased intelligence, having greater capability on the ground or from national technical sources to find out who is planning and plotting what at what place and what time. To do that is going to put us in somewhat of a direct conflict with rights to privacy, something that we hold very dear in this country. So the more intelligence-gathering responsibilities that any administration is going to have, there's going to come a point of tension and, indeed, friction between how much are you willing to give up in order to be secure. Those are the kind of unpleasant choices that are going to be manifesting themselves in the near future. We haven't really faced up to it yet. We're starting to see some of that conflict at least intellectually develop when you see the manufacturers of software who don't like the fact that the law enforcement, the FBI, the Justice Department wants to have some method of getting into encrypted technology. You say, "Wait a minute, that's my right of privacy. I'm a businessman or woman. I want to be able to send information out over those -- those airwaves and have them completely protected." Our Justice Department says, "Wait a minute, you want us to protect you. But you're allowing criminal elements, terrorists and others -- organized crime, drug cartels -- to encrypt their telecommunications to the point where don't know what's going on. And then something is going to happen, and you'll say, where were you?" So those are the kinds of tensions that are going to continue to exist. But we're going to have to have more intelligence to effectively deal with terrorism in the future. [End excerpt] Full transcript: http://jya.com/wsc091498.htm (49K) From ravage at EINSTEIN.ssz.com Wed Sep 16 22:50:30 1998 From: ravage at EINSTEIN.ssz.com (Jim Choate) Date: Thu, 17 Sep 1998 13:50:30 +0800 Subject: Democracy... (fwd) Message-ID: <199809171915.OAA15655@einstein.ssz.com> Forwarded message: > From: Matthew James Gering > Subject: RE: Democracy... (fwd) > Date: Thu, 17 Sep 1998 11:29:00 -0700 > > Atheism means that one believes that there is no God. > > You trying to claim atheism is a religion itself is like the christians > always claiming non-christians are satin worshippers. Actualy this is a straw man. Very few Christians claim Buddhist, Muslim, etc. are satan worshipers, Satan is a Christian ephigy. What they *do* claim is that those folks are worshipping false idols and as a result won't gain access to heaven at death. Vasty different than your claim. > Forget about the > origination of the word, There's your first problem, your argument won't stand in the traditional architecture of society so you want to try to get me to throw it away. This causes all terms, ideas, etc. to become irrelevant in effect forcing me to play from a vacuum. Won't do it. Though it's a nice ploy on your part. > in today's reality most atheists simply forgo > religion completely. A personal philosophy is a religion, different words but same idea. If your thesis is that for something to be a religion it requires some sort of social approval you miss the whole point. Even Jesus recognized that a persons religion didn't rely on a 'church' and the implied infrastructure. This is the reason he told his listeners to pray in a closet alone. > There is no reason to think that a god does exist, so why would one even > need to think about or believe in the negative. There is no reason to believe one doesn't either. If we take your claim at face value you need to demonstrate your test that shows the irrelevancy of god. God is not a belief in a negative, another straw man, but rather a mechanism or expression of human psychology and the need for humans to find patterns (ie reason) in things. > > Ah, so there are personal beliefs that aren't religion and > > then there are personal beliefs that are? > > Yes, beliefs based on valid reason, Ah, another of your mistakes. Religion and by extension faith are not constrained by reason or logic. It's this realisation that puts some issues and aspect of human inquiry outside of the reach of science, logic, etc. > empiricism and science are not > religious, the generally follow the path from conjecture to theory to > fact. If you're a pantheist they're the only religion (aka personal philosophy) you've got. Shortcomings in your imagination are not a reflection upon the rest of the cosmos. > You may hold lots of personal conjecture that do qualify as > beliefs but are not religious in nature, they are not exempt from > empirical evidence and the laws of thermodynamics. Beliefs based on > faith and mysticism are religious. Religion is irrational. No, only some religions are irrational. The point you're missing is not one of rationality or irrationality but rather transcendance. ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From mgering at ecosystems.net Wed Sep 16 22:56:12 1998 From: mgering at ecosystems.net (Matthew James Gering) Date: Thu, 17 Sep 1998 13:56:12 +0800 Subject: Mobile phone tracking, pagers, etc Message-ID: <33CCFE438B9DD01192E800A024C84A192846AF@mossbay.chaffeyhomes.com> Regarding the tracking of mobile phones, are all current types of phones susceptible? There was a recent post here regarding tracking of GSM phones. TDMA/CDMA, analog/digital, PCS-band, etc, are they all equally capable of being tracked? However pagers are not, correct? They just broadcast an entire area to page instead of the pager keeping the network informed of their location. One thing I have long wondered: Why don't they make phones that "wake-up" by a paging signal and then accept the call? It might increase the connect time significantly, but it would also increase the potential stand-by time indefinitely, and the location of the user is only exposed when calls are in progress, not while the phone is on stand-by. Are there any paging services (particularly alpha paging) that work on a global scale? You would think daily pager rental service (esp. at airports) would be popular. You could have an email address, even a static phone number, that could re-route messages to any pager that you happen to have at the time (PSTN-IP-PSTN, or even easier if the pager service gives SMTP addresses, which most do these days). Similarly a PSTN-IP-PSTN interface for voice could give you a static phone number that you could dynamically forward anywhere untraceably. BTW, why are most businesses so hostile to pseudonyms? I go to rent a mailbox, paid 1 yr. in advance with cash, and they still want two pieces of photo ID to copy. Matt From jvb at ssds.com Wed Sep 16 22:59:25 1998 From: jvb at ssds.com (Jim Burnes) Date: Thu, 17 Sep 1998 13:59:25 +0800 Subject: Cyberpunks Signal-to-Noise Ratio Message-ID: Far be it from me to complain about the content-free nature of others postings, but has anyone else noticed that the signal on cypherpunks is being lost in the noise? jim From mgering at ecosystems.net Thu Sep 17 00:03:30 1998 From: mgering at ecosystems.net (Matthew James Gering) Date: Thu, 17 Sep 1998 15:03:30 +0800 Subject: A personal response to your email to sixdegrees Message-ID: <33CCFE438B9DD01192E800A024C84A192846B6@mossbay.chaffeyhomes.com> Declan McCullagh [mailto:declan at well.com] wrote: > Better yet, give anyone on the mailing list a veto over their new > membership. Send a cookie to the address that was signed up, and an > anti-cookie. If anyone returns the anti-cookie, in effect > saying "we don't want to be part of your blasted service," put them > on a list of do-not-contact people for half a year or so. An anti-cookie, I like it. LISTSERV provides a cookie and makes you type "ok" in the body. Making that "ok" or "cancel" and keeping the cookie active for a day or so seems like it would be a really simple modification. One "cancel" of course is over-riding and final. Similarly for majordomo and other custom acknowledgement schemes. Matt -----Original Message----- From: Matthew James Gering [mailto:mgering at ecosystems.net] > ---Mark Salamon wrote: > > > > Thanks for the reply. I have now received about 10 such > > replies. We will take them to heart, remove the cypherpunks > > and attempt to deal with the mailing list issue in an > > intelligent way. Most lists and services have dealt with the problem of someone accidentally subscribing or maliciously subscribing someone else in one of two ways: A) send and acknowledgement message with a randomly generated authorization code that requires the user to respond. B) send out a password and require the user to login before account is activated. This works only if you assume the malicious individual will not receive mail sent to that address. This therefore falls down when the address is a mailing list or other distribution point that the malicious individual has access to directly or via archives. From jkthomson at bigfoot.com Thu Sep 17 00:21:10 1998 From: jkthomson at bigfoot.com (jkthomson) Date: Thu, 17 Sep 1998 15:21:10 +0800 Subject: No Subject Message-ID: <3.0.3.32.19980917131557.006c0a00@dowco.com> makes you wonder what hell they were using for encryption? DES? ------------------------------ September 17, 1998 Web posted at: 11:16 AM EDT (1516 GMT) MIAMI (AP) -- The shadowy world of a low-budget Cuban spy ring came to light in a courtroom, where an FBI agent testified that a suspect's apartment yielded computer diskettes containing coded references to Fidel Castro and plans to sabotage an aircraft hangar. Sounding more and more like a spy novel, details of the group's workings were revealed in a hearing at which Luis Medina and Manuel Viramontez were ordered held without bail Wednesday. Thousands of pages of encrypted computer documents were seized from the men's apartments. The men were among 10 rounded up over the weekend and charged Monday with trying to penetrate U.S. military bases, infiltrate anti-Castro exile groups and manipulate U.S. media and political organizations. Prosecutors said it was the biggest Cuban spy ring uncovered in the United States since Castro took power in 1959. However, the Pentagon said none of the alleged spies obtained U.S. secrets. Evidence seized from Viramontez "analyzes the ability to sabotage or cause damage to airplanes" or a Florida hangar itself," FBI agent Mark de Almeida testified. But the network was a low-budget affair, with a Cuban military captain who lived under the alias Viramontez falling behind on his rent. The Cuban government "indicated they were supposed to suffer like the rest of the Cuban people," de Almeida testified in explaining their spartan lifestyle. He said diskettes seized from Viramontez' apartment were sprinkled with the word "comrade" and coded references to "commandante," taken by investigators to refer to Castro. Before Viramontez was caught, he had three sets of false identities and plans to escape to Mexico, Nicaragua or Canada, prosecutors allege. Medina, said to be a Cuban intelligence major, was ready to flee with a briefcase containing Puerto Rican identities, a fake birth certificate and $5,000 in cash. Eight defendants postponed their bail hearings Wednesday. All 10 were in solitary confinement at a federal jail. Viramontez's attorney Paul McKenna said the court, not public opinion, must decide the case. "You can't have a lynch mob mentality about this case," said McKenna. "We have to let our system of justice, our courts, deal with this." ----------------------------------------------------------------------- james 'keith' thomson www.bigfoot.com/~ceildh jkthomson:C181 991A 405C EAFB 2C46 79B5 B1DC DB78 8196 122D [06.07.98] ceildh :1D79 59AF ED75 5945 6003 8240 DA34 ACCA 9DE4 6BC9 [05.14.98] ICQ:746241 at pgp.mit.edu ...and former sysop of tnbnog BBS ----------------------------------------------------------------------- Murphy's Military Laws: 3. Friendly fire ain't. ======================================================================= From nobody at nowhere.to Thu Sep 17 00:21:14 1998 From: nobody at nowhere.to (Anonymous) Date: Thu, 17 Sep 1998 15:21:14 +0800 Subject: Encryption and Terrorists Message-ID: <7874ed1d5f47be94688551065bac8ea5@anonymous> Wake up America! Encryption doesn't kill people! Terrorists do. Would you give the keys to your house to the government? Just in case they have to break in? NO! How about your ATM PIN #, just in case you don't pay your taxes? NO! So don't give out your keys that you use for encrpytion and don't let the government have a way to get them either! Just say NO to the UNCONSTITUTIONAL idea of Limited Privacy! After all, we are not COMMUNISTS. From emc at wire.insync.net Thu Sep 17 00:27:42 1998 From: emc at wire.insync.net (Eric Cordian) Date: Thu, 17 Sep 1998 15:27:42 +0800 Subject: The DES Analytic Crack Project Message-ID: <199809172029.PAA20063@wire.insync.net> We are pleased to report that we have obtained our first sponsor. Two more, and if everyone is agreeable, we have decided to launch the project, and get through as much of the early stuff in the FAQ as possible. Numerous comments on our sponsorship model have indicated that people want the project results to be widely disseminated, and that exclusive access is not an incentive for people to sponsor. So - unless we get a lot of people saying that this is not the case, we will probably just release stuff on the Web site as it becomes available, along with emailing it to sponsors, and posting summaries of interesting results to Cypherpunks. -- Sponsor the DES Analytic Crack Project http://www.cyberspace.org/~enoch/crakfaq.html From declan at well.com Thu Sep 17 00:48:54 1998 From: declan at well.com (Declan McCullagh) Date: Thu, 17 Sep 1998 15:48:54 +0800 Subject: House panel OKs son-of-CDA (fwd) Message-ID: ---------- Forwarded message ---------- Date: Thu, 17 Sep 1998 13:48:43 -0700 (PDT) From: Declan McCullagh To: politech at vorlon.mit.edu Subject: House panel OKs son-of-CDA http://cgi.pathfinder.com/time/daily/0,2960,14791-101980917,00. Time Daily Son of CDA September 17, 1998 By Jonathan Gregg Who should decide what's fit for kids to see online? If Rep. Mike Oxley has his way, says TIME correspondent Declan McCullagh, it will be "any Bible Belt prosecutor who's itching to make a name for himself." Oxley is the sponsor of the Internet decency act that was approved by a House Commerce subcommittee Thursday -- a bill that bears a striking resemblance to the 1996 Communications Decency Act that got the bum's rush from the Supreme Court, 9-0, for being unconstitutional. [...snip...] From AIMSX at aol.com Thu Sep 17 01:11:46 1998 From: AIMSX at aol.com (AIMSX at aol.com) Date: Thu, 17 Sep 1998 16:11:46 +0800 Subject: Larry Gilbert, AOLers, and the Hyper-real flamer Message-ID: <491b5a5b.36017891@aol.com> Hmm, well, you were wrong about many things. The ISP runs RH5.1 I don't use the passwd file for anything, as it is shadowed. I don't work there. I use 100 accounts because it is so easy to get all the new users, and the changed passwords with the way they are set up, so why stop at one, and if that one is disabled, I would like something to fall back on. You just don't understand anything about why I do what I do. If you were illegally using an account, would you want to ONLY have 1? Why wouldn't you want to know you had something to fall back on if that one is disabled? From mixmaster at remail.obscura.com Thu Sep 17 01:33:11 1998 From: mixmaster at remail.obscura.com (Mixmaster) Date: Thu, 17 Sep 1998 16:33:11 +0800 Subject: No Subject Message-ID: Wednesday, September 16, 1998 - 20:16:25 I'm trying not to be paranoid or anything, but the thing is, ... where the heck is everybody??!! Nomad From mgering at ecosystems.net Thu Sep 17 01:44:46 1998 From: mgering at ecosystems.net (Matthew James Gering) Date: Thu, 17 Sep 1998 16:44:46 +0800 Subject: Democracy... (fwd) Message-ID: <33CCFE438B9DD01192E800A024C84A192846BB@mossbay.chaffeyhomes.com> > > Forget about the origination of the word, > > There's your first problem, your argument won't stand in the No, there is a strict difference between the defining a word and defining a philosophy coined after that word. Certainly Marxism, Leninism and Stalinism all claimed to be Communism, regardless of how much or little resemblance they bear to a strict definition of the word communism. > A personal philosophy is a religion, different words > but same idea. > Religion and by extension faith are not > constrained by reason or logic. How do you account for this contradiction. I hold a personal philosophy that is strictly and absolutely constrained by reason and logic. > > There is no reason to think that a god does exist, so why > > would one even need to think about or believe in the negative. > > There is no reason to believe one doesn't either. Do you believe in THE FORCE, as described by the great prophet George Lucas? If you say "Yes," am I to claim that is your *religious* belief, not subject to reason, logic or empirical evidence? If you say "No," am I to assume that is your *religious* belief, not subject to reason, logic or empirical evidence? I hold no *religious* beliefs, PERIOD. You seem to be unable to grasp that concept. If thinking that everyone holds a religion, even religiously not holding one(?!), is a way for you to escape rational judgement on your own ideas, then so be it, discussion on the topic is no longer useful as this is obviously part of your religious beliefs. Matt From mgraffam at mhv.net Thu Sep 17 01:50:44 1998 From: mgraffam at mhv.net (mgraffam at mhv.net) Date: Thu, 17 Sep 1998 16:50:44 +0800 Subject: your mail In-Reply-To: <3.0.3.32.19980917131557.006c0a00@dowco.com> Message-ID: On Thu, 17 Sep 1998, jkthomson wrote: > makes you wonder what hell they were using for encryption? DES? > MIAMI (AP) -- The shadowy world of a low-budget Cuban spy ring came to > light in a courtroom, where an FBI agent testified that a suspect's > apartment yielded computer diskettes containing coded references to Fidel > Castro and plans to sabotage an aircraft hangar. Note the word coded. > Thousands of pages of encrypted computer documents were seized from the > men's apartments. > He said diskettes seized from Viramontez' apartment were sprinkled with the > word "comrade" and coded references to "commandante," taken by > investigators to refer to Castro. I don't think that the documents were encrypted; I think that, perhaps, they were just done in a code language. If they were actually using a cipher system, you do have to wonder what it was. Damn.. are cypherpunks the only people in the universe smart enough to use PGP?!? Michael J. Graffam (mgraffam at mhv.net) http://www.mhv.net/~mgraffam -- Philosophy, Religion, Computers, Crypto, etc "They that can give up essential liberty to obtain a little temporary safety deserve neither liberty nor safety." -- Ben Franklin, ~1784 From mgering at ecosystems.net Thu Sep 17 01:52:53 1998 From: mgering at ecosystems.net (Matthew James Gering) Date: Thu, 17 Sep 1998 16:52:53 +0800 Subject: Cyberpunks Signal-to-Noise Ratio Message-ID: <33CCFE438B9DD01192E800A024C84A192846BC@mossbay.chaffeyhomes.com> What! I can't hear you! You could always filter *aol*, *anon* and *sixdegrees*. Or shout louder (i.e. contribute signal). Matt > -----Original Message----- > From: Jim Burnes [mailto:jvb at ssds.com] > > Far be it from me to complain about the content-free > nature of others postings, but has anyone else noticed > that the signal on cypherpunks is being lost in the noise? From wburton at pipestream.com Thu Sep 17 02:08:13 1998 From: wburton at pipestream.com (Walter Burton) Date: Thu, 17 Sep 1998 17:08:13 +0800 Subject: Encryption and Terrorists Message-ID: <013D438ED22ED2119F630060082F763C04DDD7@kenny.pipestream.com> I hope you don't feel like this (cliche) message has actually accomplished anything. Posting this message to cypherpunks is preaching to the choir. Get out there and actually _DO_ something about it. \\/alter > -----Original Message----- > From: Anonymous [mailto:nobody at nowhere.to] > Sent: Thursday, September 17, 1998 4:15 PM > To: cypherpunks at toad.com > Subject: Encryption and Terrorists > > > Wake up America! Encryption doesn't kill people! Terrorists do. > Would you give the keys to your house to the government? Just in > case they have to break in? NO! How about your ATM PIN #, > just in case > you don't pay your taxes? NO! So don't give out your keys that you use > for > encrpytion and don't let the government have a way to get them either! > > Just say NO to the UNCONSTITUTIONAL idea of Limited Privacy! > After all, > we are not COMMUNISTS. > From nobody at replay.com Thu Sep 17 02:26:16 1998 From: nobody at replay.com (Anonymous) Date: Thu, 17 Sep 1998 17:26:16 +0800 Subject: No Subject Message-ID: <199809172218.AAA29477@replay.com> AIMSX at aol.com wrote: >Hmm, well, you were wrong about many things. > >I use 100 accounts because it is so easy to get all the new users, and the >changed passwords with the way they are set up, so why stop at one, and if >that one is disabled, I would like something to fall back on. d00d! would you mind posting some of those access codes, logon id's, phone numbers? i sure could use a few! certainly you don't need all 100. thanks a million! make sure that you send them to the cypherpunks list so that all the fed guys reading this list will see them. the feds like to use stolen accounts too, they can cover their tracks better that way. TotoMongrel II(tm) From ravage at EINSTEIN.ssz.com Thu Sep 17 02:38:34 1998 From: ravage at EINSTEIN.ssz.com (Jim Choate) Date: Thu, 17 Sep 1998 17:38:34 +0800 Subject: Democracy... (fwd) Message-ID: <199809172303.SAA16982@einstein.ssz.com> Forwarded message: > From: Matthew James Gering > Subject: RE: Democracy... (fwd) > Date: Thu, 17 Sep 1998 14:43:32 -0700 > > There's your first problem, your argument won't stand in the > > No, there is a strict difference between the defining a word and > defining a philosophy coined after that word. The *point* is neither word definition or philosophy, the point *is* the 5,000+ years of human history that define the issues related to the individual, political expression, and religous freedom. The meaning is in the context (not the medium - respects to Marshall). > > Religion and by extension faith are not > > constrained by reason or logic. > > How do you account for this contradiction. I hold a personal philosophy > that is strictly and absolutely constrained by reason and logic. In your mind. You make the same mistake bejillions before you have made and continue to make. Just because you are satisfied with it is no justification to foist it off on me or to expect it will satisfy me. As Santyana said, Those who don't understand history are doomed to repeate it. This is why it is important to not fall into your 'relativistic' abolition of history. > Do you believe in THE FORCE, as described by the great prophet George > Lucas? You really should give up drugs. > If you say "Yes," am I to claim that is your *religious* belief, not > subject to reason, logic or empirical evidence? Absolutely, well except for one very important point. It isn't your claiming it's my religion that makes it so, it's my claiming it that makes it so. What *you* claim is my religion is irrelevant and immaterial. If we follow your plan we would outlaw anything that couldn't be reduced to an equation in some predicate calculus. There is more in heaven and earth than in your philosophy Horatio. ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From jya at pipeline.com Thu Sep 17 02:55:10 1998 From: jya at pipeline.com (John Young) Date: Thu, 17 Sep 1998 17:55:10 +0800 Subject: Jim Bell and CJ Upbeat Message-ID: <199809172250.SAA24991@camel7.mindspring.com> Forwarded message: Subject: Update on Jim Date: Thu, 17 Sep 1998 I spoke with Jim last night. He had been "in the hole", as he calls it, for almost 7 days. This is when he is placed in a cell by himself on a different floor and is not allowed out of it (they bring his food to him, instead of his going to the cafeteria, and can't go out to the social area - to play pool, for instance). He said it was because he had remarked to a warden that she had the ugliest voice in the whole world, after she repeatedly told the inmates to clean up their rooms even though they had complied repeatedly to her demands. (I asked him if he had spent the time reading Atlas Shrugged, and he said he'd done that a bit. I don't think he's much interested in railroads, taking quite some time to get through it, although he told me he's a fast reader). Anyway last night his things had been packed and he expected to be shipped to Oklahoma City this morning. He will be there anywhere from half a day to two days and then be sent on to Springfield, MO for the mental eval. Perhaps he will meet up with Toto there. [End forward] JYA: If it's not been mentioned here CJ was in transit to Springfield over the weekend, being held for unknown reasons in OKC from where he called a fan who passed on the news. He's in good spirits. And Jim is reported to be in good spirits. So it's all worked out, their notoriety a tonic for tired blood, try it, depressives. Both are sassing the jailers, getting railroaded to OKC and Springfield for a bit of mind-bending and -straightening. Are they fit to stand trial, oh yeah, do it, the snakes of Medusa. No one knows what the OKC stopover for Jim or CJ is about, maybe to introduce them to each other (Jim claims to not know CJ -- smart), maybe to kick dirt on the homeplate of Murrah Memorial, get image-counseled by Anita Hill. Jim and CJ in Springfield at the same time, getting heavy mentaled, wordsmith assassination duelers. Now that's a Teen Spirit I'd like to smell. Remember, Music Capital Branson is just down the road from Springfield if cpunks want to gather to banjo code duel. From bmccaffrey at executive.com Thu Sep 17 03:13:55 1998 From: bmccaffrey at executive.com (bmccaffrey at executive.com) Date: Thu, 17 Sep 1998 18:13:55 +0800 Subject: Cuban encryptors Message-ID: <4CBEEB8C7D24D211971500A0C98F15BC02EE90@mail.executive.com> Actually, it was RTF. -----Original Message----- From: jkthomson [mailto:jkthomson at bigfoot.com] makes you wonder what hell they were using for encryption? DES? ------------------------------ September 17, 1998 Web posted at: 11:16 AM EDT (1516 GMT) MIAMI (AP) -- The shadowy world of a low-budget Cuban spy ring came to light in a courtroom, where an FBI agent testified that a suspect's apartment yielded computer diskettes containing coded references to Fidel Castro and plans to sabotage an aircraft hangar. From drussell at ix.netcom.com Thu Sep 17 19:02:03 1998 From: drussell at ix.netcom.com (drussell at ix.netcom.com) Date: Thu, 17 Sep 1998 19:02:03 -0700 (PDT) Subject: "Shamanism and the Drug Propaganda" Message-ID: <199809180201.TAA11203@toad.com> The Birth of Patriarchy and the Drug War. "A magnificent production." Prof. Richard Evans Schultes. 6"x9" Paperback, 365 Pages, 200 Illustrations, Quality Binding. For an illustrated summary of each chapter, and online ordering, go to http://www.kalyx.com. From gbroiles at netbox.com Thu Sep 17 04:15:23 1998 From: gbroiles at netbox.com (Greg Broiles) Date: Thu, 17 Sep 1998 19:15:23 +0800 Subject: your mail In-Reply-To: <3.0.3.32.19980917131557.006c0a00@dowco.com> Message-ID: <199809180022.RAA04718@ideath.parrhesia.com> At 05:28 PM 9/17/98 -0400, mgraffam at mhv.net wrote: >Damn.. are cypherpunks the only people in the universe smart enough to use >PGP?!? And a lot of good it's done the two who've been busted so far .. doesn't look like encryption is a serious obstacle to legitimate law enforcement to me. -- Greg Broiles��������|History teaches that 'Trust us' gbroiles at netbox.com�|is no guarantee of due process. |_Kasler v. Lundgren_, 98 CDOS 1581 |(March 4, 1998) From ravage at EINSTEIN.ssz.com Thu Sep 17 04:48:18 1998 From: ravage at EINSTEIN.ssz.com (Jim Choate) Date: Thu, 17 Sep 1998 19:48:18 +0800 Subject: your mail (fwd) Message-ID: <199809180114.UAA00306@einstein.ssz.com> Forwarded message: > Date: Thu, 17 Sep 1998 17:16:16 -0700 > From: Greg Broiles > Subject: Re: your mail > At 05:28 PM 9/17/98 -0400, mgraffam at mhv.net wrote: > > >Damn.. are cypherpunks the only people in the universe smart enough to u= > se > >PGP?!? > > And a lot of good it's done the two who've been busted so far .. doesn't > look like encryption is a serious obstacle to legitimate law enforcement = > to > me. Mitnick certainly took advantage of it. ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From nnburk at cobain.hdc.net Thu Sep 17 04:57:29 1998 From: nnburk at cobain.hdc.net (nnburk) Date: Thu, 17 Sep 1998 19:57:29 +0800 Subject: Cyberpunks Signal-to-Noise Ratio In-Reply-To: <33CCFE438B9DD01192E800A024C84A192846BC@mossbay.chaffeyhomes.com> Message-ID: <3601CBEA.2407@yankton.com> Think of it as dietary fiber for the mind. Matthew James Gering wrote: > > What! I can't hear you! > > You could always filter *aol*, *anon* and *sixdegrees*. > > Or shout louder (i.e. contribute signal). > > Matt > > > -----Original Message----- > > From: Jim Burnes [mailto:jvb at ssds.com] > > > > Far be it from me to complain about the content-free > > nature of others postings, but has anyone else noticed > > that the signal on cypherpunks is being lost in the noise? From edsmith at IntNet.net Thu Sep 17 05:09:36 1998 From: edsmith at IntNet.net (Edwin E. Smith) Date: Thu, 17 Sep 1998 20:09:36 +0800 Subject: Larry Gilbert, AOLers, and the Hyper-real flamer In-Reply-To: <491b5a5b.36017891@aol.com> Message-ID: <3.0.2.32.19980917202904.007cf100@mailhost.IntNet.net> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 If you are using the accounts of others without permission then you are a thief and you don't come up to the standards of the least intelligent user at AOL or anywhere else for that matter. You will eventually be caught and hopefully be put away somewhere dark where the guards will not care how loud you scream. Of course you will think this is an empty threat but it is not a threat at all. It is a prediction. You are to young and stupid to cover your tracks well enough to not be caught. If you are just boasting then grow up! Edwin At 05:01 PM 9/17/98 EDT, you wrote: >Hmm, well, you were wrong about many things. >The ISP runs RH5.1 > >I don't use the passwd file for anything, as it is shadowed. > >I don't work there. > >I use 100 accounts because it is so easy to get all the new users, and the >changed passwords with the way they are set up, so why stop at one, and if >that one is disabled, I would like something to fall back on. > >You just don't understand anything about why I do what I do. If you were >illegally using an account, would you want to ONLY have 1? Why wouldn't you >want to know you had something to fall back on if that one is disabled? > -----BEGIN PGP SIGNATURE----- Version: PGP for Personal Privacy 5.0 Charset: noconv iQA/AwUBNgGpT0mNf6b56PAtEQI9JgCgsxStWBToflPThdDxKtC5FbKSQW0AoL1q +lQtbTDzSczsuydtLxHf5xTg =7oZw -----END PGP SIGNATURE----- From ravage at EINSTEIN.ssz.com Thu Sep 17 05:16:01 1998 From: ravage at EINSTEIN.ssz.com (Jim Choate) Date: Thu, 17 Sep 1998 20:16:01 +0800 Subject: Contacting Congress (fwd) [somebody subscribed me?] Message-ID: <199809180142.UAA00487@einstein.ssz.com> Forwarded message: >From APFN at netbox.com Thu Sep 17 19:52:20 1998 Message-ID: <36019E31.D13F11E6 at netbox.com> Date: Thu, 17 Sep 1998 16:41:37 -0700 From: American Patriot Friends Network Reply-To: APFN at netbox.com Organization: American Patriot Friends Network X-Mailer: Mozilla 4.05 [en] (Win95; I) MIME-Version: 1.0 To: "\"apfn at onelist.com\"" Subject: Contacting Congress Content-Type: multipart/mixed; boundary="------------835B6AC49DD57848B52A976B" This is a multi-part message in MIME format. --------------835B6AC49DD57848B52A976B Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit +++ CONGRESS +++ U.S. CONGRESS - CALL 1-800-504-0031 OR 202-224-3121 1-800-343-3222 >The new number is: 1-800-361-5222 (90001). When you call the number, > follow the prompts. When asked for your 5 letter zip code, enter the > number 90001. You will be connected to the main capitol switchboard. > Just ask for the congressman or the senator you wish to speak to. If you > enter your home zip code, you will be connected directly to your > Congress "CRITTER". (Congressman or Senator)Posted:08/11/98 Contact Congress via the net - Elected Net: http://www.hoboes.com/html/Politics/electednet/ Netline To Congress - Question of the Day http://www.netline-to-congress.com/ The Best Congress Money Can Buy http://mojones.com/COINOP_CONGRESS/data_viewer/data_viewer.html SENATE: http://www.senate.gov SENATE EMAIL ADDRESS: http://www.senate.gov/senator/membmail.html http://www.senate.gov/senator/state.html Senate Judiciary Committee members with contact information: http://www.senate.gov/committee/judiciary.html Senate - send email: http://www.freecongress.org/jsmp/ContactSenators.htm *** Letter to Senators: http://members.foothills.net/ricefile/index.html HOUSE OF REPRESENTATIVES - http://www.house.gov House Of Representatives (EMAIL) http://www.house.gov/writerep/ House Judiciary Committee members with contact information: http://www.house.gov/judiciary/mem105.htm HOUSE AS THE SPEAKER http://speakernews.house.gov/asknewt/ QUICK SEARCH TEXT OF BILLS 105th CONGRESS: http://thomas.loc.gov/home/thomas.html?66,9 HOUSE - DOWNLOADING BILL TEXT http://thomas.loc.gov/home/billdwnloadhelp.html CONTRACTING CONGRESS http://www.visi.com/juan/congress/ Here's a timely jewel. James Traficant's (D-Ohio) one-minute speech before House on September 15th. James Traficant (D-Ohio) Home Page http://www.house.gov/traficant/ E-mail: telljim at mail.house.gov (Rep. Jim Traficant D-OH) AN AMERICA WITH TWO LEGAL STANDARDS IS AN AMERICA WITH NO LEGAL STANDARDS September 15, 1998 Mr. Speaker, if Joe Q. Citizen lied in a civil trial, he would be sued for every penny. If Joe Q. Citizen lied to a Grand Jury, he would go to jail. Lying is perjury. Perjury is a crime. Now, having said that, what is going on here, Mr. Speaker? Does America now have two legal standards, one for you, one for me; one for he, one for she; one for generals, one for soldiers; one for Presidents, one for residents? Let us tell it like it is. Joe Q. Citizen cannot apologize, Joe Q. Citizen is not censured, Joe Q. Citizen is prosecuted. And let me warn Congress: An America with two legal standards is an America with no legal standards. Mr. Speaker, I yield back the balance of the lives of all of the soldiers that gave their lives fighting to preserve our freedom. Media & Patriot Web Pages: (Bookmark) http://home.rica.net/CaptainNemo/pers/patsites.htm --------------835B6AC49DD57848B52A976B Content-Type: message/rfc822 Content-Transfer-Encoding: 7bit Content-Disposition: inline Received: (from apfn at localhost) by netbox.com (8.8.8/8.8.7) id JAA02055 for pamrobin at caliente.igate.com; Thu, 17 Sep 1998 09:37:44 -0700 (PDT) (envelope-from apfn) Received: from gull.prod.itd.earthlink.net (gull.prod.itd.earthlink.net [207.217.120.85]) by netbox.com (8.8.8/8.8.7) with ESMTP id JAA02050 for ; Thu, 17 Sep 1998 09:37:44 -0700 (PDT) (envelope-from idzrus at earthlink.net) Received: from idzrus.earthlink.net (1Cust129.tnt7.krk1.da.uu.net [208.254.8.129]) by gull.prod.itd.earthlink.net (8.8.7/8.8.5) with SMTP id JAA18157; Thu, 17 Sep 1998 09:35:34 -0700 (PDT) Message-Id: <3.0.5.32.19980917093214.0356e100 at mail.earthlink.net> X-Sender: idzrus at mail.earthlink.net X-Mailer: QUALCOMM Windows Eudora Light Version 3.0.5 (32) Date: Thu, 17 Sep 1998 09:32:14 -0700 To: idzrus at earthlink.net From: "W.G.E.N." Subject: Contacting Congress via e-mail Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Real-To: "W.G.E.N." >From: gardener at southtech.net >X-Sender: gardener at southtech.net >X-Mailer: QUALCOMM Windows Eudora Light Version 3.0.5 (32) >Date: Thu, 17 Sep 1998 08:34:34 -0400 >To: (Recipient list suppressed) >Subject: Contacting Congress via e-mail > >X-Sender: tbark at nwark.com >X-Mailer: QUALCOMM Windows Eudora Pro Version 4.0.1 >Date: Wed, 16 Sep 1998 22:14:25 -0500 >To: "1a-TBA Members & Friends" >From: Take Back Arkansas >Subject: Contacting Congress via e-mail > >MAKE YOUR VOICES HEARD, PLEASE! HERE'S HOW. md > >Date: Thu, 10 Sep 1998 10:59:19 -0700 >From: David Dorman >Organization: University of Idaho >Subject: Contacting Congress via e-mail > >In searching for Congressional e-mail addresses recently, I found the >below listed web site. For those of you who have tried to contact many >members of Congress at once you know how time consuming the process can >become. > >ElectedNet! will allow you to search for a single member by name, state, >just one party, etc. or you can e-mail all members of Congress at once. >It provides an effective way to quickly get your message out and uses >your e-mail program not some "fill in the blanks" type interface. Using >this method you will be able to use your spell checker and retain a copy >of the messages sent for future reference. > >In order to improve the impact of your message you should format your >e-mail like a standard mail letter to congress (minus the TO: section) >and INCLUDE your return mailing address. Most members of Congress will >not reply via e-mail but by U.S. Postal Service, so your return address >is critical. This is probably to prevent someone from changing an >e-mail reply and forwarding without their approval. > >Even if you send a letter (e-mail) to a Congressional member who is not >in your voting district, they will usually respond and track the number >of letters for or against an issue. With this web site it is easy to >just "click" on another name to be included in your letter to Congress >and the more letters some staff person has to send out the greater the >impact your message will have during the weekly Congressional office >staff meetings. > > >http://www.hoboes.com/html/Politics/electednet/ > > > > > >Mary Denham, State Coordinator Take Back Arkansas, Inc. >2167 N. Porter Rd. Fayetteville, AR 72704 >Fax 501/521-1724 Pho 501/521-1933 >TBA website http://www.nwark.com/~tbark > > > > > --------------835B6AC49DD57848B52A976B-- From kdbf50c4 at auto.sixdegrees.com Thu Sep 17 05:34:36 1998 From: kdbf50c4 at auto.sixdegrees.com (sixdegrees) Date: Thu, 17 Sep 1998 20:34:36 +0800 Subject: Your new password Message-ID: <199809180128.SAA10967@toad.com> Name: Joe Cypherpunk sixdegrees password: fazefour Congratulations Joe. You're well on your way to becoming a full sixdegrees(tm) member. Here is your member password: fazefour. Use it to log-in on the home page at the sixdegrees Web site, http://www.sixdegrees.com. We'll ask you for a little more information to complete your registration, and then you'll be ready to start networking. It's important that you return to the site and log-in. Your membership will not be complete until you do so. Once you've successfully logged in with your password, just go to Personal Profile and you'll be able to choose your own password. Thanks for becoming part of sixdegrees. We're looking forward to seeing you at the site. ==================================================================== PLEASE NOTE: All replies to this address are processed by a computer. If you believe you received this e-mail in error, and it was not your intention to become a sixdegrees member, or if you have any problems, questions or requests send an e-mail to issues at sixdegrees.com and someone will get back to you as soon as possible. ==================================================================== E.SI.BAM.1 From die at pig.die.com Thu Sep 17 06:29:37 1998 From: die at pig.die.com (Dave Emery) Date: Thu, 17 Sep 1998 21:29:37 +0800 Subject: Mobile phone tracking, pagers, etc In-Reply-To: <33CCFE438B9DD01192E800A024C84A192846AF@mossbay.chaffeyhomes.com> Message-ID: <19980917222329.A1364@die.com> On Thu, Sep 17, 1998 at 11:56:02AM -0700, Matthew James Gering wrote: > > Regarding the tracking of mobile phones, are all current types of phones > susceptible? > > There was a recent post here regarding tracking of GSM phones. > TDMA/CDMA, analog/digital, PCS-band, etc, are they all equally capable > of being tracked? All the wireless standards I am aware of allow for registration and polling phones to find out if they are on and available without ringing them. This provides silent location information to the nearest cell of a phone merely turned on, location which may be hundreds of feet in tightly congested urban areas and tens of square miles in suburban and less populated areas. Some system operators apparently use this feature with all active phones to relieve congestion on paging channels, while others do not actively track phones not being used except in certain situations or parts of the network. Of course location to a cell is always available during a call... The FCC has mandated that this cell-granularity location information be made available to E-911 centers on emergency calls, and there may be some situations in which it is currently made available to domestic law enforcement under other circumstances, though CALEA restricts such availability without warrents. Whether and under what circumstances law enforcement can request a poll be transmitted (re-registration) to locate a silent but powered phone is less clear. It would seem that CALEA forbids this, but what in fact is the practice by such agencies as the FBI working quietly with cell carriers in places such as NYC is less clear. In the future FCC rules will require that all E-911 calling wireless phones be located to 125 meters 67% of the time. There are proposals to do this with differential time of arrival (DTOA) or other direction finding techniques (apparently a hard problem in cities with lots of multipath propagation due to reflections) that work passively on some or all cell calls and registrations (thus allowing tracking of everybody), or by cooperation with the cellphone handset that could be only turned on when the user wished to be located (an E-911 emergency) and disabled otherwise. One version of this would use GPS rather than ranging or other techniques to determine position relative to the cell sites. Of course all the user disaablable techniques such as GPS and DTOA done in the handset firmware only will work with future cell firmware and hardware and not legacy handsets, and because of this may not be acceptable to the FCC. There are some distinctions between CDMA, GSM, analog and TDMA (non GSM), in respects to exactly how easy it is to implement precision location meeting the FCC spec passively and on all calls at all times. Apparently CDMA with its very tight power control to minimize the near-far problem makes it fairly awkward to reliably triangulate position from multiple sites since the mobile may be only detectable at one site at any time... What this means in practice is that some wireless technologies are more likely to require some definate active firmware intervention to do precision location, whilst others may allow it with no special intervention. If the FCC allows this intervention to be enabled by a user, this may provide some opportunity for location privacy. > > However pagers are not, correct? They just broadcast an entire area to > page instead of the pager keeping the network informed of their > location. The one way pagers work this way. The guaranteed delivery two way pagers do support registration and will know the location of the pager after a page has been sent to it and any time the system wants to determine it. This location will be quite coarse with current two way (reFlex) pagers with cell sites some distance apart, but DF techniques are quite possible and could be implemented by law enforcement or spooks or other interested groups. Unlike wireless phones there is no current FCC requirement for positioning information distribution or precision positioning infrastructure, so two way pagers aren't likeyly to be routinely located accurately any time soon. Of course most modern wireless phones support paging message delivery, so more and more people will be using wireless phones with the FCC mandated tracking accuracy for paging... > > One thing I have long wondered: Why don't they make phones that > "wake-up" by a paging signal and then accept the call? It might increase > the connect time significantly, but it would also increase the potential > stand-by time indefinitely, and the location of the user is only exposed > when calls are in progress, not while the phone is on stand-by. > Wireless phones do currently work this way. They listen to the forward control channel for a paging message that says they have got a call coming in and only then do they transmit. The amount of power used in transmitting would quickly use up the battery if they continuously broadcast. The problem with cellphone location is that they can also be paged with a registration request that does not cause them to ring or show any evidence of transmitting, but sends back a brief message burst (not using much battery). This can be made to happen every so often, or only when polled. > Are there any paging services (particularly alpha paging) that work on a > global scale? You would think daily pager rental service (esp. at > airports) would be popular. You could have an email address, even a > static phone number, that could re-route messages to any pager that you > happen to have at the time (PSTN-IP-PSTN, or even easier if the pager > service gives SMTP addresses, which most do these days). > There are nationwide pager services that broadcast your pages over very wide areas or depend on registration to locate you down to a smaller area. But yes, you can get paged anywhere in the US and several other countries. And the new LEO satellite technology will allow paging over whole continents or potentially anywhere in the world. > Similarly a PSTN-IP-PSTN interface for voice could give you a static > phone number that you could dynamically forward anywhere untraceably. The LEAs don't like this concept, and one of the provisions of the CALEA wiretap stuff is providing tracing of calls forwarded so you can't do this.... -- Dave Emery N1PRE, die at die.com DIE Consulting, Weston, Mass. PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2 5D 27 BD B0 24 88 C3 18 From shamrock at cypherpunks.to Thu Sep 17 06:29:50 1998 From: shamrock at cypherpunks.to (Lucky Green) Date: Thu, 17 Sep 1998 21:29:50 +0800 Subject: your mail (fwd) In-Reply-To: <199809180114.UAA00306@einstein.ssz.com> Message-ID: Mitnick is in jail. Crypto or no crypto. ---Lucky On Thu, 17 Sep 1998, Jim Choate wrote: > > Forwarded message: > > > Date: Thu, 17 Sep 1998 17:16:16 -0700 > > From: Greg Broiles > > Subject: Re: your mail > > > At 05:28 PM 9/17/98 -0400, mgraffam at mhv.net wrote: > > > > >Damn.. are cypherpunks the only people in the universe smart enough to u= > > se > > >PGP?!? > > > > And a lot of good it's done the two who've been busted so far .. doesn't > > look like encryption is a serious obstacle to legitimate law enforcement = > > to > > me. > > Mitnick certainly took advantage of it. > > > > ____________________________________________________________________ > > The seeker is a finder. > > Ancient Persian Proverb > > The Armadillo Group ,::////;::-. James Choate > Austin, Tx /:'///// ``::>/|/ ravage at ssz.com > www.ssz.com .', |||| `/( e\ 512-451-7087 > -====~~mm-'`-```-mm --'- > -------------------------------------------------------------------- > > -- Lucky Green PGP v5 encrypted email preferred. From nobody at replay.com Thu Sep 17 06:35:10 1998 From: nobody at replay.com (Anonymous) Date: Thu, 17 Sep 1998 21:35:10 +0800 Subject: remove Message-ID: <199809180220.EAA14123@replay.com> On Thu, 17 Sep 1998, zKRv wrote: > > remove > > Please! Not here, zKRv! Please do that in the privacy of your own home or, following the U.S. President's example, in the halls of the White House or in front of a window in the Oval Orifice. From ravage at EINSTEIN.ssz.com Thu Sep 17 06:38:39 1998 From: ravage at EINSTEIN.ssz.com (Jim Choate) Date: Thu, 17 Sep 1998 21:38:39 +0800 Subject: your mail (fwd) Message-ID: <199809180305.WAA01592@einstein.ssz.com> Forwarded message: > Date: Fri, 18 Sep 1998 04:31:40 +0200 (CEST) > From: Lucky Green > Subject: Re: your mail (fwd) > Mitnick is in jail. Crypto or no crypto. True, but unlike these other guys they haven't been able to de-crypt the data and use it against him, and they have denied him access to retrieve files that supposedly prove his innocence, definitely making the big boys look more than a tad oppressive. Add onto this the physical abuse that is supposed to have occurred and it becomes to be seen as an issue irrespective of his crimes. I would say that in Mitnick's case the use of crypto has worked to his long-term advantage. ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From mix at anon.lcs.mit.edu Thu Sep 17 07:25:30 1998 From: mix at anon.lcs.mit.edu (lcs Mixmaster Remailer) Date: Thu, 17 Sep 1998 22:25:30 +0800 Subject: New project Message-ID: <19980918032005.24338.qmail@nym.alias.net> Fun thing to do...... read the Starr Report, then find all the days and times that they did nasty stuff..... then find pix of the President at public engagements, meetings, speeches, etc. just before and just after these sex acts....... set up a Web Site with these pix of him speaking, or shaking hands with an old lady, or talking to a class of kids......put in the HTML Page how many minutes, hours, ect., before or after the pix was taken that he was doing what act!!!!!!!!!!! SOMEBODY DO THIS, IT WILL BE FUNNY HA HA!!!!!! P.S. This is not my original Idea, everbody's talking about it here at work, and I don't know how to get to the right databases to find the pix, so don't ask me................. From mah248 at nyu.edu Thu Sep 17 07:31:04 1998 From: mah248 at nyu.edu (Michael Hohensee) Date: Thu, 17 Sep 1998 22:31:04 +0800 Subject: Larry Gilbert, AOLers, and the Hyper-real flamer In-Reply-To: <491b5a5b.36017891@aol.com> Message-ID: <3601D3DD.79E5E5C2@nyu.edu> AIMSX at aol.com wrote: > > Hmm, well, you were wrong about many things. > The ISP runs RH5.1 Which is not significant to this discussion, as Linux does NFS too. You have raised an irrelevant point in your (attempt at a) defense. Me: 1 You: 0 > I don't use the passwd file for anything, as it is shadowed. What part of "or equivalent" don't you understand? If you don't already know, even in a shadowed system, the encrypted passwords reside *somewhere*. If you knew that already, you have again raised an irrelevant point in your attempt at a defense. Me: 2 You: 0 > I don't work there. So? I was just giving an example of what it is to have an account on a network which uses NFS. I won't even bother awarding myself a point for this one, but you lose one, for such a pointless statement. Me: 2 You: -1 > I use 100 accounts because it is so easy to get all the new users, and the > changed passwords with the way they are set up, so why stop at one, and if > that one is disabled, I would like something to fall back on. Ohhhh, I see. You really *do* have 100 different logins! Now, back to my original question: "Wtf do you use 100 different accounts for?" Hmm, so what you're essentially saying is, you're doing some stuff that might get your account disabled (such as email bombing, spamming, posting moronic stuff to usenet, or downloading too much kiddie porn). Now let's all think really hard for a second. Who could possibly be the cause of any disabling that occurs to this fellow's account? Could it be, the ISP? *YES*, (you win a cookie). Now, if the ISP's sysadmin looks at this fellow's account and says, hmm, I'm going to disable this loser's account, mightn't that very same sysadmin think to himself, "ooo, look at this, the guy's got 99 other accounts. Maybe I'd better disable them, too, otherwise, disabling this one account won't have much of an effect." Ok class, it's time for a quiz. In the scenario above, what kind of good would having 100 different accounts at the same ISP do you? The answer? Absolutely None. > You just don't understand anything about why I do what I do. No no, I understand completely. You're an idiot. :) > If you were > illegally using an account, would you want to ONLY have 1? Oh, you're using it *illegally*? Why didn't you say so *before*? In that case, my flaming becomes so much easier. When your (unwitting) ISP disables one of your accounts, they will very likely run a check on their system for any other little nasties which may be around. (as they will assume that their system has been compromised at superuser level) They will very easily find the accounts which shouldn't technically exist, and delete them. If, on the other hand, you've just found the passwords for a bunch of otherwise legitimate users, you'll be screwed when the ISP sends an email to all the users telling them to change their passwords. > Why wouldn't you > want to know you had something to fall back on if that one is disabled? Because having X number of extra accounts at a single ISP will *not* give you anything to fall back upon when one of them is disabled. But don't worry, I seriously doubt that you have the knowledge necessary to do anything more obnoxious than send foolish emails to the cypherpunks list. From gbroiles at netbox.com Thu Sep 17 07:57:04 1998 From: gbroiles at netbox.com (Greg Broiles) Date: Thu, 17 Sep 1998 22:57:04 +0800 Subject: Mark Twain/Mercantile dumps Digicash Message-ID: According to , Mark Twain Bank/Mercantile Bank will no longer support DigiCash. They are no longer listed as an issuer of ecash on Digicash' website. Neither organization seems to have information available via the web about the decision to terminate the service. -- Greg Broiles gbroiles at netbox.com From schear at lvcm.com Thu Sep 17 07:58:14 1998 From: schear at lvcm.com (Steve Schear) Date: Thu, 17 Sep 1998 22:58:14 +0800 Subject: Mobile phone tracking, pagers, etc In-Reply-To: <33CCFE438B9DD01192E800A024C84A192846AF@mossbay.chaffeyhomes.com> Message-ID: >On Thu, Sep 17, 1998 at 11:56:02AM -0700, Matthew James Gering wrote: > There are some distinctions between CDMA, GSM, analog and TDMA >(non GSM), in respects to exactly how easy it is to implement precision >location meeting the FCC spec passively and on all calls at all times. >Apparently CDMA with its very tight power control to minimize the near-far >problem makes it fairly awkward to reliably triangulate position from >multiple sites since the mobile may be only detectable at one site >at any time... What this means in practice is that some wireless >technologies are more likely to require some definate active firmware >intervention to do precision location, whilst others may allow it >with no special intervention. If the FCC allows this intervention >to be enabled by a user, this may provide some opportunity for >location privacy. If you can get hold of the older, analog, 'transportable' cell phones (like Motorola used to make) which have an antenna connector, its relatively easy to spoof the cell ranging system. Just connect a directional antenna (<$75) to the port (corner reflectors which have excellent front-to-back ratios are particularly good). You should easily be able to fool their signal strength based equipment into thinking your in an adjacent cell. If you can find high ground so much the better. > > >> >> > Wireless phones do currently work this way. They listen to the >forward control channel for a paging message that says they have got a >call coming in and only then do they transmit. The amount of power used >in transmitting would quickly use up the battery if they continuously >broadcast. The problem with cellphone location is that they can also be >paged with a registration request that does not cause them to ring >or show any evidence of transmitting, but sends back a brief message >burst (not using much battery). This can be made to happen every >so often, or only when polled. Universal, an early U.S. analog cellular mfg. built this sort of unit in the early '90s. It was an idea ahead of its time. >> Similarly a PSTN-IP-PSTN interface for voice could give you a static >> phone number that you could dynamically forward anywhere untraceably. > > The LEAs don't like this concept, and one of the provisions of >the CALEA wiretap stuff is providing tracing of calls forwarded so you can't >do this.... Yhis is a great cypherpunk service. Allow our fellows to make free local, VoIP, calls from our PC/PSTN links. --Steve --------------------------------------------------------------------- reply to schear - at - lvcm - dot - com --- PGP mail preferred, see http://www.pgp.com and http://web.mit.edu/network/pgp.html RSA fingerprint: FE90 1A95 9DEA 8D61 812E CCA9 A44A FBA9 RSA key: http://keys.pgp.com:11371/pks/lookup?op=index&search=0x55C78B0D --------------------------------------------------------------------- From mah248 at nyu.edu Thu Sep 17 08:18:08 1998 From: mah248 at nyu.edu (Michael Hohensee) Date: Thu, 17 Sep 1998 23:18:08 +0800 Subject: Democracy... (fwd) The Nature of Religion In-Reply-To: <33CCFE438B9DD01192E800A024C84A192846AD@mossbay.chaffeyhomes.com> Message-ID: <3601E054.999D3DE2@nyu.edu> Actually, you may be interested to know that *everyone* is religious, in some manner. Everyone has at least one untestable assumption about the world. That is, everyone has a kind of faith. Let's give some examples: Christians believe that there exists a Being, called God, which somehow created the universe and guides (or not, depending on whether or not you're a Deist) its development. Furthermore, they believe that Jesus Christ was the son of God. This is an untestable assumption. Nobody can *prove* that God exists. They simply choose to act on the assumption that He does. Moslems believe in the existance of a different God, and have different rules and details in their religion, but their fundamental assumption is the same. God exists. God created the universe. They can't prove any of it, but they nevertheless choose to act as if it is true. Atheists believe that God *doesn't* exist, which is essentially the same kind of belief that is described above. If you can't prove that God *does* exist, you can't prove that He doesn't exist either. This is their untestable assumption about the universe. Even people who are nonreligious, or agnostic, have a religion. For them the question is not whether or not God exists,--they don't know one way or the other-- but whether or not the *universe*, (the external world) exists apart from themselves. After all, if I choose to believe that the universe doesn't exist, and is instead some dream that I'm entertaining myself with, there is no test you can perform which can convince me otherwise. Similarly, if I choose to believe that the universe *does* exist apart from myself, there is no test that can be carried out what will convince me otherwise (because, if it *doesn't* exist, I must be very good at decieving myself). The Transcendentalists of the 19th century, for example, do not really believe that the universe exists apart from themselves. They believe that the human mind (or, more specifically and honestly, their minds) are what governs the way the universe works. To them, when men "discover" new effects in nature, those effects are a direct result of the discovery. That is, that the belief in the effects are what cause the effects. To them, the map is the territory. Scientists tend to think differently. Their beliefs can be described by those laid out in General Semantics. "The map is not the territory; the word is not the thing." That is, the universe exists *apart* from our conceptions of it. This is my personal religion. I begin from the fundamental assumption that the universe does in fact exist apart from myself, and base all further beliefs on that. I personally feel that this philosophy is one of the most mature and socially responsible ones in existance, because, knowing that the universe is not in fact something I've dreamed up, I know that other people are emphatically *not* mine, and that I have no natural right to impose my will upon them in any coercive way. This is quite different from the stance that many God followers and Transcendentalists take. But then, that's just my biased point of view, since I'm religious and everything. :) Matthew James Gering wrote: > > > Atheism means that one believes that there is no God. > > You trying to claim atheism is a religion itself is like the christians > always claiming non-christians are satin worshippers. Forget about the > origination of the word, in today's reality most atheists simply forgo > religion completely. > > There is no reason to think that a god does exist, so why would one even > need to think about or believe in the negative. > > > Ah, so there are personal beliefs that aren't religion and > > then there are personal beliefs that are? > > Yes, beliefs based on valid reason, empiricism and science are not > religious, the generally follow the path from conjecture to theory to > fact. You may hold lots of personal conjecture that do qualify as > beliefs but are not religious in nature, they are not exempt from > empirical evidence and the laws of thermodynamics. Beliefs based on > faith and mysticism are religious. Religion is irrational. > > > What a self-rightous, pretentious, egotistical viewpoint. > > Thank you. > > > Actualy not, the vast majority of people believe in God, just not your > > particular brand - which after all is what the 1st is all about. > > Perhaps in Bible-belt Texas, not around here (not in the city anyway). > > Matt From nobody at replay.com Thu Sep 17 08:38:31 1998 From: nobody at replay.com (Anonymous) Date: Thu, 17 Sep 1998 23:38:31 +0800 Subject: Scorched Earth Message-ID: <199809180440.GAA25125@replay.com> URL: http://cnn.com/TRANSCRIPTS/9808/09/se.01.html :: Special Event :: :: Investigating the President: Can Bill Clinton Escape the Perjury Trap? :: :: Aired August 9, 1998 - 4:00 p.m. ET :: :: :: Gene Randall in Washington :: DAVID CORN, "THE NATION" MAGAZINE :: DONALD LAMBRO, "WASHINGTON TIMES" :: ALEXIS SIMENDINGER, "NATIONAL JOURNAL" :: :: :: RANDALL: Don, you've got a story today about what could happen if :: Republicans press for impeachment on, basically, a sex case against the :: president. A Democratic scorched-earth policy against the GOP. Tell us :: about that? :: :: LAMBRO: Well, a number of reports, and I talked to other Democrats who :: confirm this, that if this goes to House of Representatives, if there is :: an impeachment inquiry, it is going to be a scorched-earth policy by the :: Democrats to go after the Republicans in the House, in the leadership, :: dig up all the dirt they can on leadership, on members, Republican members :: of the House Judiciary Committee. It's going to be the same thing they :: did in campaign finance scandal -- Everybody does it, what's the big deal. :: :: RANDALL: Would this fly? :: :: CORN: Well, people I talk to don't really have a -- it's more a sentiment :: than a plan. And I don't think it's actually going to come into being :: because we're not even going to get close to impeachment, because it's :: just not in the Republicans' political interest to drag this stuff up, :: and if people go back look at what Newt Gingrich did with his first :: wife, and all this stuff. It's just -- they have no political interest :: in doing this, so they will not do so. :: :: RANDALL: We got to get Alexis in here. :: :: SIMENDINGER: You don't need to execute the plan. You just have to let :: people think it's out there, and it's going to have a chilling effect. :: :: LAMBRO: The Democrats, I think, are closer than you think. They just hired :: three lawyers to prepare them for impeachment on the Judiciary Committee. :: :: CORN: Well, how many have the Republicans hired already; they have a :: whole task force on impeachment that has been studying the issue. They :: are going to blink. They are not going to do this. :: :: LAMBRO: All right, three attorneys to prepare them for impeachment :: proceedings. :: :: RANDALL: Let's all take time to blink, because we must take a :: break. Coming up, memories of Watergate and those who caution on getting :: those memories straight. Stay with is. :: :: (COMMERCIAL BREAK) From rah at shipwright.com Thu Sep 17 08:39:08 1998 From: rah at shipwright.com (Robert Hettinga) Date: Thu, 17 Sep 1998 23:39:08 +0800 Subject: Questions for Magaziner? Message-ID: I spoke at the Electronic Payments Forum here in Boston today, and, tomorrow, the keynote for tomorrow's lunch is Ira Magaziner. (BTW, Bill was speaking tonight at the same hotel the conference is in, probably a bilderberger conspiracy thing, and, when I got out, there was about a thousand protesters, about 80/20 against, complete with one guy dressed as a giant cigar, shades of Butt Man?, and a couple of women with big brunette hair and blue dresses on. With pearl necklaces, of course...) Anyway, In light of more recent crypto-shenanigans from Billary, and the fact that this thing's a small crowd, I figured I'd ask if anyone on these lists had a question they wanted me to ask him. One I want to ask, right off the top of my head is, "Given your recent successes in regulating foreign cryptography, what's your timetable for regulating domestic cryptography?" ;-). (To the extent that they already *do*, or not, I'll leave as an exercise for the reader...) Cheers, Bob Hettinga ----------------- Robert A. Hettinga Philodox Financial Technology Evangelism 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From k-elliott at wiu.edu Thu Sep 17 08:49:46 1998 From: k-elliott at wiu.edu (Kevin Elliott) Date: Thu, 17 Sep 1998 23:49:46 +0800 Subject: Democracy... In-Reply-To: <19980916072612.3520.qmail@hotmail.com> Message-ID: >I agree with you completely when you state that religion, ethics, and >law are distinct and different things. Unfortunately in the United >States they have a strong tendency to become intertwined. The law as it >stands is that impeachment is only to be used in cases of high crimes >and misdemeanors. Now I have not read the entire Starr report nor do I >have a sophisticated background in law nevertheless nothing Bill has >done seems to qualify as worthy of impeachment under the law. However, >the sexual acts and behaviour exhibited by him is deeply repugnant to >many on ethical grounds and particularly repugnant to Christians >specifically. I do not have any problem at all with those who are >disgusted by the presidents behaviour on ethical or religious grounds, I >personally find it repulsive. I do however feel, as I believe you are >saying also, that the law is law. It should be executed in a fair and >just manner and according to the letter ( which may or may not lead to >impeachment ). The previous poster to which I replied seemed to be very >clearly stating that his personal religious code of ethics took >precedence over american legal codes, a viewpoint which I cannot agree >with. All debate on the precice origin and validity of 'seperation of >church and state' aside I cannot recall any part of the constitution >which invokes divine justice. The impeachment issue is not one of >ethics or religion, simply law and law alone. > >Vivek Vaidya I a word, bullshit. The constitution the way the constitution was phrased makes it very clear- YOU DO NOT HAVE TO COMMIT A CRIME TO BE GUILTY OF IMPEACHABLE OFFENSES!!! Many people have been impeached in Americas history and most were not guilty of a crime, ie their offenses were not legal crimes or they were never prosecuted for the crime they were impeached and tried for. Fact- the president has commited perjury. That is undeniable, Starr has presented his evidence very clearly and I don't think that needs to be rehashed. Are his actions sufficient to yield a criminal conviction in the "real world"? In a general sense yes but in a broader sense that is completely irrelevant to the question at had. A parking ticket is suffiecent to qualify as an impeachable offense under the constitution ("high crimes and MISDEMEANORS) but again that isn't relevant. For the sake of argument I will through out all criminal conduct, all perjury issues, obstruction of justice, possible sexual assault, everything. What we are left with is a president who engaged in gross sexual misconduct with a women under his employment. That is ethical misconduct of the most aggregious kind. It undermines authority, disturbs professional atmosphere necessary for a smoothly functioning organization. In any corporation in America it would, by custom and, in some jurisdictions, law, be grounds for immediate dismissal. Impeachment is exactly that. It imposes no punishments, no jail time, no fines, it simply removes an official from the position he has failed to faithfully execute. ___________________________________________________________________________ "DOS/WIN based computers manufactured by companies such as IBM, Compaq, Tandy, and millions of others, are by far the most popular, with about 70 million machines in use worldwide. Macintosh fans, on the other hand, note that cockroaches are far more numerous than humans, and that numbers alone do not denote a higher life form." - New York Times -Kevin "The Cubbie" Elliott From brian at smarter.than.nu Thu Sep 17 09:16:25 1998 From: brian at smarter.than.nu (Brian W. Buchanan) Date: Fri, 18 Sep 1998 00:16:25 +0800 Subject: Democracy... In-Reply-To: Message-ID: On Thu, 17 Sep 1998, Kevin Elliott wrote: > completely irrelevant to the question at had. A parking ticket is > suffiecent to qualify as an impeachable offense under the constitution > ("high crimes and MISDEMEANORS) but again that isn't relevant. For the Incorrect. A parking ticket, like a speeding ticket or other minor traffic violations is classified as an "infraction", not a misdemeanor. Apparently, even the govts. recognizes that there are so many laws on the books now that one can't possibly hope to avoid breaking them. -- Brian Buchanan brian at smarter.than.nu Never believe that you know the whole story. From jvb at ssds.com Thu Sep 17 09:23:53 1998 From: jvb at ssds.com (Jim Burnes) Date: Fri, 18 Sep 1998 00:23:53 +0800 Subject: Cyberpunks Signal-to-Noise Ratio In-Reply-To: <3601CBEA.2407@yankton.com> Message-ID: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On Thu, 17 Sep 1998, nnburk wrote: > Think of it as dietary fiber for the mind. > > Just to show how far down the SNR has gone I have committed the ultimate atrocity and typo'd Cypherpunks as Cyberpunks. Eeeek. Must have something to do with re-reading Neuromancer last week. The unconscious does strange things. regrets, jim -----BEGIN PGP SIGNATURE----- Version: PGP 5.0i Charset: noconv iQA/AwUBNgHvnOlhVGT5JbsfEQJrRQCfcJ311hK6xZYD4YnzA94nPw0UzVYAoMyN rM1/eth1yrPAqKfXfXoYLTQw =tCRD -----END PGP SIGNATURE----- From gbroiles at netbox.com Thu Sep 17 09:24:17 1998 From: gbroiles at netbox.com (Greg Broiles) Date: Fri, 18 Sep 1998 00:24:17 +0800 Subject: RF networks, spread spectrum Message-ID: Cpunks interested in radio networking and spread spectrum apps might find the following links useful - describes the design of a 900 mhz spread spectrum 128kb/s TCP/IP radio network with 10baseT input/outputs; provides an overview of spread spectrum projects/regulations/applications has links to more spread spectrum stuff. -- Greg Broiles gbroiles at netbox.com From bbt at mudspring.uplb.edu.ph Thu Sep 17 10:16:10 1998 From: bbt at mudspring.uplb.edu.ph (Bernardo B. Terrado) Date: Fri, 18 Sep 1998 01:16:10 +0800 Subject: thanks... Message-ID: I would like to thank the f for helping me... CORY BOB RIC ANONYMOUS DUTRA R KEN XENA... BILL ALBERT MIKE JIM mgraffam jya and those that helped me with other things. I cannot remember you all coz my pc or whoever did deleted your messages to me without my knowledge.(it just disappeared) Your replies helped me with my seminar. THANK YOU! ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Some people they might say that I'm hard to get to know. I go my own sweet way, well that maybe so. Something about the crowd that makes me walk alone. I never had a need in me to be the party's life and soul. It's me Bernie. metaphone at altavista.net `````````````````````````````````````````````````````````````````````````````` From bill.stewart at pobox.com Thu Sep 17 10:33:48 1998 From: bill.stewart at pobox.com (Bill Stewart) Date: Fri, 18 Sep 1998 01:33:48 +0800 Subject: 128 bit or 40 bit? In-Reply-To: <67ee9e3cc8499f9d72a11a2df56c48fe@anonymous> Message-ID: <3.0.5.32.19980917102459.008c97e0@idiom.com> At 02:35 AM 9/17/98 +0900, Anonymous wrote: > >Being outside North America, I have an "export" version of >Internet Explorer/Netscape Navigator. These offer 40 bit >encryption. (40 bit RC4, I understand). > > >My financial institution has a 128 bit Verisign certificate. >To my surprise, they claim this offers 128 bit encryption to /me/. >[in transactions to https://secure.mybank.com.xx] Odd. On the other hand, if your Netscape browser does have a 40-bit limitation problem, you can fix it by going to www.fortify.net. Thanks! Bill Bill Stewart, bill.stewart at pobox.com PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639 From stuffed at stuffed.net Fri Sep 18 02:32:03 1998 From: stuffed at stuffed.net (STUFFED NEWS DAILY) Date: Fri, 18 Sep 1998 02:32:03 -0700 (PDT) Subject: Oh boy, some goodies today, Elvis' sperm discovered/Rock stars' cock dildos? Message-ID: <19980918071001.15223.qmail@eureka.abc-web.com> And as if the lead stories weren't enough, how about all the FREE hot photos and sexy stories to titilate and tantalise? Or the masses of ultra-weird news, hot web sites and more. We know you love to get Stuffed every day, so go on tuck in! IN TODAY'S ISSUE: 30 NEW EXTRA HOT JPEGS! 5 NEW SIZZLING STORIES HYDE LIED - SO SAYS SALON MAGAZINE PICKING UP CHICKS IN THE GYM THE BEST OF EUREKA! - THE HOTTEST SITES COCK STARS - SUPERSTAR DILDOS? BLUE SUEDE OOZE - ELVIS' SPERM UNCOVERED EX COP, LEMONADE & STOLEN CARS THE DARWIN AWARDS - NATURAL DESELECTION TOTALLY BIZARRE NEWS - WHAT A CRAZY WORLD NUDESTOCK '98 - WHAT DID YOU MISS? WE SEND YOU TO HELL! :) ----> http://stuffed.net/98/9/18/ <---- Welcome to today's issue of Stuffed. To read it you should click on the URL above. If it is not made clickable by your email program you will need to use your mouse to highlight the URL, copy it and then paste it into your browser (then press Return). This email is never sent unsolicited. Stuffed is the supplement for the Eureka newsletter you subscribed to. Full instructions on unsubscribing are in every issue of Eureka! ----> http://stuffed.net/98/9/18/ <---- From nobody at replay.com Thu Sep 17 11:33:03 1998 From: nobody at replay.com (Anonymous) Date: Fri, 18 Sep 1998 02:33:03 +0800 Subject: Democracy... Message-ID: <199809180728.JAA03448@replay.com> I woe the day that government and church are not seperated and I am forced to side with one religion. It would be another freedom wrongfully taken from me. I would fight back, the same way the country secured it's independence the first time. I take my freedom very seriously. Facists like you that want to distort the constitution to make introduce a non-existant person at the top will hopefully get blasted down in the senate as you have been before. I would consider laws restricting my freedom as an attack and will be forced to defend myself. ---"Brian B. Riley" wrote: > > On 9/15/98 10:27 PM, Jaeger (Jaeger at hempseed.com) passed this wisdom: > > > > >hey, would you care to show us where "seperation of church and state" is > >to be found in the constitution/bill of rights? absolute right and > >wrong is not a religious belief (necessarily).. your religious beliefs > >do not affect the nature of reality. there are absolute truths by > > [snip] > > >> Ever heard of seperation of church and state? Democracy? the rights of > >> > >> the individual? While you certainly have the right to practice your > >> religion in what ever manner you so choose demanding that everyone > >> else > >> does, or that the president of the us of ais subject to you PERSONAL > >> faith decisions is outragous > > The first amendment states only that there shall not be 'an > establishment of religion' it says nada about 'separation of church and > state.' The intention was simple; that there would never be an > 'official' state religion. It didn't say religion had no place. They were > escaping a regime with an established state religion that used the > goverment to stamp out religious deviationism. That was the sole reason > for that clause in the 1st amendment. > > Brian B. Riley --> http://members.macconnect.com/~brianbr > For PGP Keys > > "...if you drink much from a bottle marked "poison." > and it is almost certain to disagree with you, sooner or later" > _Alice in Wonderland_: (Lewis Carroll) > > > From frissell at panix.com Thu Sep 17 14:14:12 1998 From: frissell at panix.com (Duncan Frissell) Date: Fri, 18 Sep 1998 05:14:12 +0800 Subject: Mark Twain/Mercantile dumps Digicash In-Reply-To: Message-ID: <199809181015.GAA04293@mail1.panix.com> At 09:04 PM 9/17/98 -0700, Greg Broiles wrote: > >According to >, >Mark Twain Bank/Mercantile Bank will no longer support DigiCash. They are >no longer listed as an issuer of ecash on Digicash' website. Neither >organization seems to have information available via the web about the >decision to terminate the service. > >-- >Greg Broiles >gbroiles at netbox.com I thought this was already known or I would have said: "Mark Twain Bank (MTB), a small bank headquartered in the Midwest, took a bold step three years ago when it became the first bank in the world to offer privacy-protecting eCash accounts. In April, 1997, however, MTB was bought out by Mercantile Bank, and the larger, stodgier bank recently decided to drop the eCash program." They probably weren't making any money. I wonder if Mercantile will drop MTB's foreign currency accounts as well? DCF From hark12 at eudoramail.com Thu Sep 17 15:08:54 1998 From: hark12 at eudoramail.com (hark12 at eudoramail.com) Date: Fri, 18 Sep 1998 06:08:54 +0800 Subject: cypherpunks, Are You Infringing someone's trademark rights? Message-ID: <199809181003.DAA15716@sirius.infonex.com> Hi cypherpunks, ************************************************************************************ Please reply with subject "remove" to be removed ************************************************************************************ Every day some small business person finds them selves on the receiving end of a law suit filed by a multi-national corporation with deep pockets. They claim infringement on their trademark rights. Currently their wealth means they are winning by default. We want to make you aware of your rights so you do not find yourself in the position of being the next "someone" the big boys decide to make an example of in court. As a user of the Internet you are entitled to use your domain name, as your trademark, without fear of being sued. However, not everyone knows the secrets to proper use and as such they have left themselves wide open to attack. We have prepared an article titled "How to correctly use your domain name". We invite you to read it. You will find the article at http://www.arvic.com/library/domanuse.asp If you are a small business person using the Internet to market your business and your products then perhaps you will be interested in reading the companion article on "How to use your Corporate or Product names as trademarks". You will find this article at http://www.arvic.com/library/useoftm.asp We are Arvic Search Services Inc. We operate TMWeb the "Home of the $25.00 Canadian & American trademark search". Since 1982 we have grown to become one of the most dominant advocates of small business rights both on and off the Internet. We help individuals protect their rights to use unregistered, as well as registered, trademarks without incurring the cost of registration. We will even show you, at no charge, how to conduct your own trademark searches. If you are currently the owner of a trademark then you may find our article on "The do's and don'ts of Trademark use" of interest. You will find this article located at; http://www.arvic.com/library/buz004.asp We believe it is in your best interest to learn as much as you can about trademarks, the rights of trademark owners and your rights as an Internet citizen. We invite you to visit our web sites. There you will find, in addition to the above, a number of guides and "How to" articles that should be of assistance. You will also learn more about us and the services we offer. When you visit our sites you will find our North America wide toll free phone number located on the bottom of every page. We encourage you to call and discuss any trademark, trade name or domain name issue of concern to you. Victor G. Arcuri Arvic Search Services Inc. Registered Trademark Agents #1710, 505 - 3rd Street SW Calgary, Alberta Canada T2P 2E6 Local Phone (403) 234-0844 Local Fax (403) 294-0944 Toll Free across North America 1-888-227-8421 Please visit our web sites http://www.arvic.com and http://www.tmweb.com ___________________ This is the first time I have done this type of promotion. I am not even certain that I have worded this information correctly. If you see where I have made a mstake by omission then I ask that you advise me of same so that I get the best possible return from these mailings. We did not discuss whcih day of the week you would be sending the mail. I would ask that you waite until next tuesday to send the Canadian. Monday is a holiday. The US mailings can go at your convenience. -- Victor G. Arcuri Arvic Search Services Inc. Registered Trademark Agents #1710, 505 - 3rd Street SW Calgary, Alberta Canada T2P 2E6 Local Phone (403) 234-0844 Local Fax (403) 294-0944 Toll Free across North America 1-888-227-8421 Please visit our web sites http://www.arvic.com and http://www.tmweb.com From nobody at replay.com Thu Sep 17 15:41:38 1998 From: nobody at replay.com (Anonymous) Date: Fri, 18 Sep 1998 06:41:38 +0800 Subject: Clinton's fake apologies (fwd) Message-ID: <199809181143.NAA22431@replay.com> On Sat, 12 Sep 1998, Jim Choate wrote: > I figure it's the fact that 'principles' are involved that is confusing > everybody, no room to move like there is with relativism. Bottem line, he > held a public office, while in that office he should commit *NO* crime or > else he should loose that office. There was no abmiguity there in the minds > of the founding fathers and there shouldn't be in yours either. If this > confuses you then take it as an indication that you have a axiomatic > contradiction in your world view and need to rethink things in a serious > way. > > As Jefferson said, if you hold a public office your public property. > > Nail the son of a bitch to the wall, he did the crime let him do the time. > > It's a pitty he doesn't have this sort of empathy for all those people he's > put in jail for consensual crimes during his tenure. The man has a base > double standard, let him pay for it. I agree totally, but this has a somewhat deeper point. The idiots in government sign into law all sorts of unconstitutional or nonsensical legislation. As far as I'm concerned, it ought to be a law that for *ANY* crime they commit they are thrown out of office and prosecuted to the fullest extent of the law. Of course it would never happen, but if it were to happen I think we'd see massive repeals of all this bogus legislation. "Senator, you have an encrypted file on your laptop. As per the Domestic Cryptography Prohibition Act, I am here to seize your computer, the office it is in, freeze your assets, and take you into custody. You will be ejected from the Senate, effective immediately. If convicted, you will spend the next five years at hard labor." "But...But I didn't know it was there! It was a virus which put it there!" "Ignorance of your violations of the law are no excuse. It says so in that Act." "Who is the idiot who passed this?!" "You introduced it, sir. It was something about protecting the children and how anybody who uses cryptography is a pedophile or something like that." Later that night, on the news: "Senator X was ejected from the Senate, arrested, jailed, and charged today with unlawful possession of random numbers. Later it was announced that former Senator X was charged with trafficing in child pornography." The next day: "In a daring no-knock morning raid, a flurry of automatic weapons fire occured and former Senator X's family was killed in the exchange. An FBI agent was quoted as saying, 'She was wielding an assault baby and we had to take her down.'" "It has just been announced that former Senator X is being charged under the Domestric Cryptography Prohibition Act, which he sponsored, with 'crypto in a crime.' This carries an additional penalty of 10 years. When asked what crime the cryptography was used in, an FBI representative answered, 'Given what Senator X argued on the floor of the senate when he introduced this bill, we're sure there is child pornography there somewhere. Like he said, the only reason to use cryptography is if you have something to hide, like child pornography or plans for widespread global armageddon. Because he used cryptography, we don't know where or what that porn is, but we're sure it's there somewhere.'" Three years later: "Former Senator X was convicted today of one count of 'crypto in a crime,' five counts of possession of cryptography without a license, eight counts of child porn (one for each encrypted file), and one count of intent to use weapons of mass destruction. In a swift action, he was sentenced to six consecutive life terms, to be served at hard labor." "Jim, isn't all this agaist the Bill of Rights?" "Well, Tom, it used to be, but since they repealed it..." *fade to black* From ravage at EINSTEIN.ssz.com Thu Sep 17 16:14:07 1998 From: ravage at EINSTEIN.ssz.com (Jim Choate) Date: Fri, 18 Sep 1998 07:14:07 +0800 Subject: Democracy... (fwd) Message-ID: <199809181240.HAA02855@einstein.ssz.com> Forwarded message: > Date: Thu, 17 Sep 1998 22:18:44 -0700 (PDT) > From: "Brian W. Buchanan" > Subject: Re: Democracy... > Incorrect. A parking ticket, like a speeding ticket or other minor > traffic violations is classified as an "infraction", not a misdemeanor. > Apparently, even the govts. recognizes that there are so many laws on the > books now that one can't possibly hope to avoid breaking them. They're still at least a Class C misdemeanor in the state of Texas. ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From reinhold at world.std.com Thu Sep 17 16:14:12 1998 From: reinhold at world.std.com (Arnold G. Reinhold) Date: Fri, 18 Sep 1998 07:14:12 +0800 Subject: Questions for Magaziner? In-Reply-To: Message-ID: At 12:38 AM -0400 9/18/98, Robert Hettinga wrote: >I spoke at the Electronic Payments Forum here in Boston today, and, >tomorrow, the keynote for tomorrow's lunch is Ira Magaziner. ... > >Anyway, In light of more recent crypto-shenanigans from Billary, and the >fact that this thing's a small crowd, I figured I'd ask if anyone on these >lists had a question they wanted me to ask him. > One question I'd like asked is whether the US Gov will approve 56-bit RC-4 for export on the same terms as 56-bit DES. That would allow export versions of web browsers to be upgraded painlessly, making international e-commerce 64 thousand times more secure than existing 40-bit browsers. (56-bit DES browsers would require every merchant to upgrade their SSL servers and introduce a lot of unneeded complexity.) Arnold Reinhold From jya at pipeline.com Thu Sep 17 16:22:01 1998 From: jya at pipeline.com (John Young) Date: Fri, 18 Sep 1998 07:22:01 +0800 Subject: CJ Message Message-ID: <199809181213.IAA20276@dewdrop2.mindspring.com> This allegedly is forwarded from CJ, though from an unknown source so think twice: Thu, Sep 09 1998 part of a communication received via the anonymous route: "In the meantime, I hope that anyone who has possession of the PGP Secret Keys for Toto, TruthMonger, Son of Gomez, Magic Circle, etc., feels free to use them to digitally sign messages to the CyperPunks Disturbed Male LISP. "Passwords: sog, sog709, sog709cejCJP,sog709cjpCEJ, D'Shauneaux, D'shauneaux, and others..." --------- Some of CJ's amazing output related to the message above is archived at: http://www.uneedus.com/~dave/library.html See "Psychotic." From cmefford at video.avwashington.com Thu Sep 17 16:24:57 1998 From: cmefford at video.avwashington.com (Chip Mefford) Date: Fri, 18 Sep 1998 07:24:57 +0800 Subject: Mobile phone tracking, pagers, etc In-Reply-To: <19980917222329.A1364@die.com> Message-ID: Actually, there seems to be a screw up out there. Right now, one can go down the 7/11, and pay cash for a prepaid cellphone, and renew it with cellphone time cards also purchased with cash. No paperwork, NONE. I have one. While all of the technology applies, and certainly it is possible to determine things by analyzing calling habits, I can't see how one can easily determine who has cellphone #blahblahblahblahblah when you just bought a box at an out of town 7/11 during the breakfast rush with cash. Esp if one doesn't make a lot of calls. On Thu, 17 Sep 1998, Dave Emery wrote: > On Thu, Sep 17, 1998 at 11:56:02AM -0700, Matthew James Gering wrote: > > > > Regarding the tracking of mobile phones, are all current types of phones > > susceptible? > > > > There was a recent post here regarding tracking of GSM phones. > > TDMA/CDMA, analog/digital, PCS-band, etc, are they all equally capable > > of being tracked? > > All the wireless standards I am aware of allow for registration > and polling phones to find out if they are on and available without > ringing them. This provides silent location information to the nearest > cell of a phone merely turned on, location which may be hundreds of > feet in tightly congested urban areas and tens of square miles in > suburban and less populated areas. Some system operators apparently > use this feature with all active phones to relieve congestion on paging > channels, while others do not actively track phones not being used > except in certain situations or parts of the network. Of course > location to a cell is always available during a call... > > The FCC has mandated that this cell-granularity location > information be made available to E-911 centers on emergency calls, and > there may be some situations in which it is currently made available to > domestic law enforcement under other circumstances, though CALEA > restricts such availability without warrents. Whether and under what > circumstances law enforcement can request a poll be transmitted > (re-registration) to locate a silent but powered phone is less clear. > It would seem that CALEA forbids this, but what in fact is the practice > by such agencies as the FBI working quietly with cell carriers in places > such as NYC is less clear. > > In the future FCC rules will require that all E-911 calling > wireless phones be located to 125 meters 67% of the time. There are > proposals to do this with differential time of arrival (DTOA) > or other direction finding techniques (apparently a hard problem > in cities with lots of multipath propagation due to reflections) > that work passively on some or all cell calls and registrations > (thus allowing tracking of everybody), or by cooperation with the > cellphone handset that could be only turned on when the user wished > to be located (an E-911 emergency) and disabled otherwise. One > version of this would use GPS rather than ranging or other techniques > to determine position relative to the cell sites. Of course all > the user disaablable techniques such as GPS and DTOA done in the handset > firmware only will work with future cell firmware and hardware > and not legacy handsets, and because of this may not be acceptable > to the FCC. > > There are some distinctions between CDMA, GSM, analog and TDMA > (non GSM), in respects to exactly how easy it is to implement precision > location meeting the FCC spec passively and on all calls at all times. > Apparently CDMA with its very tight power control to minimize the near-far > problem makes it fairly awkward to reliably triangulate position from > multiple sites since the mobile may be only detectable at one site > at any time... What this means in practice is that some wireless > technologies are more likely to require some definate active firmware > intervention to do precision location, whilst others may allow it > with no special intervention. If the FCC allows this intervention > to be enabled by a user, this may provide some opportunity for > location privacy. > > > > > > However pagers are not, correct? They just broadcast an entire area to > > page instead of the pager keeping the network informed of their > > location. > > The one way pagers work this way. The guaranteed delivery two > way pagers do support registration and will know the location of > the pager after a page has been sent to it and any time the system > wants to determine it. This location will be quite coarse with current > two way (reFlex) pagers with cell sites some distance apart, but > DF techniques are quite possible and could be implemented by law > enforcement or spooks or other interested groups. Unlike wireless phones > there is no current FCC requirement for positioning information distribution > or precision positioning infrastructure, so two way pagers aren't > likeyly to be routinely located accurately any time soon. > > Of course most modern wireless phones support paging message > delivery, so more and more people will be using wireless phones with > the FCC mandated tracking accuracy for paging... > > > > One thing I have long wondered: Why don't they make phones that > > "wake-up" by a paging signal and then accept the call? It might increase > > the connect time significantly, but it would also increase the potential > > stand-by time indefinitely, and the location of the user is only exposed > > when calls are in progress, not while the phone is on stand-by. > > > Wireless phones do currently work this way. They listen to the > forward control channel for a paging message that says they have got a > call coming in and only then do they transmit. The amount of power used > in transmitting would quickly use up the battery if they continuously > broadcast. The problem with cellphone location is that they can also be > paged with a registration request that does not cause them to ring > or show any evidence of transmitting, but sends back a brief message > burst (not using much battery). This can be made to happen every > so often, or only when polled. > > > > Are there any paging services (particularly alpha paging) that work on a > > global scale? You would think daily pager rental service (esp. at > > airports) would be popular. You could have an email address, even a > > static phone number, that could re-route messages to any pager that you > > happen to have at the time (PSTN-IP-PSTN, or even easier if the pager > > service gives SMTP addresses, which most do these days). > > > There are nationwide pager services that broadcast your pages > over very wide areas or depend on registration to locate you down to > a smaller area. But yes, you can get paged anywhere in the US and > several other countries. And the new LEO satellite technology will > allow paging over whole continents or potentially anywhere in the world. > > > > Similarly a PSTN-IP-PSTN interface for voice could give you a static > > phone number that you could dynamically forward anywhere untraceably. > > The LEAs don't like this concept, and one of the provisions of > the CALEA wiretap stuff is providing tracing of calls forwarded so you can't > do this.... > > > -- > Dave Emery N1PRE, die at die.com DIE Consulting, Weston, Mass. > PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2 5D 27 BD B0 24 88 C3 18 > From ravage at EINSTEIN.ssz.com Thu Sep 17 16:26:18 1998 From: ravage at EINSTEIN.ssz.com (Jim Choate) Date: Fri, 18 Sep 1998 07:26:18 +0800 Subject: RF networks, spread spectrum (fwd) Message-ID: <199809181251.HAA03092@einstein.ssz.com> Forwarded message: > Date: Thu, 17 Sep 1998 22:31:22 -0700 (PDT) > From: Greg Broiles > Subject: RF networks, spread spectrum > Cpunks interested in radio networking and spread spectrum apps might find > the following links useful - > > describes the design of > a 900 mhz spread spectrum 128kb/s TCP/IP radio network with 10baseT > input/outputs; > > provides an overview of spread > spectrum projects/regulations/applications > > has links to more spread spectrum > stuff. Another source of related information is the AX.25 Level 2 support built into the current Linux kernels. If you're using SuSE 5.3 it's located on the install CD at: /unsorted/Amateur-Funk & /usr/src/linux/Documentation/networking/ax25.txt In the SuSE manual (pp. 188) it says: "Enables data transfer via CB" ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From aba at dcs.ex.ac.uk Thu Sep 17 16:51:32 1998 From: aba at dcs.ex.ac.uk (Adam Back) Date: Fri, 18 Sep 1998 07:51:32 +0800 Subject: Cyberpunks Signal-to-Noise Ratio In-Reply-To: Message-ID: <199809181137.MAA12212@server.eternity.org> > Far be it from me to complain about the content-free > nature of others postings, but has anyone else noticed > that the signal on cypherpunks is being lost in the noise? There are a couple of filtered lists I think, Eric Blossom used to do one and Ray Arachelian also. Personally I just rely on the liberal use of the delete key. Adam From rah at shipwright.com Thu Sep 17 17:16:50 1998 From: rah at shipwright.com (Robert Hettinga) Date: Fri, 18 Sep 1998 08:16:50 +0800 Subject: DCS-NY Initial Meeting on September 8th Message-ID: --- begin forwarded text From: "DCS-NY Announcements" To: "recipient list suppressed" Subject: DCS-NY Initial Meeting on September 8th Reply-To: perry at piermont.com Mime-Version: 1.0 (generated by tm-edit 7.108) Date: 17 Sep 1998 14:05:02 -0400 Lines: 103 [If you know of people who may be interested in this meeting, please feel free to forward this message to them.] I am pleased to announce the second luncheon meeting of the Digital Commerce Society of New York (DCS-NY), to be held on Tuesday, October 13th at 12:00. If you are interested in attending, please RSVP and send in your check (as explained below) as quickly as possible. We have relatively little time to make arrangements, and need to have a solid idea of the number of attendees by Friday the 25th of September. This Month's Luncheon Speaker: Stuart Feldman, IBM Institute for Advanced Commerce, IBM T.J. Watson Research Center Topic: Future Directions in Electronic Commerce Stuart Feldman will delve into a half dozen major themes for long-term research in electronic commerce. These areas will take years to resolve at a research level and even longer to achieve full impact in the world economy. They include privacy, the evolving marketplace on several time scales, the rise of dynamic businesses and electronic haggling, improved relationships to customers, and the systems underpinnings needed to support the vast new opportunities and capabilities of electronic commerce. Stuart Feldman is Director of IBM's Institute for Advanced Commerce. The Institute is dedicated to creating new technologies for support of e-commerce as well as pursuing fundamental issues in e-commerce. He is also the author of the original "make" and "f77." WHAT IS DCS-NY? As some of you probably know, Robert Hettinga has been running a group called the Digital Commerce Society of Boston for over three years. DCSB meets once a month for lunch at the Harvard Club in Boston to hear a speaker and discuss the implications of rapidly emerging internet and cryptographic technologies on finance and commerce -- "Digital Commerce", in short. The Digital Commerce Society of New York (DCS-NY) is a spin-off of DCSB. We intend to meet the second Tuesday of each month for lunch at the Harvard Club in New York, and conduct meetings much like those of DCSB. Our organizing meeting in September was attended by a wide variety of professionals involved in the business, technical and legal sides of the emerging world of digital commerce. If you are interested in attending our next luncheon meeting, please follow the directions located below. If you merely wish to be added to our e-mail meeting announcements list, you may send your e-mail address to "dcs-ny-rsvp at piermont.com". Perry PS We would like to thank John McCormack for his invaluable assistance in procuring the venue for our meetings. ---------------------------------------------------------------------- HOW TO RSVP: The meeting will start at 12:00 noon on October 13th at the Harvard Club, which located at 27 West 44th St. in Manhattan. The cost of the luncheon is $49.00. To RSVP, please: A) Send a check for $49.00 (payable to "The Harvard Club of New York") to: Harry S. Hawk DCS-NY LUNCHEON Piermont Information Systems, Inc. 175 Adams St., #9G Brooklyn, New York 11201 Please include along with your check: 1) The name of the person attending 2) Their daytime phone number 3) Their e-mail address B) Send an email message to dcs-ny-rsvp at piermont.com indicating that you have sent your check, so that we can inform the Harvard Club of the number of people who will be attending. Please note that the Harvard Club dress code requires jacket and tie for men and comparable attire for women. If you have special dietary requirements, please check with us by email before you RSVP. Making final arrangements for our room requires that we have a good idea of how many attendees we will have. Because of this, it is very important that you RSVP quickly so that we will be able to get a larger room if necessary. We are looking forward to seeing you! ---------------------------------------------------------------------- Perry --- end forwarded text ----------------- Robert A. Hettinga Philodox Financial Technology Evangelism 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From rah at shipwright.com Thu Sep 17 17:18:55 1998 From: rah at shipwright.com (Robert Hettinga) Date: Fri, 18 Sep 1998 08:18:55 +0800 Subject: THE WHITE HOUSE: Briefing on encryption ( X-files ?? ) Message-ID: --- begin forwarded text From: "Blair Anderson" To: "Robert Hettinga" Date: Fri, 18 Sep 98 11:07:29 +1300 Reply-To: "Blair Anderson" Priority: Normal MIME-Version: 1.0 Subject: THE WHITE HOUSE: Briefing on encryption ( X-files ?? ) THE WHITE HOUSE: Briefing on encryption M2 PRESSWIRE-17 September 1998-THE WHITE HOUSE: Office of the Press Secretary -- Briefing on encryption (C)1994-98 M2 COMMUNICATIONS LTD * Briefing by the Vice President, Deputy Chief of Staff John Podesta, Principal Associate Deputy Attorney General Robert Litt, Assistant Director of the FBI Carolyn Morris, Under Secretary of Commerce William Reinsch, Deputy Secretary of Defense John Hamre, and Deputy National Security Advisor Jim Steinberg * The Briefing Room THE VICE PRESIDENT: Good morning. While my colleagues are coming in here, let me acknowledge them. John Podesta is going to take over the podium after I complete my statement, and he is joined by Bob Litt of the Justice Department, Bill Reinsch of the Commerce Department -- Under Secretary for the Export Administration -- and John Hamre, Deputy Secretary of Defense. I also want to acknowledge Carolyn Morris of the FBI; Barbara McNamara of the National Security Agency; John Gordon, Deputy Director of the CIA. And you all should know that this process, the results of -- the interim results of which I'm announcing here, is a process that has been run principally by John Podesta and Jim Steinberg, Deputy at the National Security Council. And I also want to thank Sally Katzen at the NEC and David Beier on my staff for the work that they and many others have done on this. Some of you who have followed this issue know that it is probably one of the single, most difficult and complex issues that you can possibly imagine. But we've made progress, and we're here this morning to announce an important new action that will protect our national security and our safety, and advance our economic interests and safeguard our basic rights and values in this new Information Age. The Information Age has brought us the Internet, an inter-connected global economy and the promise of connecting us all to the same vast world of knowledge. But with that exciting promise comes new challenges. We must make sure that in the Information Age you get information about the rest of the world and not the other way around. We must ensure that new technology does not mean new and sophisticated criminal and terrorist activity which leaves law enforcement outmatched -- we can't allow that to happen. And we must ensure that the sensitive financial and business transactions that now cruise along the information superhighway are 100 percent safe in cyberspace. Balancing these needs is no simple task, to say the least. That is why, in taking the next step toward meeting these complex goals, we worked very closely with members of Congress from both parties, House and Senate; with industry; with our law enforcement community and with our national security community. And as we move forward we want to keep working closely with all who share a stake in this issue -- especially law enforcement -- to constantly assess and reassess the effectiveness of our actions in this fast changing medium. Today I'm pleased to announce a new federal policy for the encryption and protection of electronic communication, a policy that dramatically increases privacy and security for families and businesses without endangering out national security. Beginning today, American companies will be able to use encryption programs of unlimited strength when communicating between most countries. Health, medical, and insurance companies will be able to use far stronger electronic protection for personal records and information. Law enforcement will still have access to criminally-related information under strict and appropriate legal procedures. And we will maintain our full ability to fight terrorism and monitor terrorist activity that poses a grave danger to American citizens. With this new announcement, we will protect the privacy of average Americans, because privacy is a basic value in the Information Age, indeed in any age. We will give industry the full protection that it needs to enable electronic commerce to grow and to thrive. And we will give law enforcement the ability to fight 21st century crimes with 21st century technology, so our families and businesses are safe, but on-line outlaws are not safe. In just a moment you will hear more of the details of this new policy, but I want to conclude by saying that this policy does reflect one of the greatest challenges of these new times. And to state it broadly, it's a challenge of how we can harness powerful new technology while protecting our oldest and most cherished values, such as privacy and safety. I'm grateful to those who have worked so hard to reach this balance. And with today's announcement I believe that all families and businesses have reason to feel safer, more secure and more confident as we approach the 21st century. And now I'd like to turn things over to White House Deputy Chief of Staff John Podesta. Q Mr. Vice President, before you go, can you tell us what you say to Democratic lawmakers who say the President ought to resign? THE VICE PRESIDENT: I disagree. Q How about the release of that tape? What do you think -- THE VICE PRESIDENT: The President is going to have a press conference shortly and I'm sure that you will not miss the opportunity at this national security press conference with the leader of a foreign country to raise all these questions. Q What about the videotape, should it be released? Q It was staged by the White House -- you know that, don't you? MR. PODESTA: Guess what? I'm here to talk about encryption. Okay. I can see the front row leaving here. (Laughter.) As the Vice President noted, Jim Steinberg and I have co-chaired our process in this matter. I volunteered for that duty because of my well-known fascination with The X Files, which most of you know about. As you know, this is an important and challenging issue that affects many of our interests in our society. And over the past year we've promoted a balanced approach to the issue, working with all segments of our government and working with industry to find a policy that promotes electronic commerce, preserves privacy, protects national security and law enforcement interests, and permits U.S. industry to secure global markets. Recognizing the importance of moving this issue forward, last March the Vice President asked us to intensify our dialogue with U.S. industry, to bring industry's technical expertise to bear on this issue with the hope of finding more innovative ways that we might assist law enforcement. We appreciate the efforts of Congress, the law enforcement community and particularly the industry groups. I would note the Computer Systems Policy Project and the Americans for Computer Privacy, who have been in an intensive dialogue with us over the past many months to foster an environment that has allowed us to come up with a policy which we believe has balanced the elements that are necessary in this regard. I think all the stakeholders in this process, on our side, as well as on private industry's side, now have a greater appreciation of the issues and intend to continue the dialogue, which I think we're most pleased by. Again, I think some of the people here from industry will be available at the stakeout later to take some comment. Based on the ideas discussed among the various stakeholders, today we're proposing an update to our policies that we've announced in the past. I'm going to serve kind of as M.C. We're going to start off with Bob Litt from the Justice Department and Carol Morris, who I asked to join us, from the FBI, to talk about the law enforcement-FBI concerns. Then we're going to turn to Bill Reinsch from the Commerce Department to talk about export control and electronic commerce. And finally you'll hear from Dr. Hamre from the Defense Department. I might ask Jim also to join us up here. Before I give up the floor to Bob and Carol, though, I want to stress that encryption policy is an ongoing process. It's one of adaptation; it's an evolutionary process. We intend to continue the dialogue, and over the course of the next year, determine what further updates are necessary as we work with industry to try to, again, come up with a policy that balances national security, law enforcement, and the real needs for privacy and security in electronic commerce. Thank you. Let me turn it over to Bob. MR. LITT: Thank you, John. Good afternoon. The Justice Department and the FBI and law enforcement in general is supportive, very supportive of today's announcement on the updating of our export controls on encryption products, particularly with respect to those products that allow law enforcement to obtain lawful access to the plain text of encrypted information. We have been very encouraged over the last few months by industry's efforts to work with us to develop and market strong encryption products that provide law-abiding citizens with the ability to protect the privacy of their communications and their electronically-stored data, while at the same time maintaining law enforcement's ability to ensure public safety when these products, when they become commercially available, are used in furtherance of serious criminal activity. Our goal is through whatever means to ensure that when we have the lawful authority to take steps to protect public safety, we have the ability to do so. And we have been working cooperatively with industry for many months to develop approaches that will deal with that. Carolyn Morris will now talk a little bit about the technical support center that is being proposed. MS. MORRIS: Thank you very much, Bob. Good afternoon, ladies and gentlemen. We in federal, state, and local law enforcement, are pleased with the administration's support to establish a technical support center. This center will provide federal, state, and local law enforcement with the resources and the technical capabilities we need to fulfill our investigative responsibilities. In light of strong, commercially available encryption products that are being proliferated within the United States, and when such products are used in the furtherance of serious criminal activity, this center becomes very, very critical to solving the encryption issues that we need to make cases. As a matter of fact, the FBI has already begun planning activities of this critical technical support center in anticipation of the availability of funds. The United States federal, local and state law enforcement community looks forward to a cooperative partnership with American industry, the Congress and the administration to ensure that this technical support center becomes a reality in the near future. With this center the American people can be assured that federal, state, and local law enforcement has the necessary resources and tools we need to fulfill our public safety mission. Thank you very much. UNDER SECRETARY REINSCH: With respect to export controls, the administration is updating its policy in three areas: Our existing policy and some revisions there, an expansion with respect to certain sectors, and an expansion with respect to so-called recoverable products. And let me address each of these separately. In keeping with the administration's reinvention initiatives, I'm going to try to do it in plain language -- or plain English, So that those of you that speak the vocabulary of encryption may find it to elementary, but we can go back and do it again in another language, if you want, later on in questions. With respect to our existing policy, we have for two years ending this December, permitted the export of 56-bit products after an initial one-time review without further review by the government. What we're announcing today is the maintenance of that window permanently. And so 56-bit products will be freed from export controls after a one-time review, in perpetuity, not ending at the end of this year. We are, however, removing the requirement for key recovery plans or key recovery commitments to be provided in return for that change, which was the initial condition that we extracted. In addition, we are continuing to permit the export of key recovery products -- products that contain those features -- without restraint worldwide. We are, however, going to simplify significantly our regulations that relate to those exports. In particular, we're going to eliminate the need for six-month progress reports for the plans that have been submitted, and we're going to eliminate the requirement for any prior reporting of key recovery agent information. For those of you that follow the regulations in detail, that means we're going to eliminate Supplement Five of our regulations on these matters. Now, with respect to sectors, we're making some new innovations in four areas. Some of you may be familiar with the fact that some time ago we announced expanded treatment of encryption products for export to banks and financial institutions. And what we did at that time, briefly, was to permit the export of encryption products of any length, any bit length, with or without key recovery features to banks and financial institutions in a list of 45 countries. What we are announcing today is, first, that we are adding insurance companies to the definition of financial institutions, so insurance companies will be treated the same way under this policy as banks and other financial institutions are now. In addition, we are providing the same kind of treatment for exports of these encryption products to the health and medical sector operating in the same set of countries. We are excluding from that biochemical and pharmaceutical producers. But the rest of the health and medical sector will be the beneficiary of the same kind of treatment. In addition, we are providing also this expanded treatment for that country group to on-line merchants that are operating in those countries. That means that for products that are like client-server applications, like SSL, will be able to be exported to those destinations. All these things will take place under what we call license exception, which means after initial one-time review to determine whether or not your product is, in fact, what you say it is, they can then go without any further review or intervention by the government to those locations. In addition, there is always the option in the export control system of coming in with an application to export these kinds of products to other destinations beyond the ones that I'm talking about right now, and those will be reviewed one by one on their merits. Finally, with respect to what we have come to refer to as a class of so-called recovery capable or recoverable products, and these are the products that, among others, include what has become known as the doorbell products, which are products that, among other things, will deal with the development of local area or wide area networks and the transmission of e-mail and other data over networks -- we are going to permit the export of those products under a presumption of approval and an export licensing arrangement to a list of 42 countries. And within those countries we are going to permit that export to commercial firms only within those countries. And both in that case and in the case of the on-line merchants that I referred to a few minutes ago, we are going to exclude manufacturers or distributors of munitions items, I think for obvious reasons. We can go into further details later, if you would like. I think for those of you that are interested in the nitty-gritty of all this stuff, BXA intends to post all the details, including the country lists, on its website and we should have that up later today. Thank you. DEPUTY SECRETARY HAMRE: Good morning. I'm here to speak on behalf of the national security community. I'm joined today by my enormously capable counterparts and colleagues, Deputy Director Barbara McNamara for the National Security Agency; and Deputy Director John Gordon from the Central Intelligence Agency. The national security establishment strongly supports this step forward. We think this is a very important advance in a crucial area for our security in the future. We in DOD had four goals when we entered these discussions. First was to strengthen our ability to do electronic commerce. We're the largest company in the world. Every month we write about 10 million paychecks. We write about 800,000 travel vouchers. One of our finance centers disburses $45 million an hour. We are a major, major force in business. And for that reason, we can't be efficient unless we can become fully electronic, and electronic commerce is essential for us. And this is an enormous step forward. Second, we must have strong encryption and a security structure for that in order to protect ourselves in cyberspace. Many of you know that we have experienced a number of cyber attacks during the last year. This will undoubtedly increase in the future. We need to have strong encryption because we're operating over public networks; 95 percent of all of our communications now go over public infrastructure -- public telephone lines, telephone switches, computer systems, et cetera. To protect ourselves in that public environment, we must have encryption and we must have a key recovery system for ourselves. The third goal that we had was to help protect America's infrastructure. One of the emerging national security challenges of the next decade is to protect this country, the homeland defense of this country, against attack. We must have strong encryption in order to do that, because most of this infrastructure now is being managed through distributed computer-based management systems, and this is an important step forward. Finally, it is very important that the Department of Defense and our colleagues in the national security establishment have the ability to prosecute our national security interests overseas. Terrorists and rogue nations are increasingly using these tools to communicate with each other and to lay their plans. We must have the ability to deal with that. And so this policy, it's a balanced and structured approach to be able to deal with all four of those problems. UNDER SECRETARY REINSCH: I apologize -- in listing my changes, I neglected one very important item that I want to go back to, and that is, in the sector area we are also announcing today the ability to export strong encryption of any bit length, with or without key recovery features, to subsidiaries of U.S. companies to all destinations in the world with the exception of the seven terrorist nations. MR. PODESTA: Okay, I think we're happy to take your questions now. If you could identify whom you're addressing, because there is a variety of expertise. And I would like to introduce one other person, Charlotte Knepper from the NSC staff, who has been instrumental in pulling this all together. Q John, this is a question for you. In October '96 and other White House statements on encryption, there has usually been a line also addressing the domestic side, saying that all Americans remain free to use any strength encryption. I didn't notice anything like that in today's announcement. Are there any conditions under which the White House would back domestic restrictions on encryption? MR. PODESTA: We haven't changed our policy, and the previous statements are certainly intact. We have made a number of policy statements in the past, since this administration came into office, and I think that you should view this as a step forward, building on the policies that we have put before the American public in the past. Q John, could I ask you one question about an un-encrypted matter? MR. PODESTA: Maybe. (Laughter.) Q Democrats on the Hill are now saying, and John Kerry is saying that the President's actions absolutely call for some sort of punishment. What are Democrats telling you about what they feel must be done at this point? MR. PODESTA: Well, I think I'm not going to stand here and take a lot of questions, but I'm going to give special dispensation, as a Catholic, today -- which is I'm going to return your phone calls later. But in deference to the people up here I think we'll handle it that way. But in specific response, I'll take one, which is that I think that we had a number of productive meetings with Democrats on both sides of the Hill yesterday. They view the President as a person who has led on the issues that are important to them, and I think what they want to do is get back to having him speak out and be a leader on the issues of education and the health care bill of rights, on saving Social Security. And I think they pointed at that and wanted to work with us on that. I think with regard to the question that you posed with regard to Senator Kerry, I think that's a matter that they are debating amongst themselves more than they are debating with the White House. I think it's probably presumptuous for us at this point to offer them assistance or guidance. I mean, the President has said that what he has done was wrong; he's apologized for it; he's asked for forgiveness. He is moving forward. And I think that this debate is going on, on Capitol Hill, but it's largely going on amongst members themselves. Q We haven't heard many of them say they want to get back to the work at hand. MR. STEINBERG: You heard John, and I'm going to leave it there. Let me just add a word in response, in connection with the domestic controls issue. I think one of the lessons that we've learned from this exercise is that -- actually, two lessons -- one, that trying to balance the various interests and equities in this is much less of a zero sum gain than I think some began to look at the question. That is, you heard from Dr. Hamre and others that many of the interests involved have common interests in making sure that we have secure and effective means of dealing with communications and stored data. And so we found, by looking in a very pragmatic way, that there were ways to solve these problems without very, kind of, broad-based solutions. In particular, I think the idea that there's no one-size-fits-all answer to the problems of meeting the various needs informs the decisions that we reached -- that there are a variety of different techniques that respond to the different aspects of the industry, the different aspects of the technology. I think that's what made the progress possible today, is that industry, agencies and Congress sat down together, pulled the problem apart, began to look at its different components and began to fashion very pragmatic solutions. And so I think we came to this discussion with a spirit of not looking for a kind of single or simple solution to the problem but, rather, how do you tackle and meet the various needs. And I think that's what led to this resolve. Q Could you talk a little more about the on-line merchants part of it? I mean, what do you have to do to qualify as an on-line merchant? Do you have to register or can anybody sort of set themselves up in business? UNDER SECRETARY REINSCH: I think the simplest way to respond to that right now is we'll have a definition in the reg that will be very clear as to what the criteria are for qualification. And those definitions have already been dealt with and agreed to, so we should have them up on the web site this afternoon. Q A question for Bill Reinsch. How do you handle, then, 128-bit, to which the Department has given export -- or has allowed to be exported after going through this review? Will 128 or things above 56-bit, will they require a license or will they still have to go through plans -- UNDER SECRETARY REINSCH: Well, with respect to the subsidiaries, the health sector, the banks, the financial institutions, the insurance companies, the on-line merchants, and the recoverable products as in the universe defined -- no. In the case of all but the recoverable products, they will all go on license exception, which means one-time review and then out the door. With respect to recoverable products, they will come in and go out pursuant to an export licensing arrangement, where we'll have to do a little tailoring depending upon the nature of the product. But there is a presumption of approval for the 42 countries that I indicated. And that's without reference to bit length -- 128 or more is all covered by that. Now, if you want to export an 128-bit product that is beyond any of those universes, then you would have to come in for an individual license application. Q A question for Mr. Litt. With regard to the technical support center, when do you expect that to be in operation? MR. LITT: I don't think we have a specific timetable yet. Obviously, it would be helpful for us to have it up and operational as soon as possible, but there are planning and budgetary issues that have to be dealt with. Q This is probably a question for Under Secretary Reinsch. The export exceptions now are essentially going to U.S. subsidiaries -- foreign subsidiaries of U.S. companies. I was wondering, could you be a little more specific -- what size company, what kind of company will be allowed to export powerful crypto to its foreign subsidiaries? UNDER SECRETARY REINSCH: That doesn't make any difference. The universe is determined by the end user, not by the nature of the American company. But it is not -- while part of this relates to subsidiaries of U.S. companies, that is correct, we also intend, on a case-by-case basis, to provide for favorable treatment for export of the same kind of thing to strategic partners of U.S. companies -- those foreign companies that are engaged in a closer, say, joint venture, that kind of relationship. Well, I think that's it. Q What about foreign companies that have U.S. subsidiaries, like Seaman's or -- or Chrysler -- can they get this encryption? UNDER SECRETARY REINSCH: Well, keep in mind, there are multiple universes here. If you're talking about the financial institutions, the banks and the insurance companies, those aren't necessarily American financial institutions. That's for export to any financial institution, and for their use in any of their branches, aside from the terrorist countries. This is true for the health sector; this is true for on-line merchants as well. Those are not restricted to U.S. companies. Obviously, if we're going to have a requirement for U.S. subs, it relates to U.S. subs, and wouldn't affect the examples you've described. Now, with respect to recoverable products, which actually is one of the areas where the companies you mentioned would probably be looking because they'd be looking to build a network among their various offices, affiliates of subsidiaries, dealers if necessary, worldwide, the recoverable provisions that I described could be exported to those companies within the territorial universe I described -- the 42 countries. Thank you very much. Blair Anderson (Blair at technologist.com) International Consultant in Electronic Commerce, Encryption and Electronic Rights Management "Techno Junk and Grey Matter" (HTTP://WWW.NOW.CO.NZ [moving servers, currently inactive]) 50 Wainoni Road, Christchurch, New Zealand phone 64 3 3894065 fax 64 3 3894065 Member Digital Commerce Society of Boston ---------------------------- Caught in the Net for 25 years ---------------------------- --- end forwarded text ----------------- Robert A. Hettinga Philodox Financial Technology Evangelism 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From phantom at wwa.com Thu Sep 17 17:20:45 1998 From: phantom at wwa.com (Leif Ericksen) Date: Fri, 18 Sep 1998 08:20:45 +0800 Subject: Encryption and Terrorists In-Reply-To: <7874ed1d5f47be94688551065bac8ea5@anonymous> Message-ID: <36025B1F.BAF0F59@wwa.com> Anonymous wrote: > > Wake up America! Encryption doesn't kill people! Terrorists do. > Would you give the keys to your house to the government? Just in > case they have to break in? NO! How about your ATM PIN #, just in case > you don't pay your taxes? NO! So don't give out your keys that you use > for > encrpytion and don't let the government have a way to get them either! > > Just say NO to the UNCONSTITUTIONAL idea of Limited Privacy! After all, > we are not COMMUNISTS. You make some interesting comments, but here is a few issues to consider. Yes, in AmeriKa we are free or are we? In America the government already has our keys to our house. *IF* they suspect us of something YES we are free to say *NO* you may not enter my house. However, if they come with a search warrant you had better let them in or they will break down your door, you had better help them find what they want or they will tear apart your house looking for said items stated in the search warrant. *IF* they do not find it, it is the responsibility of the searching organization to have repairs done for the damage. (So I have been told by a friend whose brother is a cop.) You talk about an ATM PIN number, well here is the bigger problem, we have a Social (Insecurity) Number. Once you take it and use it you have stated YES, I will pay my taxes, you pay once you pay for life. (Taxes were originally voluntary when the program started. Now it is forced. At least that is what I have heard, I have not researched it yet. NOTE: to any IRS agents, I Do and will continue to pay my taxes. I do not like it but I rather pay then have you come in and take everything) Back to the point with the SSN the IRS can freeze ALL your Assets and lock up your bank accounts and say this money is OURS, they can also come in and kick you out of your house. (My father had some co-workers that owed some money to the government, and made the mistake of saying they could not pay and that they should just take his house. Guess what the IRS said MOVE OUT it is OURS! He should have asked for a payment plan, he would have been better off.) No we are not communists, however our country is NO LONGER a REAL Democracy, it is more of a dictatorship. The government for the people BY THE PEOPLE is no longer. IT is a GOVERNMENT FOR THE GOVERNMENT BY THE GOVERNMENT. Think of it we vote for who we want, but do we really get what we want? Think of it Congress wants a raise they make a motion and vote on it. DO they let the public vote on it? NO. Think of it we pay taxes and boy do we pay taxes depending on what state you live in we have such as the following. 1) Sales 2) Property 3) Income - Federal - State The following are some that some areas are trying to get in place. - local (township/county) - city 4) Phone taxes - Federal - State - City - (local and state additional charges?) TAX upon TAX. - Federal PIC Charge. TAX UPON TAX UPON TAX. 5) Death. 6) Inheritance. I know I missed a few here, and I am sure there are some anti tax folks out here that could list every single one. Just think of it though, when you add all the little taxes up we probably are paying close to 50 - 60% tax rates. Think of it, the internet is partially funded by our INCOME tax, and they add an extra tax to it on our phone bill and call it as such. Think of it MOST OF THE MAJOR carriers in the US MCI, SPRINT, AT&T are the PROVIDERS of internet connectivity and we pay taxes to them already? Is that about triple or four times taxed there? I just hope that we do not have a major revolt, against the taxes and the government. *IF* we do I am willing to BET if it is really bad like the revolts WAY back to the time of the Boston Tea Party the UN will step in and send the MIlitary (US) and say control those folks. I hope I do not live to see that. I will Continue to pay my taxes, and I will continue to vote for who I think can do the job. I will start working on getting a business running so that I can take advantage of all the tax breaks of running a business. BUT I will keep it all legal. That is the only way to get things going better for yourself is to own your own business, and make it small enough that it can be just you and your family. - lhe From rah at shipwright.com Thu Sep 17 17:22:13 1998 From: rah at shipwright.com (Robert Hettinga) Date: Fri, 18 Sep 1998 08:22:13 +0800 Subject: Sept. 19 column - Clintonites reject reality Message-ID: --- begin forwarded text Resent-Date: Thu, 17 Sep 1998 23:24:28 -0600 Date: Thu, 17 Sep 1998 22:23:36 -0700 (PDT) X-Sender: vin at dali.lvrj.com Mime-Version: 1.0 To: vinsends at ezlink.com From: Vin_Suprynowicz at lvrj.com (Vin Suprynowicz) Subject: Sept. 19 column - Clintonites reject reality Resent-From: vinsends at ezlink.com X-Mailing-List: archive/latest/557 X-Loop: vinsends at ezlink.com Precedence: list Resent-Sender: vinsends-request at ezlink.com FROM MOUNTAIN MEDIA FOR IMMEDIATE RELEASE DATED SEPT. 19, 1998 THE LIBERTARIAN, By Vin Suprynowicz It's the government schools, stupid Bill Clinton is a fake. As many Americans who had been taken in by him looked on in wide-eyed horror on Sept. 10 and 11, 1998, this emotionally hollow creature tried again and again to mimic precisely the right catch in the voice, precisely the right words, the wiping away of a tear at just the right moment, in what quickly became known as the Monica Lewinsky "Apology-thon." Just as our penultimate national office manager, George Bush, spoke with an impatient lack of comprehension about "the vision thing" folks seemed to want from him, so does Bill Clinton fail to understand the horror with which it is finally sinking in to about 35 percent of the American populace that this man (start ital)has(end ital) no core emotions ... he has merely been miming them all these years. But what should really frighten us is not the fact that Bill Clinton is thus revealed to be the moral and emotional equivalent of one of those human-looking androids in the science fictions movies, unmasked in a now-familiar scene in which they begin to stutter and shudder, and finally go cartwheeling around the spacecraft spewing white hydraulic fluid. No, what should frighten us is that only 35 percent of Americans seem to care. Sixty-five percent say: "So what? All that moral and emotional stuff is so much make-believe, anyway. Doesn't everybody lie? Doesn't everybody fake it?" Where did this race of pod people come from? From the government schools, stupid. For years, folks have been dismissing the direst of warnings about the "public schooling" scam with exasperated disbelief. Schools don't fight duplicity, cheating, drug use, and scorn for achievement, argued New York State Teacher of the Year John Taylor Gatto in his slim but estimable little volume "Dumbing Us Down" ($12.45, New Society Publishers, 4527 Springfield Ave., Philadelphia 19143.) Instead, Mr. Gatto discovered after a lengthy and distinguished career, these things are what the schools actually (start ital)teach(end ital). "Put kids in a class and they will live out their lives in an invisible cage, isolated from their chance at community," Gatto warns. "Interrupt kids with bells and horns all the time and they will learn that nothing is important; force them to plead for the natural right to the toilet and they will become liars and toadies; ridicule them and they will retreat from human association; shame them and they will find a hundred ways to get even" through exactly the kind of addictive, immature and dependent pathologies we expect from any inmates -- drugs, violence, random sex. # # # What caused his teachers to praise someone like the young Bill Clinton, who didn't just dodge the physical risks of Vietnam, but who (as some are only now discovering) apparently avoided all the emotional risks and commitments which help a boy mature into a man, leaving a 50-year-old president at the approximate level of emotional development of a giggling, groping 13-year-old, promising to "marry" his date to the sock hop if she'll let him cop a feel? Apparently no one believes Mr. Gatto. But the great novelist and philosopher Ayn Rand further explained the process by which children's normal mental and emotional development are now systematically and deliberately crippled in a 1970 essay called "The Comprachicos," available in the Meridian paperback "The New Left:" "At the age of three, when his mind is almost as plastic as his bones, when his need and desire to know are more intense than they will ever be again, a child is delivered -- by a Progressive nursery school -- into the midst of a pack of children as helplessly ignorant as himself. ... He wants to learn; he is told to play. Why? No answer is given. He is made to understand -- by the emotional vibrations permeating the atmosphere of the place ... that the most important thing in this peculiar world is not to know, but to get along with the pack. Why? No answer is given. "He does not know what to do; he is told to do anything he feels like. He picks up a toy; it is snatched away from him by another child; he is told that he must learn to share. Why? No answer is given. He sits alone in a corner; he is told that he must join the others. Why? No answer is given. He approaches a group, reaches for their toys and is punched in the nose. He cries, in angry bewilderment; the teacher throws her arms around him and gushes that she loves him. ... "The teacher's mechanical crib-side manner -- the rigid smile, the cooing tone of voice ... the coldly unfocused, unseeing eyes -- add up in the child's mind to a word he will soon learn: phony. He knows it is a disguise; a disguise hides something; he experiences suspicion -- and fear. "A small child is mildly curious about, but not greatly interested in, other children of his own age. In daily association, they merely bewilder him. He is not seeking equals, but cognitive superiors, people who (start ital)know(end ital). Observe that young children prefer the company of older children or of adults, that they hero-worship and try to emulate an older brother or sister. A child needs to reach a certain development, a sense of his own identity, before he can enjoy the company of his 'peers.' But he is thrown into their midst and told to adjust. "Adjust to (start ital)what?(end ital) To anything. To cruelty, to injustice, to blindness, to silliness, to pretentiousness, to snubs, to mockery, to treachery, to lies ... and to the overwhelming , overpowering presence of Whim as the ruler of everything. ... "After a while, he adjusts. ... He learns that regardless of what he does -- whether his action is right or wrong, honest or dishonest, sensible or senseless -- if the pack disapproves, he is wrong and his desire is frustrated; if the pack approves, then anything goes. Thus the embryo of his concept of morality shrivels before it is born," and is replaced with the realization that the objective reality of achievement is worthless, that everything of value is instead gained through the emotional manipulation of the pack, Ms. Rand explained. "Cut off from reality, which he has not learned fully to grasp, he is plunged into a world of fantasy playing. He may feel a dim uneasiness, at first: to him, it is not imagining, it is lying. But he loses that distinction and get into the swing. The wilder his fantasies, the warmer the teacher's approval and concern. ... He begins to believe his own fantasies. ... Why bother facing problems if they can be solved by make-believe? ... "The teacher prods him to self-expression, but he knows that this is a trap; he is being put on trial before the pack, to see whether he fits or not. He senses that he is constantly expected to feel, but he does not feel anything -- only fear, confusion, helplessness and boredom. ... "So he learns to hide his feelings, to simulate them, to pretend, to evade -- to repress. The stronger his fear, the more aggressive his behavior; the more uncertain his assertions, the louder his voice. From playacting, he progresses easily to the skill of putting on an act. ... He cannot know by what imperceptible steps he, too, has become a phony." # # # Is it really so hard to see how an "education" system that grades children on group projects and "how they fit in with others," that flatters them that all their uninformed opinions are equally, indiscriminately worthy of "discussion groups," that rejects the tried and true practice of encouraging the majority to aspire to match the achievements of the best and the brightest, instead naming (start ital)every(end ital) child "Student of the Month," could end up producing a Bill Clinton ... or 100 million Bill Clintons? Is it really any surprise that two whole American generations are now schooled not in math, spelling, and grammar, but rather in fantasy, deception, and manipulation? Can we really be surprised that they ignore evidence that the garbage men pour all their sorted trash into the same trucks, insisting the exercise of sorting green bottles from brown is still worthwhile if it "raises everyone's consciousness"? That they snort at statistics proving cities with gun bans actually have the highest rates of crime, or that one volcano releases more "greenhouse gases" than 1,000 years of Freon? They they instead insist it doesn't matter whether an "assault weapons ban" will really reduce crime, or whether banning spray cans will really close the "ozone hole," so long as jailing the violators of such freedom-crushing edicts makes us all (start ital)feel better about ourselves(end ital), since "at least we tried"? Should we really be surprised to hear them now, whining "What do you want? Everyone has affairs. Everyone lies under oath." Or, as letter-writer Bob Gore puts it in the Sept. 20 Las Vegas Review-Journal: "I feel like I'm living in a country that is collectively raising an adolescent. Listen to Billy Clinton and his friends: 'I didn't do it. Nobody saw me do it. You can't prove a thing. Everybody does it. It's no worse than anybody else. Kenny is a snitch ... and he's an old meanie. I do not have the five dollars that was on your dresser (I already spent it). I have to answer all the tough questions. I know I burnt the house down, but think of the new one we'll get. I'm sorry for what I did even though I didn't do anything.' ... "We're living an episode of 'The Simpsons', and Bart's in charge," Mr. Gore concludes. "I can't wait for this kid to move out -- as soon as he grows up." Vin Suprynowicz is the assistant editorial page editor of the Las Vegas Review-Journal. Readers may contact him via e-mail at vin at lvrj.com. The column is syndicated in the United States and Canada via Mountain Media Syndications, P.O. Box 4422, Las Vegas Nev. 89127. *** Vin Suprynowicz, vin at lvrj.com Education rears disciples, imitators, and routinists, not pioneers of new ideas and creative geniuses. The schools are not nurseries of progress and improvement, but conservatories of tradition and unvarying modes of thought. -- Ludwig von Mises The most difficult struggle of all is the one within ourselves. Let us not get accustomed and adjusted to these conditions. The one who adjusts ceases to discriminate between good and evil. He becomes a slave in body and soul. Whatever may happen to you, remember always: Don't adjust! Revolt against the reality! -- Mordechai Anielewicz, Warsaw, 1943 * * * --- end forwarded text ----------------- Robert A. Hettinga Philodox Financial Technology Evangelism 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From lordgrey at borrowedtime.com Thu Sep 17 17:58:26 1998 From: lordgrey at borrowedtime.com (Dan S. Camper) Date: Fri, 18 Sep 1998 08:58:26 +0800 Subject: THE WHITE HOUSE: Briefing on encryption ( X-files ?? ) Message-ID: <199809181400.JAA21600@smtp.austin.outernet.com> What is the URL for the web site mentioned here? Thanks, DSC >UNDER SECRETARY REINSCH: I think the simplest way to respond to that right >now is we'll have a definition in the >reg that will be very clear as to what the criteria are for qualification. >And those definitions have already been dealt with >and agreed to, so we should have them up on the web site this afternoon. __________________________________________________________________________ Dan S. Camper lordgrey at borrowedtime.com Software Thaumaturgist Borrowed Time, Inc. From frissell at panix.com Thu Sep 17 18:20:03 1998 From: frissell at panix.com (Duncan Frissell) Date: Fri, 18 Sep 1998 09:20:03 +0800 Subject: Mobile phone tracking, pagers, etc In-Reply-To: <19980917222329.A1364@die.com> Message-ID: <199809181411.KAA24933@mail1.panix.com> At 08:13 AM 9/18/98 -0400, Chip Mefford wrote: > > >Actually, > >there seems to be a screw up out there. > >Right now, one can go down the 7/11, and pay >cash for a prepaid cellphone, and renew it with >cellphone time cards also purchased with cash. > >No paperwork, NONE. > >I have one. I pointed this out two years ago when the first prepaid cellular phones appeared in NYC. This is an example of the problem with regulations that depend on keeping "bad" people from having bank accounts, net accounts, phone accounts, etc. These depend on *all* sellers of these account services conspiring with the government in a cartel to deny services (a Government Denial of Service attack). But such a cartel (even if backed by law) is impossible to maintain. There is too much profit in breaking it. DCF >From Wednesday's WSJ: "In a depressing turn for law-enforcement authorities, prepaid service has caught on with drug dealers and other criminals. With no contract and no bills, there is no paper trail -- a feature that also makes the service attractive to tax evaders." September 16, 1998 Prepaid Plans Start to Open Up The Cellular-Phone Market By GAUTAM NAIK Staff Reporter of THE WALL STREET JOURNAL Warren Pippin, a police officer in Savannah, Ga., ditched his traditional cellular-phone contract two years ago. "I couldn't stand paying bills every month," he says. "This is so much simpler." Now he uses prepaid cellular-phone service, a plan that was hatched in Portugal four years ago, took Europe by storm and is finally catching on in the U.S. A user simply buys an off-the-shelf phone, along with a card representing a certain financial value. The phone is activated by dialing a phone number and a personal identification number printed on the card. When the money runs out, the card can be replenished via a fresh payment. Those are just the basics. In Portugal, refinements let prepaid users replenish their cards at automated teller machines. And wherever it is used, the prepaid method is democratizing a product and service long confined to the well-heeled. Although only 2% of America's 54 million wireless subscribers use prepaid service today, most are people who otherwise wouldn't dream of owning a mobile phone: inner-city residents, students, people with poor credit. While rates for prepaid service are generally higher than regular cellular plans, users have no 12-month contracts or monthly fees to contend with. All told, compared with regular "leisure" users, prepaid customers spend roughly 15% to 25% less per month. "Prepay is enabling people that have wanted wireless phones for a long, long time to finally get one," says Terry Hayes, a marketing executive at Omnipoint Corp., which recently launched a "no monthly fee" prepaid offering. The company, which operates from Maine to Maryland, sells prepaid phones in colorful packages at gas stations, Duane Reade drugstores and its own outlets. Every second Omnipoint customer has prepaid service. 'Best Thing for Kids' Page Tel, a wireless-service reseller in Detroit, has signed up 85,000 prepaid mobile-phone users, most of them students and inner-city residents. One popular product costs $39, and includes a Motorola flip phone. "It's the best thing for kids," says Laith Korkis, the owner of Page Tel. "They buy a $39 phone and a $10 prepaid card and walk down the street looking cool." In a depressing turn for law-enforcement authorities, prepaid service has caught on with drug dealers and other criminals. With no contract and no bills, there is no paper trail -- a feature that also makes the service attractive to tax evaders. Europe's prepaid users number some 14 million, or 20% of all mobile subscribers. By the end of 1998, the number of prepaid users will rise to 22 million, or 25% of the total European market, according to Salomon Smith Barney. In the U.S., playing catch up, virtually every big wireless provider has jumped into prepaid service: Half of PrimeCo Personal Communications LP's customers are prepaid, while 40% of BellSouth Corp.'s subscribers are. Prepaid will make up 25% of all new wireless sign-ups this year, estimates Donaldson, Lufkin & Jenrette. U.S. providers remain technologically behind their European counterparts, who adopted digital standards far earlier. European digital phones have a special card that can be inserted into the phone to activate special features such as Portugal's ATM replenishment. In the U.S., users can only replenish their prepaid phone by paying cash at a store or via credit card. Portugal Telecom SA, Portugal's main phone company, got the idea for prepaid cellular service when executives realized that the nation's sophisticated network of ATMs could be used as mobile-phone "refueling" stations. The service was launched in 1995; today, 68% of all Portugal Telecom's mobile-phone customers are prepaid. Telecel Communicacoes Pessoais SA, a rival wireless carrier that is 50.9% owned by Airtouch Communications Inc. of the U.S., has been equally aggressive. Its Vitamina prepaid phones are sold in brightly colored packages, each shaped in the form of a pill. One popular brand is aimed at corporations: The company can specify exactly how much credit it wants each employee's phone to have, and how often the credit should be topped up. The Frog Factor Another product, Vitamina K (for kid), is for children ages eight to 15. The phones look like frogs and have six colorful buttons that can be programmed by a parent. "One is for mummy, two for daddy, three for grandma. That's all the kid has to know," explains Joao Mendes Dias, Telecel's product-marketing director. An especially big hit is Vitamina R (for radicals), sold to the 15-to-24-year-old set and featuring only fashionable Ericsson or Nokia models. If a Vitamina R customer calls another Vitamina R user, the call is 35% cheaper than calling someone else. And the advertising slogan has its fans, as well: "Vitamina R. It heals everything but hangovers." Sandra Santos, a 21-year-old student in Lisbon, likes her snazzy Vitamina phone because it provides a running display of the credit available at any time. When she runs low, there is always a cash machine nearby. Thanks to special calling rates, her Vitamina bills are half what she paid with a previous subscription plan. And her previous phone? "I gave that to my dad," she says. Airtouch now hopes to apply Telecel's ideas-especially the savvy marketing -- in the U.S. The San Francisco company is pitching prepaid to students in Ohio and Michigan. During the World Cup soccer tournament, it targeted Hispanic customers in Southern California. In the last 12 months, about 10% of all new Airtouch customers joined on the prepaid plan. That number could double in the next 12 months, says Airtouch. Dave Whetstone, director of the company's prepaid business, noting that his company has extensive interests in European wireless carriers, adds: "We look at our European operations and say, 'Wow, prepaid is exploding there. There may be some cultural differences, but there's got to be something there' " for U.S. consumers. Airtouch won't have to convince Jenifer Borrusch, an 18-year-old student at Eastern Michigan University. Ms. Borrusch's parents wanted to give her a traditional mobile phone in case of emergencies during her 45-minute drive from Livonia, Mich., to college. But because she might overspend, they gave her a prepaid device instead. The ploy worked. "I won't even let my best friend use it," she says. From jya at pipeline.com Thu Sep 17 18:31:11 1998 From: jya at pipeline.com (John Young) Date: Fri, 18 Sep 1998 09:31:11 +0800 Subject: THE WHITE HOUSE: Briefing on encryption ( X-files ?? ) In-Reply-To: <199809181400.JAA21600@smtp.austin.outernet.com> Message-ID: <199809181432.KAA09252@dewdrop2.mindspring.com> Lordgrey asks for a BXA URL: BXA info on the new crypto policy: http://www.bxa.doc.gov/whatsnew.htm http://207.96.11.93/Encryption/Default.htm The only info there not issued by the White House is a list of the 45 countries who get favorable treatment. CDT says the implementation regs are due to be issued by BXA sometime in October, and to watch out: "the devil is in the details." In the meantime the 11 corporations who announced support for the new policy will continue hemming, hawing and heeding threat of license delay: Here they are: Ascend, Cisco Systems, 3Com, Hewlett-Packard Company, Intel, Netscape Communications, Network Associates, Novell, RedCreek Communications, Secure Computing, Sun Microsystems. One bit of sunshine, though, is Germany has announced that it will lead a Euro attack on US crypto export limits because they harm economic security: http://jya.com/cn091898.htm From jmotes at mnsinc.com Fri Sep 18 09:50:10 1998 From: jmotes at mnsinc.com (jmotes) Date: Fri, 18 Sep 1998 09:50:10 -0700 (PDT) Subject: No Subject Message-ID: <020201bde324$4d924000$e401fea9@kathleen> SUBSCRIBE From f3pf50v6 at auto.sixdegrees.com Thu Sep 17 19:46:27 1998 From: f3pf50v6 at auto.sixdegrees.com (sixdegrees) Date: Fri, 18 Sep 1998 10:46:27 +0800 Subject: Your new password Message-ID: <199809181531.IAA20385@toad.com> Name: Lefty CyberSlasher sixdegrees password: landmelt Congratulations Lefty. You're well on your way to becoming a full sixdegrees(tm) member. Here is your member password: landmelt. Use it to log-in on the home page at the sixdegrees Web site, http://www.sixdegrees.com. We'll ask you for a little more information to complete your registration, and then you'll be ready to start networking. It's important that you return to the site and log-in. Your membership will not be complete until you do so. Once you've successfully logged in with your password, just go to Personal Profile and you'll be able to choose your own password. Thanks for becoming part of sixdegrees. We're looking forward to seeing you at the site. ==================================================================== PLEASE NOTE: All replies to this address are processed by a computer. If you believe you received this e-mail in error, and it was not your intention to become a sixdegrees member, or if you have any problems, questions or requests send an e-mail to issues at sixdegrees.com and someone will get back to you as soon as possible. ==================================================================== E.SI.BAM.1 From fcqf50h6 at auto.sixdegrees.com Thu Sep 17 20:30:51 1998 From: fcqf50h6 at auto.sixdegrees.com (sixdegrees) Date: Fri, 18 Sep 1998 11:30:51 +0800 Subject: Your new password Message-ID: <199809181623.JAA20744@toad.com> Name: Spermy CyberPorno sixdegrees password: rampnull Congratulations Spermy. You're well on your way to becoming a full sixdegrees(tm) member. Here is your member password: rampnull. Use it to log-in on the home page at the sixdegrees Web site, http://www.sixdegrees.com. We'll ask you for a little more information to complete your registration, and then you'll be ready to start networking. It's important that you return to the site and log-in. Your membership will not be complete until you do so. Once you've successfully logged in with your password, just go to Personal Profile and you'll be able to choose your own password. Thanks for becoming part of sixdegrees. We're looking forward to seeing you at the site. ==================================================================== PLEASE NOTE: All replies to this address are processed by a computer. If you believe you received this e-mail in error, and it was not your intention to become a sixdegrees member, or if you have any problems, questions or requests send an e-mail to issues at sixdegrees.com and someone will get back to you as soon as possible. ==================================================================== E.SI.BAM.1 From hedges at infopeace.com Thu Sep 17 20:48:19 1998 From: hedges at infopeace.com (Mark Hedges) Date: Fri, 18 Sep 1998 11:48:19 +0800 Subject: Democracy... (fwd) Message-ID: Jim Choate answered: >> From: Matthew James Gering >> There is no reason to think that a god does exist, so why would one even >> need to think about or believe in the negative. > >There is no reason to believe one doesn't either. If we take your claim at >face value you need to demonstrate your test that shows the irrelevancy >of god. God is not a belief in a negative, another straw man, but rather >a mechanism or expression of human psychology and the need for humans to >find patterns (ie reason) in things. Mr. Gering, you may have heard the argument that there is also no reason to believe that you exist, except your sense impressions which can be proven to be unreliable and easily falsified. The old 'disembodied nervous system floating in a tank getting poked by graduate students' premise could explain your entire range of perceptions of your childhood, schooling, adolescence, growing up, eating pizza at the office, etc. I wondered for a while, and then I threw it in the waste bin, because it's pointless and a waste of energy to wonder whether or not I exist. I decided to trust my sense impressions well enough to go to the movies and jog in the mornings and go to work and write code. I certainly do not stop living because there is no reason to believe that I exist. There is also no reason for me to believe that you exist, because you could be Toto forging the mail. You didn't sign your message, I don't have your key fingerprint, I doubt I ever will, and besides, maybe someone monitored your keystrokes and stole your key. And in my experience, certain 'sense impressions' lead me to conclude that the existence of 'god' as some sort of cohesive, coherent, universal-scale eternal being is perhaps possible. Looking at cloud formations on the plane, I sometimes feel like an astrocyte wandering a huge purkinje skyscape, or like a star careening through a nebula. And the erosion patterns on the mountains below look just like dribbling water on sandcastles. And so there is something, some kind of underlying order, the effects of which we see at every scale. Though I'm incapable of understanding the transcendent order, or of conceiving what the transcendent order might be, I do not block the possibility from my mind. And that leads to some interesting experiences. No, I don't follow the often arbitrary rhetoric of many organised religions, and in that point I agree with your opinion of the concept. Although, some of them espouse some interesting ideas. To wander back to the thread topic, democracy, and to totally wrench everything out of context, I've heard the same sort of argument used against democratic empowerment. There's no reason to believe that 'the people' are capable of making their own decisions, and there's no reason to believe that stronger, more direct democracy would work as an effective system of governance and organisational decision-making. 'The people' are demonstrably idiotic, moronic fools, sheep, who must be lead by 'those in the know'. By that logic, it follows we should concentrate all power into the hands of a few beneficent rulers, or an educated aristocracy, or perhaps just one -- the philosopher king. I nominate myself. Any objections? Please e-mail for address to send offerings and libations to me, the ruler of the universe. Donations accepted in the form of gifts of $100 or more. Gold and precious stones preferred. Multitudinous blessings to you, free of charge. Mark Hedges __________________________________________________________________ Mark Hedges hedges at infopeace.com www.infopeace.com ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ From alan at clueserver.org Thu Sep 17 21:23:56 1998 From: alan at clueserver.org (Alan Olsen) Date: Fri, 18 Sep 1998 12:23:56 +0800 Subject: Questions for Magaziner? In-Reply-To: Message-ID: On Fri, 18 Sep 1998, Robert Hettinga wrote: > Anyway, In light of more recent crypto-shenanigans from Billary, and the > fact that this thing's a small crowd, I figured I'd ask if anyone on these > lists had a question they wanted me to ask him. "Was the encryption used by Bill Clinton to encrypt his deposition escrowed, and if so, with whom?" > One I want to ask, right off the top of my head is, "Given your recent > successes in regulating foreign cryptography, what's your timetable for > regulating domestic cryptography?" Or banning outright. alan at ctrl-alt-del.com | Note to AOL users: for a quick shortcut to reply Alan Olsen | to my mail, just hit the ctrl, alt and del keys. From 0jsf50m4 at auto.sixdegrees.com Thu Sep 17 21:43:25 1998 From: 0jsf50m4 at auto.sixdegrees.com (sixdegrees) Date: Fri, 18 Sep 1998 12:43:25 +0800 Subject: Your new password Message-ID: <199809181736.KAA21406@toad.com> Name: TheReal CypherpunksList sixdegrees password: grincusp Congratulations TheReal. You're well on your way to becoming a full sixdegrees(tm) member. Here is your member password: grincusp. Use it to log-in on the home page at the sixdegrees Web site, http://www.sixdegrees.com. We'll ask you for a little more information to complete your registration, and then you'll be ready to start networking. It's important that you return to the site and log-in. Your membership will not be complete until you do so. Once you've successfully logged in with your password, just go to Personal Profile and you'll be able to choose your own password. Thanks for becoming part of sixdegrees. We're looking forward to seeing you at the site. ==================================================================== PLEASE NOTE: All replies to this address are processed by a computer. If you believe you received this e-mail in error, and it was not your intention to become a sixdegrees member, or if you have any problems, questions or requests send an e-mail to issues at sixdegrees.com and someone will get back to you as soon as possible. ==================================================================== E.SI.BAM.1 From kelsey at plnet.net Thu Sep 17 21:47:47 1998 From: kelsey at plnet.net (John Kelsey) Date: Fri, 18 Sep 1998 12:47:47 +0800 Subject: Questions for Magaziner? Message-ID: <199809181747.MAA03503@email.plnet.net> > From: Robert Hettinga > To: cypherpunks at cyberpass.net; cryptography at c2.net; dcsb at ai.mit.edu > Subject: Questions for Magaziner? > Date: Thursday, September 17, 1998 11:38 PM > Anyway, In light of more recent crypto-shenanigans from Billary, and the > fact that this thing's a small crowd, I figured I'd ask if anyone on these > lists had a question they wanted me to ask him. Here's a question I would like to ask, in a rather rough form: There has been a lot of talk by the administration about ``striking a balance'' between citizens privacy concerns and the interests of police and spy agencies. Can you give us some concrete examples of what tradeoffs between these two you consider reasonable? For example, what benefits to society would be worth making all private communications available to the FBI or NSA? Would it be a worthwhile trade to the citizens of the US if we could double the street price of cocaine, at the cost of essentially all phone calls being recorded and subject to monitoring at any time? How about cutting the (already barely measureable) risk of dying from a terrorist act in half? My complaint with their rhetoric is that they always talk about these tradeoffs and about striking a balance, but we never seem to see any balance being struck. Striking a balance means acknowledging that some societal benefits aren't worth giving up our privacy. Will doubling the street price of cocaine improve my life much? It sure doesn't look like it will to me. How about cutting my risk of dying from a terrorist act? This is already much smaller than my risk of dying in a plane crash; how much lower does it need to go? (There is also the issue of whether any claimed set of benefits can be accomplished by key-escrow, or for that matter by putting a videocamera and microphone in every home. But that's a different issue.) Of course, there are a bunch of problems with trying to analyze violating fundamental individual rights for some perceived social benefit, but I don't think their basic argument can work, even if we grant that this sort of tradeoff is a legitimate thing for governments to do. The tradeoffs we've seen offered have not given much weight to citizens' desires for privacy. Consider the Clipper chip, the continued use of export controls to slow down deployment of encryption in the US and worldwide, the FBI's CALEA demands (including their demand a few years ago to be able to listen in on 1/2% of all ongoing calls in urban areas), etc. We haven't seen any attempt to strike a balance so far, just an attempt to claim some bureaucratic turf. > Cheers, > Bob Hettinga --John Kelsey, kelsey at counterpane.com / kelsey at plnet.net NEW PGP print = 5D91 6F57 2646 83F9 6D7F 9C87 886D 88AF From tcmay at got.net Thu Sep 17 21:54:23 1998 From: tcmay at got.net (Tim May) Date: Fri, 18 Sep 1998 12:54:23 +0800 Subject: Cyberpunks Signal-to-Noise Ratio In-Reply-To: Message-ID: At 12:02 PM -0700 9/17/98, Jim Burnes wrote: >Far be it from me to complain about the content-free >nature of others postings, but has anyone else noticed >that the signal on cypherpunks is being lost in the noise? > Complaining about, or even just commenting on, the problems with the Cypherpunks list does no good. * the clueless hotmail, sixdegrees, AOL, etc. posters will not even _read_ the comments, let alone understand them, let alone care. They will continue to ramble on about warez, band stickers, where their shoes are, kool bandz, etc. * as the list is not filtered, censored, moderated or otherwise controlled, how can a complaint about S/N do anything? Are you asking for someone to filter out the noise posts? Are you commissioning the writing of more signal posts? * the list has had several bouts in the past with bombardment by noise posts. Cf. Detweiler (tentacles, snakes of medusa, etc.), Vulis, Toto, etc. Toto's extremely long, incoherent rants consumed far more bandwidth than the current noise constitutes. In short, the _only_ route to fix the S/N is to increase signal. And that happens not be exhorting others to write more signal, but by the act of actually writing signal. And that tends to happen when a critical mass of interested people are having a discussion on topics of interest. And that proceeds in spurts, not surprisingly, as topics come to the fore. Meanwhile, complaining only adds to the noise. --Tim May (This space left blank pending determ. of acceptability to the gov't.) ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, ComSec 3DES: 831-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Licensed Ontologist | black markets, collapse of governments. From alan at clueserver.org Thu Sep 17 22:34:16 1998 From: alan at clueserver.org (Alan Olsen) Date: Fri, 18 Sep 1998 13:34:16 +0800 Subject: Questions for Magaziner? In-Reply-To: Message-ID: On Fri, 18 Sep 1998, Robert Hettinga wrote: > Anyway, In light of more recent crypto-shenanigans from Billary, and the > fact that this thing's a small crowd, I figured I'd ask if anyone on these > lists had a question they wanted me to ask him. "With all the demands from Governent to escrow keys, what steps are being taken to protect the these keys and/or backdoors from misuse from people within the Government and those outside of the Government?" "Would you use escrowed cryptography for your private communications? Who would you trust to hold those keys?" alan at ctrl-alt-del.com | Note to AOL users: for a quick shortcut to reply Alan Olsen | to my mail, just hit the ctrl, alt and del keys. From smb at research.att.com Thu Sep 17 22:52:37 1998 From: smb at research.att.com (Steve Bellovin) Date: Fri, 18 Sep 1998 13:52:37 +0800 Subject: Questions for Magaziner? Message-ID: <199809181852.OAA02137@postal.research.att.com> It is, of course, worth remembering that Magaziner is pretty much on our side on this issue. He just hasn't been able to win over Freeh, Reno, Clinton, etc. From mmotyka at lsil.com Thu Sep 17 23:00:28 1998 From: mmotyka at lsil.com (Michael Motyka) Date: Fri, 18 Sep 1998 14:00:28 +0800 Subject: Mobile phone tracking, pagers, etc In-Reply-To: Message-ID: <3602A53A.48E7@lsil.com> Chip Mefford wrote: > > Actually, > > there seems to be a screw up out there. > > Right now, one can go down the 7/11, and pay > cash for a prepaid cellphone, and renew it with > cellphone time cards also purchased with cash. > > No paperwork, NONE. > > I have one. > > While all of the technology applies, and certainly it is possible > to determine things by analyzing calling habits, I can't see how one > can easily determine who has cellphone #blahblahblahblahblah when > you just bought a box at an out of town 7/11 during the breakfast > rush with cash. > > Esp if one doesn't make a lot of calls. > Tasty. Especially if one's partner in crime has taken the same precaution. To the LEAs: technology giveth and technology taketh away. BTW - do these phones have a modem connector? If not could one be added? Then you get end-to-end privacy too. From tcmay at got.net Thu Sep 17 23:12:39 1998 From: tcmay at got.net (Tim May) Date: Fri, 18 Sep 1998 14:12:39 +0800 Subject: Questions for Magaziner? In-Reply-To: Message-ID: (I'm leaving the damned multiple lists cc:ed on this, as I have no idea where this thread came from. For those of you who send me notes saying I am not allowed to post on your list, plonk.) At 2:33 AM -0700 9/19/98, Alan Olsen wrote: >On Fri, 18 Sep 1998, Robert Hettinga wrote: > >> Anyway, In light of more recent crypto-shenanigans from Billary, and the >> fact that this thing's a small crowd, I figured I'd ask if anyone on these >> lists had a question they wanted me to ask him. > >"With all the demands from Governent to escrow keys, what steps are being >taken to protect the these keys and/or backdoors from misuse from people >within the Government and those outside of the Government?" > >"Would you use escrowed cryptography for your private communications? Who >would you trust to hold those keys?" Well, I believe that even asking these sorts of questions (and possibly getting answers from government) plays into the hands of the GAKkers. After all, suppose they give pretty good answers? What if, for example, they propose a committee consisting of the entire Supreme Court, the Director of the Sierra Club, and so on, and say that a _unanimous_ vote is required to gain access to a key? Does this at all change the fundamental unconstitutionality of telling me that I will face imprisonment if I speak or write in a manner which is not part of their "escrow" arrangement? If I keep a diary without depositing an escrowed key with this noble, careful, thoughtful committee of wise persons? Of course not. My speech, my writing, my private codes, my whisperings, my phone conversations...all of these...are not subject to govenmwental approval. "Congress shall make no law..." Doesn't say that Congress or the courts of the President get to declare illegal certain modes of speaking. (*) (* Please, I hope no one brings up "loud speech," "shouting fire," "obscene speech," "seditious speech," "slanderous speech," etc. This is well-trod ground, but clearly all of these apparent limits on speech, whether one agrees with them or not, have nothing to do with an overbroad requirement that speech only be in certain languages, that letters only be written on carbon paper with a copy filed with the government, and so on. The restrictions on _some_ kinds of speech are not a license to license speech, as it were, or to require escrow of papers, letters, diaries, and phone conversations and such.) My point about Alan's (and others') points is that if we get engaged in this kind of debate about how key escrow might work, we shift the debate from where it ought to be to where they _want_ it to be, namely, to issues of practicality. My view is that my writings are mine. They can try to get them with a search warrant or a court order, but they'd better not threaten me with imprisonment if I choose to write in some language they can't read. And that's all crypto really is, of course. Just another language. --Tim May (This space left blank pending determ. of acceptability to the gov't.) ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, ComSec 3DES: 831-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Licensed Ontologist | black markets, collapse of governments. From 5j0g50e0 at auto.sixdegrees.com Thu Sep 17 23:24:25 1998 From: 5j0g50e0 at auto.sixdegrees.com (sixdegrees) Date: Fri, 18 Sep 1998 14:24:25 +0800 Subject: Hacker D00D Message-ID: <199809181916.MAA22371@toad.com> You've been listed again. Looks like this whole sixdegrees thing is working. Your networking potential is growing by the second. Hacker D00D listed you as "Mother." Please let us know if you are in fact Hacker's Mother: ==================================================================== TO RESPOND: FIRST, click your mail program's reply button. SECOND, in the reply e-mail that opens, on the first line of the message body, type only the word CONFIRM or the word DENY. THEN CLICK SEND. If you prefer, you can take care of this contact confirmation by visiting the site at http://www.sixdegrees.com and going to MY CONTACTS after logging in on the home page. You can also list new contacts there. We look forward to hearing from you. ==================================================================== PLEASE NOTE: All replies to this address are processed by a computer. If you have any problems, questions or requests send an e-mail to issues at sixdegrees.com and someone will get back to you as soon as possible. ==================================================================== E.DB.ANB.4 From mmotyka at lsil.com Thu Sep 17 23:42:03 1998 From: mmotyka at lsil.com (Michael Motyka) Date: Fri, 18 Sep 1998 14:42:03 +0800 Subject: Scorched Earth In-Reply-To: <199809180440.GAA25125@replay.com> Message-ID: <3602B847.21BB@lsil.com> Anonymous wrote: > > :: RANDALL: Don, you've got a story today about what could happen if > :: Republicans press for impeachment on, basically, a sex case against the > :: president. A Democratic scorched-earth policy against the GOP. Tell us > :: about that? > :: Let's see, Starr's inquiries into Clinton sex life *could* be seen, by a sympathetic onlooker, as a very elaborate trap which angered Clinton sufficiently that he became careless and fell into it. This leads to the resounding cries of "if he lied UNDER OATH about his *S*E*X* life what ELSE is he lying to us about?" This is OK because the investigation was carried out under a legal authority. Meanwhile, back in Congress, the Republicans are decrying Hyde's affair's disclosure as a horrible, unwarranted attack with the intent to "intimidate and obstruct justice" and the Parties are trying to cover their own asses by declaring a truce regarding smear campaigns and dirt digging. So, this type of disclosure by civilians through a *free* press is "wrong" and should be prevented. Scorch on, I say. If they are afraid to have us dig into their extramarital affairs what else are they hiding from us? Tobacco deals, arms deals, kickbacks, pageboys? How deep is this dirt they're covering up? The only downside is that after the shit has all fallen to earth the only persons who will dare to run for office under the new rules of engagement will be worse than what we have now even if they're squeaky-clean from a morals perspective. Mike From eaglemailbox at hotmail.com Fri Sep 18 00:01:16 1998 From: eaglemailbox at hotmail.com (I.A. Eaglemail) Date: Fri, 18 Sep 1998 15:01:16 +0800 Subject: Hacker D00D Message-ID: <19980918194942.2300.qmail@hotmail.com> DENY >From cypherpunks-errors at toad.com Fri Sep 18 12:23:32 1998 >Received: (from majordom at localhost) by toad.com (8.7.5/8.7.3) id MAA22376 for cypherpunks-unedited-outgoing; Fri, 18 Sep 1998 12:16:52 -0700 (PDT) >Received: from neptune.sixdegrees.com (neptune.sixdegrees.com [206.41.12.34]) by toad.com (8.7.5/8.7.3) with SMTP id MAA22371 for ; Fri, 18 Sep 1998 12:16:49 -0700 (PDT) >Message-Id: <199809181916.MAA22371 at toad.com> >Date: Fri, 18 Sep 1998 15:15:42 -0500 >From: "sixdegrees"<5j0g50e0 at auto.sixdegrees.com> >To: "Joe Cyberspanker" >Subject: Hacker D00D >Sender: owner-cypherpunks at toad.com >Precedence: bulk > >You've been listed again. Looks like this whole sixdegrees >thing is working. Your networking potential is growing by the >second. Hacker D00D listed you as "Mother." > >Please let us know if you are in fact Hacker's Mother: > >==================================================================== >TO RESPOND: > >FIRST, click your mail program's reply button. > >SECOND, in the reply e-mail that opens, on the first line of >the message body, type only the word CONFIRM or the word DENY. > >THEN CLICK SEND. > >If you prefer, you can take care of this contact confirmation >by visiting the site at http://www.sixdegrees.com and going to >MY CONTACTS after logging in on the home page. You can also list >new contacts there. > >We look forward to hearing from you. > >==================================================================== >PLEASE NOTE: All replies to this address are processed by a computer. >If you have any problems, questions or requests send an e-mail to >issues at sixdegrees.com and someone will get back to you as soon as >possible. >==================================================================== > > >E.DB.ANB.4 > ______________________________________________________ Get Your Private, Free Email at http://www.hotmail.com From mgering at ecosystems.net Fri Sep 18 00:06:55 1998 From: mgering at ecosystems.net (Matthew James Gering) Date: Fri, 18 Sep 1998 15:06:55 +0800 Subject: Questions for Magaziner? Message-ID: <33CCFE438B9DD01192E800A024C84A192846C3@mossbay.chaffeyhomes.com> Mr Magaziner, what do you think Thomas Jefferson meant when he stated: "Those who desire to give up Freedom in order to gain Security, will not have, nor do they deserve, either one." Matt From nobody at replay.com Fri Sep 18 00:31:18 1998 From: nobody at replay.com (Anonymous) Date: Fri, 18 Sep 1998 15:31:18 +0800 Subject: Hacker D00D Message-ID: <199809182026.WAA06050@replay.com> Hey, fuck you! Maybe Hacker D00D is the mother I always wanted! Go stick your head in a fucking incinerator! At 12:49 PM 9/18/98 -0700, I.A. Eaglemail wrote: >DENY > >>From cypherpunks-errors at toad.com Fri Sep 18 12:23:32 1998 >>Received: (from majordom at localhost) by toad.com (8.7.5/8.7.3) id >MAA22376 for cypherpunks-unedited-outgoing; Fri, 18 Sep 1998 12:16:52 >-0700 (PDT) >>Received: from neptune.sixdegrees.com (neptune.sixdegrees.com >[206.41.12.34]) by toad.com (8.7.5/8.7.3) with SMTP id MAA22371 for >; Fri, 18 Sep 1998 12:16:49 -0700 (PDT) >>Message-Id: <199809181916.MAA22371 at toad.com> >>Date: Fri, 18 Sep 1998 15:15:42 -0500 >>From: "sixdegrees"<5j0g50e0 at auto.sixdegrees.com> >>To: "Joe Cyberspanker" >>Subject: Hacker D00D >>Sender: owner-cypherpunks at toad.com >>Precedence: bulk >> >>You've been listed again. Looks like this whole sixdegrees >>thing is working. Your networking potential is growing by the >>second. Hacker D00D listed you as "Mother." >> >>Please let us know if you are in fact Hacker's Mother: >> >>==================================================================== >>TO RESPOND: >> >>FIRST, click your mail program's reply button. >> >>SECOND, in the reply e-mail that opens, on the first line of >>the message body, type only the word CONFIRM or the word DENY. >> >>THEN CLICK SEND. >> >>If you prefer, you can take care of this contact confirmation >>by visiting the site at http://www.sixdegrees.com and going to >>MY CONTACTS after logging in on the home page. You can also list >>new contacts there. >> >>We look forward to hearing from you. >> >>==================================================================== >>PLEASE NOTE: All replies to this address are processed by a computer. >>If you have any problems, questions or requests send an e-mail to >>issues at sixdegrees.com and someone will get back to you as soon as >>possible. >>==================================================================== >> >> >>E.DB.ANB.4 >> > > >______________________________________________________ >Get Your Private, Free Email at http://www.hotmail.com > From rah at shipwright.com Fri Sep 18 00:44:39 1998 From: rah at shipwright.com (Robert Hettinga) Date: Fri, 18 Sep 1998 15:44:39 +0800 Subject: Questions for Magaziner? In-Reply-To: Message-ID: Okay, so the short precis on Magaziner's answer to my question about encryption controls, foriegn or domestic, is he's agin it. He says that controlling foriegn encryption is impossible, and controlling domestic encryption is, at the very least, unconstitutional. He says that the reason the administration's encryption policy is so convoluted is that the law enforcement and the "economic" encryption camps, anti, and pro, evidently, is that the two sides are at loggerheads. Magaziner mirrored Rivest's offer to tax encryption products to pay for increased law enforcement technology support, but, hey, he's a liberal democrat, he's supposed to tax us to death without thinking about the economic, and, of course privacy consequences of raising the price of encryption. So, all in all, he got a round of foot-stomping applause from this bunch on his pro-encryption stance, because, evidently, being a payments technology forum, he was preaching to the choir. Something I found out when I was doing my own speech yesterday. I should realize that anyone building a payment system knows that digital commerce is financial cryptography, after all. :-) Cheers, Bob Hettinga ----------------- Robert A. Hettinga Philodox Financial Technology Evangelism 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From mmotyka at lsil.com Fri Sep 18 00:59:14 1998 From: mmotyka at lsil.com (Michael Motyka) Date: Fri, 18 Sep 1998 15:59:14 +0800 Subject: Democracy... In-Reply-To: <80256682.00312692.00@seunt002e.ssa.co.uk> Message-ID: <3602C866.3874@lsil.com> Richard, Flogging a dead horse may serve a purpose: the steaks that show up on your grocer's shelves might be a bit more tender. I have not tried to say that morals lack value, simply that they are not absolutes. > You may deride my absolutes but if applied by all we would have no crime, no > divorce etc. Boring?? Not really. Many diseases and social problems would > cease or be reduced. > One person's Utopia is, invariably, another's Hell. Utopia is not achievable. Many have tried. All have failed. All future attempts will fail. Any system that fails to acknowledge this will be insufferable. Mike "Heaven, heaven is a place, a place where nothing, nothing ever happens" -Talking Heads- (More Songs About Buildings and Food?) PS : are you a Physicist? > Actually the speed of light varies depending on the medium > This one deserves some reading but I suspect that 'not if you're the photon'. > and the mass of an electron with its velocity. > Gamma = 1 --> Lorentzian = Newtonian. Gamma = 1 if you are the electron being measured. It is still the same after it has been accelerated, it just reads differently from the outside. From alan at clueserver.org Fri Sep 18 01:06:14 1998 From: alan at clueserver.org (Alan Olsen) Date: Fri, 18 Sep 1998 16:06:14 +0800 Subject: Questions for Magaziner? In-Reply-To: Message-ID: On Fri, 18 Sep 1998, Tim May wrote: > (I'm leaving the damned multiple lists cc:ed on this, as I have no idea > where this thread came from. For those of you who send me notes saying I am > not allowed to post on your list, plonk.) I usually leave most of the cc:s due to not knowing who is reading what anymore. (Gateways being as they are...) > >"Would you use escrowed cryptography for your private communications? Who > >would you trust to hold those keys?" > > Well, I believe that even asking these sorts of questions (and possibly > getting answers from government) plays into the hands of the GAKkers. Depends. With the right questions (assuming you get honest (Ha!) answers) you can make them look like control freaks, hypocrites, and/or worse. Hitting them with the unexpected can generate soundbites that can be used for the cause. Besides... If you don't challenge them in public, the public tends to get the impression that no one opposes this KRAP. > After all, suppose they give pretty good answers? What if, for example, > they propose a committee consisting of the entire Supreme Court, the > Director of the Sierra Club, and so on, and say that a _unanimous_ vote is > required to gain access to a key? I would respond that they were lying. I would also ask them if it was going to be like the current wiretap authorization commissions that just rubber stamp requests. > Does this at all change the fundamental unconstitutionality of telling me > that I will face imprisonment if I speak or write in a manner which is not > part of their "escrow" arrangement? If I keep a diary without depositing an > escrowed key with this noble, careful, thoughtful committee of wise persons? Of course not. And questions of constitutionality need to be asked of them directly to their faces. Without that direct confronation, they will do whatever they damn well please. (Not as if they don't now...) > Of course not. My speech, my writing, my private codes, my whisperings, my > phone conversations...all of these...are not subject to govenmwental > approval. "Congress shall make no law..." Encrypt! Encrypt! OK! > Doesn't say that Congress or the courts of the President get to declare > illegal certain modes of speaking. (*) > > (* Please, I hope no one brings up "loud speech," "shouting fire," "obscene > speech," "seditious speech," "slanderous speech," etc. This is well-trod > ground, but clearly all of these apparent limits on speech, whether one > agrees with them or not, have nothing to do with an overbroad requirement > that speech only be in certain languages, that letters only be written on > carbon paper with a copy filed with the government, and so on. The > restrictions on _some_ kinds of speech are not a license to license speech, > as it were, or to require escrow of papers, letters, diaries, and phone > conversations and such.) I am willing to argue that most of those restrictions are against what the founding fathers meant when they wrote the document. But currently we live in a land where "consensus doublethink" is the nature of the law. > My point about Alan's (and others') points is that if we get engaged in > this kind of debate about how key escrow might work, we shift the debate > from where it ought to be to where they _want_ it to be, namely, to issues > of practicality. What needs to be pointed out is that it CANNOT work. By asking them if they would use it, you point out that the system is so untrustworthy that they themselves would not even use it. (And if you say they would, you just start laughing.) > My view is that my writings are mine. They can try to get them with a > search warrant or a court order, but they'd better not threaten me with > imprisonment if I choose to write in some language they can't read. And > that's all crypto really is, of course. Just another language. The current administration has taken the tact that ANY argument, no matter how irrational, to advance their legal position, must be used. That has to colapse opon itself after a while. Whether it be through the total errosion of their reputation capitol (What little is left.) or through judges who cry "enough" and toss out the entire specious line of reasoning. alan at ctrl-alt-del.com | Note to AOL users: for a quick shortcut to reply Alan Olsen | to my mail, just hit the ctrl, alt and del keys. From mmotyka at lsil.com Fri Sep 18 01:14:42 1998 From: mmotyka at lsil.com (Michael Motyka) Date: Fri, 18 Sep 1998 16:14:42 +0800 Subject: Democracy... (fwd) The Nature of Religion In-Reply-To: <33CCFE438B9DD01192E800A024C84A192846AD@mossbay.chaffeyhomes.com> Message-ID: <3602CDEC.4C09@lsil.com> Michael Hohensee wrote: > > Actually, you may be interested to know that *everyone* is religious, in > some manner. Everyone has at least one untestable assumption about the > world. That is, everyone has a kind of faith. Let's give some > examples: > > Christians believe that there exists a Being, called God, which somehow > Moslems believe in the existance of a different God, and have different > Atheists believe that God *doesn't* exist, which is essentially the same > Even people who are nonreligious, or agnostic, have a religion. For > The Transcendentalists of the 19th century, for example, do not really > Scientists tend to think differently. Their beliefs can be described by Lots of scientists look pretty religious about their 'science' to me. Their untestable assumption being that they are capable of comprehending what may be beyond them. Try reading His Master's Voice' by Stanislaw Lem: very nice piece of fiction. I'm now an avowed Apatheist - I don't give a damn what the answers to unanswerable questions are. Especially when those answers come from someone with an obvious agenda. Is that religious? Put a worm on the hook, pop the top off my beer. Argh! It's Coors. I only wish it were imaginary. If not Guiness, at least let it be a Corona. Happy Friday, Mike From rah at shipwright.com Fri Sep 18 01:37:39 1998 From: rah at shipwright.com (Robert Hettinga) Date: Fri, 18 Sep 1998 16:37:39 +0800 Subject: BAN DOGS.. Message-ID: --- begin forwarded text From: vinnie at vmeng.com Date: Fri, 18 Sep 1998 09:34:32 -0700 Subject: BAN DOGS.. To: rah at shipwright.com, Tamzen Cannoy MIME-Version: 1.0 X-Priority: 3 LETTER TO BAN DOGS To the Editor Arizona Republic P.O. Box 2244 Phoenix, Arizona 85002 January 7th, 1998 Dear Editor, I am gratified to read in this morning's paper that someone has finally called attention to an urgent situation which I have known about for a long time: annually 334,000 victims of savage dog bites, most frequently children, average age 15, are taken to the nation's emergency rooms. As the article states: "That's more ER visits than injuries from skateboards, baby walkers and in-line skates combined." Total annual cost of ER dog bites: $102.4 million. Twenty or more people killed annually by dogs, almost all of them children. Because these dogs are so readily obtainable on the streets of our nation, I implore all your readers to immediately deluge their Congressmen with letters, phone calls, faxes and telegrams to support the federal "Save the Widdle Childwen Fwom the Vicious Dog-Bite Act of 1998", which would require the following: mandatory muzzles fitted with muzzle-locks to be kept at all times on all dogs, licensing and paw-printing of all dogs, fingerprinting and house-monitoring of dog owners, including mandatory, federally-monitored safe storage of dogs and an immediate 1,000% tax on all dog food. This Act is sponsored by Canine Control Incorporated, an organization dedicated to eliminating canine violence in America by the year 2000. The Act also provides for the immediate banning of all "assault dogs", the definition of which term will constantly change according to the emotions of the board of C.C.I. "Saturday Night Special" dogs, such as Chihuahuas and other cheap, easily concealed ankle-biters, will also be banned. In addition, the Act bans all sharp canine teeth, all canine teeth longer than a federally-mandated length, all spiked collars and sharp canine toenails. It also mandates that all dogs be transferred only through federally licensed dog dealers, and provides for the changing of the BATF to the Bureau of Alcohol, Tobacco, Firearms and Assault Dogs, or BATFAD. I hope that the physicians' organizations who champion total hand-gun banning will rally behind this urgent cause to save our nation's children. Anyone who opposes this type of legislation obviously hates children. We need this Act desperately - after all, if it saves only one life, it is worth it. Not to mention the $102.4 million dollars in ER charges! My husband's face was horribly mauled at the age of four by a Pit Bull; today he is the poster child for C.C.I. Now, when not being used as a drooling doorstop or for first base, he is routinely wheeled out at charity fund-raising events at which he repeatedly mumbles, "Bad dogs! Ban dogs!" We urgently need your help to get these vicious dogs off the streets now! Please help end canine violence in America! Send donations to: C.C.I., 1111 B.S. Avenue, N.W., Washington, D.C. 20004. Make the checks out to me. Tina Terry c) 1998 by Tina Terry. This letter may be reprinted in its entirety, as long as nothing in it is changed, credit is given the author, and the following is included. Author's note: The author's husband's face really was mauled at age 4 by a Pit Bull, an incident in which he almost lost an eye. He's not in a wheelchair, true, but he also doesn't blame dogs in general for his early experience and he loves and owns dogs to this day. He also has never tried to enlist the author to run around the country trying to ban all dogs. --------------289FF090CB8537C73A0A0B03-- --- end forwarded text ----------------- Robert A. Hettinga Philodox Financial Technology Evangelism 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From rah at shipwright.com Fri Sep 18 01:37:56 1998 From: rah at shipwright.com (Robert Hettinga) Date: Fri, 18 Sep 1998 16:37:56 +0800 Subject: Catchy. Message-ID: --- begin forwarded text Resent-Date: Thu, 17 Sep 1998 11:35:55 -0400 X-Authentication-Warning: qnx.com: localhost [127.0.0.1] didn't use HELO protocol To: 0xdeadbeef at substance.abuse.blackdown.org Subject: Re: Catchy. Date: Thu, 17 Sep 1998 11:18:57 -0400 From: glen mccready Resent-From: 0xdeadbeef at substance.abuse.blackdown.org X-Mailing-List: <0xdeadbeef at substance.abuse.blackdown.org> archive/latest/196 X-Loop: 0xdeadbeef at substance.abuse.blackdown.org Precedence: list Resent-Sender: 0xdeadbeef-request at substance.abuse.blackdown.org From: Andrew Isaacson On Thu, Sep 17, 1998 at 08:34:49AM -0400, glen mccready wrote: > > Forwarded-by: nev at bostic.com > Forwarded-by: Kirk McKusick > From: Rick Kawala > > I was with a friend in Cafe Flore the other night and I had to ask the > counterperson what was playing on the stereo. Sort of techno but with > vocals on some tracks, minorish key, really great. Anyway, the CD arrived > and track 10 is called "PGP". And yes, they're talking about *that* PGP. > My God, an ode to data privacy. This computer thing is getting out of > hand. :) > Rick The CD is titled 'unlearn', the artist is psykosonik, and it's Copyright 1995. This computer thing got out of hand a long time ago. (It's on the Wax Trax label too, so you know it's gotta be good.) -andy -- Andy Isaacson adisaacs at mtu.edu adi at acm.org Fight Spam, join CAUCE: http://www.csl.mtu.edu/~adisaacs/ http://www.cauce.org/ --- end forwarded text ----------------- Robert A. Hettinga Philodox Financial Technology Evangelism 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From rah at shipwright.com Fri Sep 18 01:38:22 1998 From: rah at shipwright.com (Robert Hettinga) Date: Fri, 18 Sep 1998 16:38:22 +0800 Subject: Doomsdays Message-ID: --- begin forwarded text Resent-Date: Thu, 17 Sep 1998 09:41:42 -0400 X-Authentication-Warning: qnx.com: localhost [127.0.0.1] didn't use HELO protocol To: 0xdeadbeef at substance.abuse.blackdown.org Subject: Doomsdays Date: Thu, 17 Sep 1998 09:25:52 -0400 From: glen mccready Resent-From: 0xdeadbeef at substance.abuse.blackdown.org X-Mailing-List: <0xdeadbeef at substance.abuse.blackdown.org> archive/latest/195 X-Loop: 0xdeadbeef at substance.abuse.blackdown.org Precedence: list Resent-Sender: 0xdeadbeef-request at substance.abuse.blackdown.org Forwarded-by: nev at bostic.com Forwarded-by: Jeffrey C Honig Forwarded-by: Monty Solomon Newsgroups: comp.dcom.telecom Jan. 1, 2000 Isn't Only 'Doomsdate' http://webserv1.startribune.com/cgi-bin/stOnLine/article?thisSlug=Y2K13 Published Sunday, September 13, 1998 Jan. 1, 2000, isn't only 'doomsdate' Steve Woodward / Newhouse News Service Jan. 1, 2000, is The Big One, kids. By now, you've heard that many of the world's computers will roll the date clock forward from "99" to "00" with potentially disastrous consequences. Year 2000 authorities prophesy problems as minor as erroneous overdue notices from the library and as major as a failure of the nation's power grid. But that isn't the only computer "doomsdate" looming. A slew of lesser-known dates also could wreak technological havoc. So brace yourself. The first date to dread -- Jan. 1, 1999 -- is fast approaching. Jan. 1, 1999: The one-year-look-ahead problem Not every computer counts forward like you and me. Some look down the road one entire year and count backward to determine the date. (Please don't ask why.) On Jan. 1, 1999, some will look forward one year and see "00." Like humans, the computers may balk at having to count backward from 00. Jan. 1, 1999, to Dec. 31, 2002: The euro currency problem We all know that the year 2000 problem is the biggest software project in history. But many Americans are unaware that programmers throughout the world are also at work on the second biggest software project in history: converting the currencies of 11 European nations into a single currency called the euro. Banks and financial institutions will begin transacting business in euros on Jan. 1, 1999, although the actual bank notes won't be issued until Jan. 1, 2001. The introduction of the euro is to continue through the year 2002. There's no direct link between the euro project and the Y2K project, but the massive size of the simultaneous projects will soon take most of the world's available programmers. Aug. 21, 1999: The GPS rollover problem The world's 24 global positioning satellites record time by counting the weeks that have passed since their launch in 1980. The weeks fill up a counter much like the odometer on your car. But like your odometer, the counter rolls over to 0000 when it's full. At midnight on Aug. 21, 1999, the counter will be full. Equipment that uses the GPS signals may malfunction. Sept. 9, 1999: The 9999 end-of-file problem Many computers have been programmed to recognize 9999 as an "end-of-file" command. Perhaps some computers will conclude, quite logically, that a date of 9/9/99 means it's the end of all time. Oct. 1, 1999: The federal fiscal year 2000 problem Big Daddy rolls its clock forward Oct. 1, 1999. As of that date, the federal government officially enters its 2000 budget year. Every federal function will be affected, from defense to Medicare to payments on the federal debt. Jan. 4, 2000: The first-working-day-of-the-year problem Year 2000 begins on a Saturday. Corporate America will switch on most of its desktop computers Tuesday, Jan. 4, after a long holiday weekend. Boot up and hang on to your morning mochas. Feb. 29, 2000: The Year 2000 leap year problem, Part I Most programmers know the rules for calculating leap years: Any year evenly divisible by four is a leap year, except years that also are divisible by 100. So 1996 is a leap year, but 2000 isn't -- er, right? Well, there's a third, lesser-known rule that cancels the first two: Any year divisible by 400 is a leap year, including -- you guessed it -- 2000. The question is: How many programmers know that rule? Dec. 31, 2000: The Year 2000 leap year problem, Part II Some computers work by counting the number of days in the year. If they aren't programmed to know that 2000 is a leap year, the machines will be bewildered when they reach Dec. 31, 2000, the seemingly impossible 366th day of the year. Sept. 8, 2001: The Unix end-of-file problem Unix is the "other" major operating system, a set of instructions that, like Windows, DOS and MacOS, run the basic functions of a computer. Unix powers many commercial and Internet computers. Unix tells time differently, which means that it does not have a year 2000 problem. Unfortunately, it does have a Sept. 8, 2001, problem. In Unix language, that date is represented by the number 999,999,999 -- the same number that some Unix applications use to denote the end of a file. Circa 2025: The U.S. telephone number problem By the year 2025 or so, the United States will simply run out of available seven-digit telephone numbers and area codes. Telephone companies will have to add digits or revamp the numbering system. That, in turn, will force software programmers to overhaul every piece of software that uses phone numbers, plus all databases and archives that store phone numbers. Jan. 19, 2038: The other Unix problem The Unix operating system tells time by counting the number of seconds elapsed since Jan. 1, 1970. But like your odometer, there are only so many places on its counter. At seven seconds past 3:14 a.m. on Jan. 19, 2038, the counters on every Unix computer in the world will be full and will roll over to "0." Many computers will assume it's either Jan. 1, 1970, all over again (who wants to relive the '70s?) or that it's the end of the world (which may be a better alternative than the preceding). Circa 2050 to 2075: The Social Security number problem By 2075, the United States will have exhausted the 1 billion unique Social Security numbers possible under its nine-digit numbering system. Year 2000 expert Capers Jones suggests that the nation must be prepared by 2050 to expand or replace the many software applications that depend on those numbers. --- end forwarded text ----------------- Robert A. Hettinga Philodox Financial Technology Evangelism 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From wombat at mcfeely.bsfs.org Fri Sep 18 01:42:08 1998 From: wombat at mcfeely.bsfs.org (Rabid Wombat) Date: Fri, 18 Sep 1998 16:42:08 +0800 Subject: Hacker D00D In-Reply-To: <19980918194942.2300.qmail@hotmail.com> Message-ID: On Fri, 18 Sep 1998, I.A. Eaglemail wrote: > >You've been listed again. Looks like this whole sixdegrees > >thing is working. Your networking potential is growing by the > >second. Hacker D00D listed you as "Mother." > > > >Please let us know if you are in fact Hacker's Mother: Well, they got it half right ... From nobody at replay.com Fri Sep 18 01:51:06 1998 From: nobody at replay.com (Anonymous) Date: Fri, 18 Sep 1998 16:51:06 +0800 Subject: Your new password Message-ID: <199809182146.XAA13489@replay.com> Name: Mark Salamon spamhaven password: dumbshit Congratulations Mark. You're well on your way to becoming a full member of the Hall of Shame. Here is your member password: dumbshit. Use it to log-in on the home page at the Spam Haven Web site, http://www.sixdegrees.com. We'll ask you for a little more information to complete your registration, like how many thousands of dollars in resources you've stolen in your career, and then you'll be ready to start networking. It's important that you check your postal mail often, because it will only hold so many magazine subscriptions. Your membership will not be complete until you make yourself look even more clueless. Once you've successfully made an even bigger fool out of yourself, just go to Personal Profile and you'll be able to choose your own password. We suggest that you set it to something which describes your company, like "careless," "thief," "pathetic," or "spamhaven." Thanks for becoming part of the Internet Hall of Shame. We're looking forward to seeing you at the site. ==================================================================== PLEASE NOTE: You may receive many magazine subscriptions in the next few weeks. If you believe that you have been classed as a complete loser in error, go to a reputable company instead of a spam haven. Send all communications to Spamford at LWRules at BELLATLANTIC.NET and someone will get back to you as soon as possible. ==================================================================== E.DI.ASS.1 On Fri, 18 Sep 1998, sixdegrees wrote: > > Name: Lefty CyberSlasher > sixdegrees password: landmelt > > Congratulations Lefty. You're well on your way to > becoming a full sixdegrees(tm) member. Here is your member > password: landmelt. Use it to log-in on the home page > at the sixdegrees Web site, http://www.sixdegrees.com. > We'll ask you for a little more information to complete your > registration, and then you'll be ready to start networking. > > It's important that you return to the site and log-in. Your > membership will not be complete until you do so. > > Once you've successfully logged in with your password, just go > to Personal Profile and you'll be able to choose your own > password. > > Thanks for becoming part of sixdegrees. We're looking forward > to seeing you at the site. > > ==================================================================== > PLEASE NOTE: All replies to this address are processed by a computer. > If you believe you received this e-mail in error, and it was not your > intention to become a sixdegrees member, or if you have any problems, > questions or requests send an e-mail to issues at sixdegrees.com > and someone will get back to you as soon as possible. > ==================================================================== > > > E.SI.BAM.1 > > From mmotyka at lsil.com Fri Sep 18 02:25:04 1998 From: mmotyka at lsil.com (Michael Motyka) Date: Fri, 18 Sep 1998 17:25:04 +0800 Subject: Questions for Magaziner? In-Reply-To: Message-ID: <3602DE7E.1C0E@lsil.com> Tim May wrote: > My view is that my writings are mine. They can try to get them with a > search warrant or a court order, but they'd better not threaten me with > imprisonment if I choose to write in some language they can't read. And > that's all crypto really is, of course. Just another language. > My gut feeling is that if a search turns up an encrypted file then, by golly, what you see is what there is, make a bit-accurate copy and be on your way, what's in my head belongs to me. But is that what the courts, scared shitless of hordes of child molesters and terrorists conspiring via secure e-mail and phones, will say? They'll probably avoid attacking the 1st and 4th( already weakened by the war on drugs ) and attack the 5th with a 'greater good' argument and the analogy of the locked safe. This requires an explanation of how the stored documents are the modern-day .equivalent. of physical paper and should be treated as such. It's only spitting distance from there to the idea that a memorized key is the same as a physical key in which case its owner doesn't enjoy the protections of the 5th. Hand it over Jack. The law has to adapt to the changing technology. No need to outlaw cryptography; just redefine the boundaries of the power to destroy. Mike PS - How does a grant of limited immunity work? From jya at pipeline.com Fri Sep 18 02:33:19 1998 From: jya at pipeline.com (John Young) Date: Fri, 18 Sep 1998 17:33:19 +0800 Subject: Calif Leads US with Mobile Tracker Message-ID: <199809182234.SAA30415@camel7.mindspring.com> Thanks to John Gilmore. http://www.msnbc.com/local/KNBC/14920.asp CHP introduces cellular-friendly 911 system Operators will now be able to capture the telephone number and location of the caller within a half-block area LOS ANGELES, Sept. 17 - The California Highway Patrol this week demonstrated a new countywide 911 system designed to provide operators with the telephone numbers and location of callers using mobile telephones. Los Angeles County is the first in the state to use the new technology, said CHP Sgt. Ernie Sanchez. All local 911 calls for the CHP, whether via mobile phones or "land lines," are routed to the CHP half-a-millionCommunications Center just west of downtown, but mobile phone calls could not be traced until recently, Sanchez said. "It doesn�t matter if you live in Pasadena or Arcadia or West Covina; if you call on a cell phone, that call will go through the CHP Communications Center" and operators will be able to capture the telephone number and location of the caller within a half-block area, Sanchez said. The enhanced technology has been in use for the past three weeks, he said. All major mobile phone companies are participating in the test and demonstration of the system, Sanchez said, adding that the technology should be in place nationwide by 2001 under Federal Communications Commission rules. From mah248 at is9.nyu.edu Fri Sep 18 02:47:47 1998 From: mah248 at is9.nyu.edu (Michael Hohensee) Date: Fri, 18 Sep 1998 17:47:47 +0800 Subject: Democracy... (fwd) The Nature of Religion In-Reply-To: <33CCFE438B9DD01192E800A024C84A192846AD@mossbay.chaffeyhomes.com> Message-ID: <3602E3DA.91CC48D4@is9.nyu.edu> Michael Motyka wrote: > > Michael Hohensee wrote: > > > > Actually, you may be interested to know that *everyone* is religious, in > > some manner. Everyone has at least one untestable assumption about the > > world. That is, everyone has a kind of faith. Let's give some > > examples: > > > > Christians believe that there exists a Being, called God, which somehow > > Moslems believe in the existance of a different God, and have different > > Atheists believe that God *doesn't* exist, which is essentially the same > > Even people who are nonreligious, or agnostic, have a religion. For > > The Transcendentalists of the 19th century, for example, do not really > > Scientists tend to think differently. Their beliefs can be described by > > Lots of scientists look pretty religious about their 'science' to me. I believe that I said that. We religiously believe that the universe exists, but, since we're honest with ourselves, we admit that we can't prove it, and simply choose to act under the assumption that it is real. (after all, that model seems to work pretty well) > Their untestable assumption being that they are capable of comprehending > what may be beyond them. No. All we assume is that the universe exists. Whether or not we can fully comprehend everything about how it works is another question entirely. We currently understand all kinds of interesting things about how the universe works, but no one says that that's everything. If something is physically beyond our understanding, then of course we won't be able to understand it, but we haven't hit such a wall yet. Who knows, if we ever do hit that wall, we may be able to build machines which can help us understand (or at least take advantage of) things beyond that wall. I'd say to worry about it when we come to it. :) > I'm now an avowed Apatheist - I don't give a damn what the answers to > unanswerable questions are. Especially when those answers come from > someone with an obvious agenda. Is that religious? > > Put a worm on the hook, pop the top off my beer. Argh! It's Coors. I > only wish it were imaginary. If not Guiness, at least let it be a > Corona. So you do believe (or at least act under the assumption) that the universe is real, then? ;) From hedges at infopeace.com Fri Sep 18 02:59:04 1998 From: hedges at infopeace.com (Mark Hedges) Date: Fri, 18 Sep 1998 17:59:04 +0800 Subject: BAN DOGS.. In-Reply-To: Message-ID: Some months ago, the cops in Washington D.C. swept through the housing projects, rounded up, and executed a large number of 'illegal dogs' (pit bulls?). There was a tiny paragraph in USA Today about it. -hedges- >--- begin forwarded text > > >From: vinnie at vmeng.com >Date: Fri, 18 Sep 1998 09:34:32 -0700 >Subject: BAN DOGS.. >To: rah at shipwright.com, Tamzen Cannoy >MIME-Version: 1.0 >X-Priority: 3 > > >LETTER TO BAN DOGS > >To the Editor >Arizona Republic >P.O. Box 2244 >Phoenix, Arizona 85002 > >January 7th, 1998 > >Dear Editor, > >I am gratified to read in this morning's paper that someone has finally >called attention to an urgent situation which I have known about for a long >time: annually 334,000 victims of savage dog bites, most frequently >children, average age 15, are taken to the nation's emergency rooms. As >the article states: "That's more ER visits than injuries from skateboards, >baby walkers and in-line skates combined." Total annual cost of ER dog >bites: $102.4 million. Twenty or more people killed annually by dogs, >almost all of them children. > >Because these dogs are so readily obtainable on the streets of our nation, >I implore all your readers to immediately deluge their Congressmen with >letters, phone calls, faxes and telegrams to support the federal "Save the >Widdle Childwen Fwom the Vicious Dog-Bite Act of 1998", which would require >the following: mandatory muzzles fitted with muzzle-locks to be kept at all >times on all dogs, licensing and paw-printing of all dogs, fingerprinting >and house-monitoring of dog owners, including mandatory, >federally-monitored safe storage of dogs and an immediate 1,000% tax on all >dog food. This Act is sponsored by Canine Control Incorporated, an >organization dedicated to eliminating canine violence in America by the >year 2000. The Act also provides for the immediate banning of all "assault >dogs", the definition of which term will constantly change according to the >emotions of the board of C.C.I. "Saturday Night Special" dogs, such as >Chihuahuas and other cheap, easily concealed ankle-biters, will also be >banned. In addition, the Act bans all sharp canine teeth, all canine teeth >longer than a federally-mandated length, all spiked collars and sharp >canine toenails. It also mandates that all dogs be transferred only >through federally licensed dog dealers, and provides for the changing of >the BATF to the Bureau of Alcohol, Tobacco, Firearms and Assault Dogs, or >BATFAD. > >I hope that the physicians' organizations who champion total hand-gun >banning will rally behind this urgent cause to save our nation's children. >Anyone who opposes this type of legislation obviously hates children. We >need this Act desperately - after all, if it saves only one life, it is >worth it. Not to mention the $102.4 million dollars in ER charges! > >My husband's face was horribly mauled at the age of four by a Pit Bull; >today he is the poster child for C.C.I. Now, when not being used as a >drooling doorstop or for first base, he is routinely wheeled out at charity >fund-raising events at which he repeatedly mumbles, "Bad dogs! Ban dogs!" > >We urgently need your help to get these vicious dogs off the streets now! >Please help end canine violence in America! Send donations to: C.C.I., >1111 B.S. Avenue, N.W., Washington, D.C. 20004. > >Make the checks out to me. > >Tina Terry > >c) 1998 by Tina Terry. This letter may be reprinted in its entirety, as >long as nothing in it is changed, credit is given the author, and the >following is included. Author's note: The author's husband's face really >was mauled at age 4 by a Pit Bull, an incident in which he almost lost an >eye. He's not in a wheelchair, true, but he also doesn't blame dogs in >general for his early experience and he loves and owns dogs to this day. He >also has never tried to enlist the author to run around the country trying >to ban all dogs. > > > >--------------289FF090CB8537C73A0A0B03-- > >--- end forwarded text > > >----------------- >Robert A. Hettinga >Philodox Financial Technology Evangelism >44 Farquhar Street, Boston, MA 02131 USA >"... however it may deserve respect for its usefulness and antiquity, >[predicting the end of the world] has not been found agreeable to >experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' __________________________________________________________________ Mark Hedges hedges at infopeace.com www.infopeace.com ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ From nobody at replay.com Fri Sep 18 03:14:36 1998 From: nobody at replay.com (Anonymous) Date: Fri, 18 Sep 1998 18:14:36 +0800 Subject: Welcome to the CyberPorno Members List! Message-ID: <199809182308.BAA20354@replay.com> ERROR: The return address was not valid. Accordingly, the administrative contact of the site has been signed up for the CyberPorno mailing list. Thank you for mailing the CyberPorno mailing list, Mark! You're well on your way to receiving lots of CyberPorno. As you must know since you mailed us, we specialize in ensuring that you receive as many porno ads, binaries, sexual propositions, and copies of the Starr Report as possible. Accordingly as per the agreement, your address is being submitted to alt.sex.wanted, alt.binaries.pictures.erotica, and over 200 Web sex sites. Your address is also being signed up for 100 copies of the Starr Report, and each page will be sent as an uncompressed graphics file. You have also been signed up with 15 XXX Pics of the Hour clubs, so you'll never be without again! Your address and name are also being submitted to over 25 Web personals sites for gay men, 2 sites for men with small penises, and 17 sites for people with severe sexual dysfunctions. You're in luck and got us while we're offering a special limited time deal. As a FREE bonus, your name, home address, phone number, email address, and place of employment have been sent to the New York Times and the State of New York. Congratulations! Tomorrow you'll be a registered sex offender, kiddy porn trader, and all around disgusting guy! Since their addresses were on this too, your coworkers have also been signed up. Once again, thank you for mailing the CyberPorno mailing list. ==================================================================== PLEASE NOTE: All messages to the CyberPorno mailing list are processed by a computer. If you believe you have been added to the CyberPorno membership list in error, that's too bad because, like sixdegrees(tm), we don't care about your complaints. If you have questions or requests send an e-mail to nobody at replay.com and someone will get back to you before the sun goes nova. ==================================================================== On Fri, 18 Sep 1998, sixdegrees wrote: > > Name: Spermy CyberPorno > sixdegrees password: rampnull > > Congratulations Spermy. You're well on your way to > becoming a full sixdegrees(tm) member. Here is your member > password: rampnull. Use it to log-in on the home page > at the sixdegrees Web site, http://www.sixdegrees.com. > We'll ask you for a little more information to complete your > registration, and then you'll be ready to start networking. > > It's important that you return to the site and log-in. Your > membership will not be complete until you do so. > > Once you've successfully logged in with your password, just go > to Personal Profile and you'll be able to choose your own > password. > > Thanks for becoming part of sixdegrees. We're looking forward > to seeing you at the site. > > ==================================================================== > PLEASE NOTE: All replies to this address are processed by a computer. > If you believe you received this e-mail in error, and it was not your > intention to become a sixdegrees member, or if you have any problems, > questions or requests send an e-mail to issues at sixdegrees.com > and someone will get back to you as soon as possible. > ==================================================================== > > > E.SI.BAM.1 > > From cvenden at webmail.bellsouth.net Fri Sep 18 18:34:10 1998 From: cvenden at webmail.bellsouth.net (cvenden at webmail.bellsouth.net) Date: Fri, 18 Sep 1998 18:34:10 -0700 (PDT) Subject: ATTENTION ALL HOME OWNERS!!! Message-ID: <19980919025114.606905d84f0d11d297290000c000128f.in@trip.it> Dear Homeowner: Would you like to pay off all your bills? Do some home improvements? Now you can! There has never been a better time to take advantage of some of the lowest interest rates in over two decades! Zero out-of-pocket expense Loan proceeds may be used for debt consolidation and/or home improvements, or a portion of loan amount can also be used for any purpose Consolidate your debts into one, easy, low payment Increase your cash flow Pay off all your bills No equity required! (Up to 135% loan-to-value) No appraisal required for loan amounts $60,000 or less Fixed rates and payments Funding in as little as 7 -10 working days Terms to 25 years or less Interest may be tax deductible (Consult your tax advisor.) 1st or 2nd low interest mortgages also available Here is an example of the savings you could receive: ITEM DEBT PAYMENT Credit Card #1 $5,000 $200/mo. Credit Card #2 $8,000 $320/mo. Credit Card #3 $7,250 $290/mo. Personal Loan $7,750 $310/mo. Total $28,000 $1120/mo. Payment before: $1120 per month Payment after: $337 per month YOU SAVE $783 PER MONTH - OVER $9,300 IN CASH PER YEAR! Isn't it time you got out from underneath the burden of all your debt? For your FREE mortgage analysis visit our website. Remember, there is absolutely no obligation. CLICK HERE for more info... **************************************************************** If you wish to be removed from this mailing list, click here and your request will be immediately honored. @1998 West Coast Funding. All rights reserved.

APTV-09-11-98 1330EDT From fisherm at tce.com Thu Sep 10 22:10:43 1998 From: fisherm at tce.com (Fisher Mark) Date: Fri, 11 Sep 1998 13:10:43 +0800 Subject: oil, greens, recycling, and poly-ticks. Message-ID: <2C396693FBDED111AEF60000F84104A721BFAA@indyexch_fddi.indy.tce.com> Ray Arachelian writes: >Just out of curiosity what are prices around where you guys live? Prices here range from .97-.99 for name brands (Shell, etc.) and around .89 for no-name brands right now. ========================================================== Mark Leighton Fisher Thomson Consumer Electronics fisherm at indy.tce.com Indianapolis, IN "Their walls are built of cannon balls, their motto is 'Don't Tread on Me'" > . > From sbryan at vendorsystems.com Thu Sep 10 22:37:09 1998 From: sbryan at vendorsystems.com (Steve Bryan) Date: Fri, 11 Sep 1998 13:37:09 +0800 Subject: Bits are Bits In-Reply-To: Message-ID: >> -----Original Message----- >> From: Steve Bryan [SMTP:sbryan at vendorsystems.com] > [...] >> But I have not yet seen CD-ROMs for rent or even available to >> check out for home use from the public library. > [...] > [forgive the lame quoting format - I'm using > a Microsoft product.] > > I was in my town library yesterday, and they > were loaning CDROMs. I was in a hurry, so did > not check the details. At least one was made by > National Geographic. (BTW: You can get the *entire* > *run* of NG on CDROM, which I think is pretty neat.) > > Peter Trei They have CD-ROM's at our local public library but only for use at the library. It isn't possible to check them out for use at home. I don't know if this is a legal issue or just a matter of policy but it is annoying. Steve Bryan Vendorsystems International email: sbryan at vendorsystems.com icq: 5263678 pgp fingerprint: D758 183C 8B79 B28E 6D4C 2653 E476 82E6 DA7C 9AC5 From jvb at ssds.com Thu Sep 10 22:39:02 1998 From: jvb at ssds.com (Jim Burnes) Date: Fri, 11 Sep 1998 13:39:02 +0800 Subject: U.S. House only has a T-1 In-Reply-To: Message-ID: On Fri, 11 Sep 1998, Declan McCullagh wrote: etc delete.... Declan: Is there any effort underway to mirror the report to various archives? This is going to kill the DC internet corridor otherwise. jim burnes From jmg123 at hotmail.com Thu Sep 10 22:52:29 1998 From: jmg123 at hotmail.com (J. Michael) Date: Fri, 11 Sep 1998 13:52:29 +0800 Subject: Starr report Message-ID: <19980911185240.16578.qmail@hotmail.com> http://www.cnn.com/starr.report/ ______________________________________________________ Get Your Private, Free Email at http://www.hotmail.com From minow at pobox.com Thu Sep 10 22:57:27 1998 From: minow at pobox.com (Martin Minow) Date: Fri, 11 Sep 1998 13:57:27 +0800 Subject: U.S. House only has a T-1 In-Reply-To: Message-ID: >From Jim Burns: > >Is there any effort underway to mirror the report to various >archives? This is going to kill the DC internet corridor >otherwise. > What I heard on the radio this morning was that the house will press CD's that will be distributed to mirror servers (presumably the major Internet news providers.) Now, the real interesting question: will the files be PGP-signed? Martin Minow minow at pobox.com From tcmay at got.net Thu Sep 10 23:11:00 1998 From: tcmay at got.net (Tim May) Date: Fri, 11 Sep 1998 14:11:00 +0800 Subject: U.S. House only has a T-1 In-Reply-To: Message-ID: At 11:42 AM -0700 9/11/98, Jim Burnes wrote: >On Fri, 11 Sep 1998, Declan McCullagh wrote: > >etc delete.... > >Declan: > >Is there any effort underway to mirror the report to various >archives? This is going to kill the DC internet corridor >otherwise. Turn on the television. All of the networks and news stations are mirroring it. The ones I've tried, cnn.com, foxnews.com, etc., are also swamped. However, the talking heads--no pun intended--are all reading the sordid details about Clinton's cigar being inserted into Monica's vagina, about how Clinton talked with Congressional leaders while Monica was giving him a blowjob, and how Clinton suborned perjury and tampered with evidence.... "The guy is going down...in more ways than one." BTW, I had heard Matt Drudge on the cigar issue before Declan visited a few weeks ago. I was able to "break" this story to Declan, no mean feat. --Tim May (This space left blank pending determ. of acceptability to the gov't.) ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, ComSec 3DES: 831-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Licensed Ontologist | black markets, collapse of governments. From mgering at ecosystems.net Thu Sep 10 23:15:37 1998 From: mgering at ecosystems.net (Matthew James Gering) Date: Fri, 11 Sep 1998 14:15:37 +0800 Subject: Rental of PC software... Message-ID: <33CCFE438B9DD01192E800A024C84A19284646@mossbay.chaffeyhomes.com> USC Title 17 � 109 subsec (b)(1)(A) ...unless authorized by the ...owner of copyright in a computer program (including any tape, disk, or other medium embodying such program), ...[no] person in possession of a particular copy of a computer program (including any tape, disk, or other medium embodying such program), may, for the purposes of direct or indirect commercial advantage, dispose of, or authorize the disposal of, the possession of that ...computer program (including any tape, disk, or other medium embodying such program) by rental, lease, or lending, or by any other act or practice in the nature of rental, lease, or lending. ... The transfer of possession of a lawfully made copy of a computer program by a nonprofit educational institution to another nonprofit educational institution or to faculty, staff, and students does not constitute rental, lease, or lending for direct or indirect commercial purposes under this subsection. (B) This subsection does not apply to - (i) a computer program which is embodied in a machine or product and which cannot be copied during the ordinary operation or use of the machine or product; or (ii) a computer program embodied in or used in conjunction with a limited purpose computer that is designed for playing video games and may be designed for other purposes. ... (2)(A) Nothing in this subsection shall apply to the lending of a computer program for nonprofit purposes by a nonprofit library, if each copy of a computer program which is lent by such library has affixed to the packaging containing the program a warning of copyright in accordance with requirements that the Register of Copyrights shall prescribe by regulation. (B) Not later than three years after the date of the enactment of the Computer Software Rental Amendments Act of 1990, and at such times thereafter as the Register of Copyright considers appropriate, the Register of Copyrights, after consultation with representatives of copyright owners and librarians, shall submit to the Congress a report stating whether this paragraph has achieved its intended purpose of maintaining the integrity of the copyright system while providing nonprofit libraries the capability to fulfill their function. Such report shall advise the Congress as to any information or recommendations that the Register of Copyrights considers necessary to carry out the purposes of this subsection. From CTIA_Daily_News at um2.unitymail.com Fri Sep 11 15:12:38 1998 From: CTIA_Daily_News at um2.unitymail.com (CTIA Daily News) Date: Fri, 11 Sep 1998 15:12:38 -0700 (PDT) Subject: LATE BREAKING NEWS! - September 11, 1998 5:30PM EST Message-ID: <199809112211.RAA20962@revnet4.revnet.com> ************************************************************ Late today, the FCC released its long-awaited order extending the October 25, 1998, CALEA compliance deadline 20 months to June 30, 2000. The Commission will soon initiate a rulemaking proceeding to consider whether modifications to the core J-STD-025 standard may be necessary to comply with CALEA. Visit WOW-COM for more details. http://www.wow-com.com/professional/ Specific News Story is: http://www.wow-com.com/results/professional/news/frameindex.cfm?articlei d=3410 ************************************************************ From adam at homeport.org Fri Sep 11 00:15:39 1998 From: adam at homeport.org (Adam Shostack) Date: Fri, 11 Sep 1998 15:15:39 +0800 Subject: cypherpunks archive In-Reply-To: Message-ID: <19980911161107.A1444@weathership.homeport.org> Rate limit it for the masses; sell access to an unlimited version of the site? Adam | Anyone have 1gb of disk space on a machine, optionally with root access, | on a machine with unmetered network access outside the US on which I | could put the archive? | | I can put the archive here in AI, but I'll have to charge per megabyte, | as my t1 is metered-use :( It would end up being something on the order of | $0.50/MB for total traffic, and unfortunately there are no good payment | systems for that kind of thing right now. -- "I only work at Security Dynamics because of food poisoning." -- Anon From vznuri at netcom.com Fri Sep 11 01:14:55 1998 From: vznuri at netcom.com (Vladimir Z. Nuri) Date: Fri, 11 Sep 1998 16:14:55 +0800 Subject: SNET: Plans for internet banks in Australia, says Ernst & Young Message-ID: <199809112115.OAA15341@netcom13.netcom.com> From: jeremy.compton at stonebow.otago.ac.nz (Jeremy Compton) Subject: SNET: Plans for internet banks in Australia, says Ernst & Young Date: Sat, 12 Sep 1998 03:04:23 +1200 To: snetnews at world.std.com -> SNETNEWS Mailing List Plans for internet banks in Australia, says Ernst & Young Sydney, Sept 9 AAP - Offshore and local companies have strategic plans to establish stand alone Internet banks in Australia to compete with the existing banking network, financial services consultants Ernst & Young said today. Ernst & Young partner Andrew Keene, who specialises in technology strategy for financial institutions, said the international consulting firm was aware of both overseas and domestic companies with plans for internet banks. "There are some plans that we are aware of," Mr Keene told reporters. "I believe most of the plans are formative." He declined to name the companies. Ernst & Young yesterday released its latest report on technology in banking and financial services, with more t0 of the world's largest financial institutions in 26 countries participating in the seventh global study. Entitled Electronic Commerce and Connecting to the Customer, the report analyses the technology spending plans of banks, insurance companies, asset management and brokerage institutions in the United States, Europe, Asia and Australia. The report found that technology spending priorities of Australia's financial institutions to develop new customer channels have been surpassed by the "more immediate issues" of mergers and acquisitions, the millennium bug and the Euro. Kevin Hall, the national leader of Ernst & Young's Australian financial services consulting group, said that the new spending priorities "have meant that spending on the critical area of improved customer services has been delayed". He said that the report found that financial institutions are "anticipating heavy increases" in technology spending, with technology budgets rising 14 percent in calendar 1998, tapering off to six percent by 2001. "But while spending rates will decline over time, the actual budget amounts will continue to increase, with actual budgets project to double between 1992 and 2000," he said. However, technology budgets are predominantly being spent on mandated projects such as computer upgrades to avoid the Year 2000 software date problem. The survey also found that only 12 percent of Australian institutions believed that the internet will help them retain customers and business, compared to 47 percent of US respondents and 34 percent of European respondents. Russell Ives, a data warehouse specialist at the firm, said that Australian banks view Internet services such as electronic commerce or e-commerce as cost-saving devices whereas US banks used it to "focus on retaining customers". "The great opportunity that exists for financial institutions in Australia is to refocus their e-commerce strategy towards customer retention," said Mr Hall, adding that some institutions are "unsure how to use" e-commerce. Australian financial institutions are also behind their overseas counterparts in integrating customer data to develop sophisticated knowledge of customer needs to enhance the cross-selling of products and target services. "Nobody has really integrated its completely," Mr Hall said of Australian financial institutions. Mr Ives said that banks have to advance data integration rapidly, especially when it comes to refocusing e-commerce strategies on customer retention. Overseas banks such as Wells Fargo, Bank of Montreal and ING Bank are some of the leaders in e-commerce and internet. "So our conclusion is that the most effective financial institutions will develop alliances to deliver electronic commerce," Mr Keene said. AAP pjg 10/09/98 08-09NZ � New Zealand Press Association -> Send "subscribe snetnews " to majordomo at world.std.com -> Posted by: jeremy.compton at stonebow.otago.ac.nz (Jeremy Compton) From vznuri at netcom.com Fri Sep 11 01:15:07 1998 From: vznuri at netcom.com (Vladimir Z. Nuri) Date: Fri, 11 Sep 1998 16:15:07 +0800 Subject: IP: Web sites preparing for Starr report onslaught Message-ID: <199809112115.OAA15319@netcom13.netcom.com> From: believer at telepath.com Subject: IP: Web sites preparing for Starr report onslaught Date: Fri, 11 Sep 1998 06:40:46 -0500 To: believer at telepath.com Source: Fox News - AP Web sites preparing for Starr report onslaught 2.42 a.m. ET (642 GMT) September 11, 1998 By Chris Allbritton, Associated Press NEW YORK (AP) � Web surfers hoping to view portions of Independent Counsel Kenneth Starr's report when it goes online today instead may need to wait in line. An expert in high-volume Web sites said millions of Web surfers � clustered around Web sites like people used to cluster around teletype machines waiting for the latest dispatches from news wire services � probably will swamp the government's computers. "I would imagine a lot of people getting a 'Site Not Available' (message),'' said J.D. Zeeman, who coordinated IBM's Web site for the Winter Olympics in Nagano, Japan, earlier this year. At one point, the Olympics site was getting more than 110,000 hits a minute, Zeeman said. By Thursday afternoon, the crush of people visiting the House's Web site � called Thomas � prompted this message: "The Library of Congress is aware of public statements announcing the availability of the Independent Counsel's report at this site. As yet, the House of Representatives has taken no action regarding the public availability of this report.'' A House vote on releasing the report was planned for today. "The technology exists to handle this kind of load today, but it literally takes months to get it in place,'' Zeeman said. "Unless they've done something, I wouldn't imagine they would be adequately prepared.'' A congressional source said the House is adequately prepared, posting the report on government sites and distributing formatted copies to Web sites of major newspapers, magazines, The Associated Press and other news services, and online outlets such as America Online and Yahoo! The Web has become a popular way to distribute government documents in the past few years, but the last time a government body tried to release red-hot documents on the Web, it was a disaster. It was the case of Louise Woodward, the British au pair accused of murder. In November 1997, Massachusetts Superior Court Judge Hiller B. Zobel said he would release on the Web his decision to reduce Woodward's conviction to manslaughter. Millions on both sides of the Atlantic who had followed the story eagerly anticipated the first online release of a criminal court ruling. But a power outage delayed the ruling for hours, and heavy traffic at Web sites made it almost impossible for people to read the decision once it was online. The foul-up with the Woodward decision, while embarrassing, was not unique. News sites usually slow down, or even crash, when the always increasing number of Web surfers rushes online for news. It happened during the Woodward case, after the death of Princess Diana and during the recent gyrations of the stock market. The slowdowns are just the nature of news on the Internet. The parallel is a newspaper that assigns many reporters to a major story such as the Oklahoma City bombing, or printing a lengthy report by an independent counsel. "I guess when you think of throwing all sorts of reporters on a story, you're straining resources,'' said Ruth Gersh, editor of AP's multimedia services. "If you put up the report on the Web, it uses up resources which we call bandwidth.'' Congressional leaders expect the report to be available this afternoon through these government Web addresses: �http://thomas.loc.gov/icreport �http://www.house.gov/icreport � 1998 Associated Press. All rights reserved. ----------------------- NOTE: In accordance with Title 17 U.S.C. section 107, this material is distributed without profit or payment to those who have expressed a prior interest in receiving this information for non-profit research and educational purposes only. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml ----------------------- ********************************************** To subscribe or unsubscribe, email: majordomo at majordomo.pobox.com with the message: (un)subscribe ignition-point email at address ********************************************** www.telepath.com/believer ********************************************** From vznuri at netcom.com Fri Sep 11 01:15:08 1998 From: vznuri at netcom.com (Vladimir Z. Nuri) Date: Fri, 11 Sep 1998 16:15:08 +0800 Subject: IP: Privacy: Companies admit spying on staff Message-ID: <199809112115.OAA15330@netcom13.netcom.com> From: believer at telepath.com Subject: IP: Privacy: Companies admit spying on staff Date: Fri, 11 Sep 1998 12:14:18 -0500 To: believer at telepath.com Source: The Age (Australia) http://www.theage.com.au:80/daily/980910/news/news19.html Companies admit spying on staff By LEON GETTLER More than one in two of Australia's largest companies carry out video surveillance of their employees and the general public, a survey has found. The survey revealed that 94 per cent of the companies also monitored employees' phone conversations, electronic mail and Internet usage although the focus appeared to be mostly on volume and frequency rather than content. For example, 16 per cent monitored phone usage while the conversations themselves were only monitored by 2 per cent. Similarly, email usage was monitored by 13 per cent while 6 per cent of the companies were combing through the actual messages. Scrutiny of Internet usage would also reveal the web sites that employees had visited. The PricewaterhouseCoopers survey found that 65 per cent of companies regarded monitoring as a normal part of employment and 85 per had informed their employees that they were being watched. However, they were often not as forthcoming about seemingly minor details, like time and place. PricewaterhouseCoopers information and security partner Mr Stephen Woolley said there was a better than 50-50 chance that Australians would be filmed or recorded at some stage during the day. In the case of the general public, it would be without their consent. ``As is the practice of companies both here and overseas, this information will probably go on file for some years,'' Mr Woolley said. About half the companies said information gathered in Australia on customers, employees and the general public was sent overseas for international data bases. The study also revealed alarming gaps in the privacy guidelines of some companies. Only 35 per cent had formally documented privacy policies in place and 38 per cent said they did not undertake any monitoring to ensure compliance with in-house privacy guidelines. Eight out of 10 organisations did not require staff to undertake privacy training. The survey covered 65 of Australia's largest companies spanning across all major industries including utilities, telecommunications, natural resources, retail, credit, banking and finance, insurance and manufacturing. Based on their total turnover and size of assets, the companies that responded to the survey would represent more than half of corporate Australia. More than one in 10 companies did not inform staff that they could be monitored. Published by The Age Online Pty Ltd ACN 069 962 885 �1998 David Syme & Co Ltd ----------------------- NOTE: In accordance with Title 17 U.S.C. section 107, this material is distributed without profit or payment to those who have expressed a prior interest in receiving this information for non-profit research and educational purposes only. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml ----------------------- ********************************************** To subscribe or unsubscribe, email: majordomo at majordomo.pobox.com with the message: (un)subscribe ignition-point email at address ********************************************** www.telepath.com/believer ********************************************** From whgiii at invweb.net Fri Sep 11 01:19:29 1998 From: whgiii at invweb.net (William H. Geiger III) Date: Fri, 11 Sep 1998 16:19:29 +0800 Subject: Starr Report on Openpgp.net Message-ID: <199809112119.RAA19044@domains.invweb.net> -----BEGIN PGP SIGNED MESSAGE----- Hi, I have put a copy of the report on my website: http://www.openpgp.net/starr - -- - --------------------------------------------------------------- William H. Geiger III http://www.openpgp.net Geiger Consulting Cooking With Warp 4.0 Author of E-Secure - PGP Front End for MR/2 Ice PGP & MR/2 the only way for secure e-mail. OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html - --------------------------------------------------------------- Tag-O-Matic: See the Future; See OS/2. Be the Future; Run OS/2. -----BEGIN PGP SIGNATURE----- Version: 2.6.3a-sha1 Charset: cp850 Comment: Registered_User_E-Secure_v1.1b1_ES000000 iQCVAwUBNfmV5Y9Co1n+aLhhAQH96gP+MhFHy9ma8IaVbHDmrPDj6h7weTbOw/LU P0PFocm73GTkbXlRVZIEKSC2Jt2+TGtegMRwPtVuKTL6nONj5C/kn0tPFcfLW3rX lQ6cbbNJxwg0rdkAMIm424bdEI5TWdThBXalwY9cOlUeDpOtN3QUni4DetNCbDXd qqPFpVQNk5E= =DLNv -----END PGP SIGNATURE----- From jimg at mentat.com Fri Sep 11 01:27:30 1998 From: jimg at mentat.com (Jim Gillogly) Date: Fri, 11 Sep 1998 16:27:30 +0800 Subject: Clinton's fake apologies Message-ID: <199809112128.OAA14441@zendia.mentat.com> Yes, there's crypto content in this msg... a passing reference four paragraphs down. Somebody said: > The annoying thing about Clinton's recent behavior is that he never > comes right out and apologizes, but the press always says he does. Somebody goes on to do the whole Apology Watch number in detail. It doesn't matter. One commentator a few weeks ago had a good line for it: "All mea and no culpa." But so what? This whole apology watch is totally meaningless. We know he can perform sincere-looking speeches on demand, and that's largely why we elected him. If he gives another one and says this time that he's really sorry and he's guilty as hell, I couldn't be more impressed. Or less. What he says about it is irrelevant. This whole "sex scandal" thing is ludicrous also -- we knew he was a horn-dog when we elected him. Yes, my sexual morality is considerably higher than his, but so what? Sexual abstinence has never been a criterion for being President, and probably only one President in living memory have sex outside of wedlock... Peter Langston published a "Know your Presidents" column in the last few days, a quiz regarding which Presidents had done what to whom in the Oval Office. Regarding covering up the sex -- so what? When he said they weren't having sex back in February, she was denying it at the time, so it'd take a pretty sleazy character to say he was schtupping her and she was lying about it. The fact is that this sex between consenting adults thing is the best Starr could do with his Whitewater investigation after umpteen years and witnesses and millions of dollars, and I'm not impressed. I'm more impressed with the kind of allegations Softwar digs up -- sweetheart deals for some company to send encryption to China while sitting on the bulk of the domestic encryption industry, for example. If he's really done something that involves treason or high crimes and misdemeanors, let's hear about it and act on it. But airing soiled linen in public isn't germane. If they decide this is now a requirement for high office, I'd like to see all the Congresscritters who've had sex out of wedlock and concealed it take one step forward. Shall we make hypocrisy in high office impeachable also? Today Dave Farber noted that if the CDA were constitutional (which it isn't) Congress wouldn't have been allowed to drool over all these salacious bits on the public networks. Jim From mmotyka at lsil.com Fri Sep 11 03:32:39 1998 From: mmotyka at lsil.com (Michael Motyka) Date: Fri, 11 Sep 1998 18:32:39 +0800 Subject: Clinton's fake apologies In-Reply-To: <199809112128.OAA14441@zendia.mentat.com> Message-ID: <35F9B3BD.6DE6@lsil.com> Jim Gillogly wrote: > > The fact is that this sex between consenting adults thing is the best > Starr could do with his Whitewater investigation after umpteen years > and witnesses and millions of dollars, and I'm not impressed. I'm > more impressed with the kind of allegations Softwar digs up -- > sweetheart deals for some company to send encryption to China while > sitting on the bulk of the domestic encryption industry, for example. > If he's really done something that involves treason or high crimes and > misdemeanors, let's hear about it and act on it. But airing soiled > linen in public isn't germane. > It's worse than not impressive: it's PATHETIC. I thought we'd have 425 pages of real output relating to the last 6 years of "work" and 25 pages of Monica. I'd rather finance $600 toilet seats and $1200 gold-plated hammers with my tax money than Starr's brand of open political warfare. It's simple, partisan, Rottweiler politics. The kind of stuff that makes you leave your shoes outside the door when you get home at night. > If they decide this is now a requirement for high office, I'd like > to see all the Congresscritters who've had sex out of wedlock and > concealed it take one step forward. Shall we make hypocrisy in high > office impeachable also? > I'd say hypocrisy is more of a hangin' offense, like horse thievin' or cattle rustlin'. I seethe when I listen to an asshole like Arlin Spectre or Jerry Falwell spouting off about Clinton. I'm no great fan of Clinton's but the attackers in this particular shitstorm are lower than pond scum. I can't wait till they crawl back to the cesspool they came from. Mike From attila at hun.org Fri Sep 11 04:15:21 1998 From: attila at hun.org (attila) Date: Fri, 11 Sep 1998 19:15:21 +0800 Subject: Newspaper Ad Project In-Reply-To: <199808261817.NAA04960@einstein.ssz.com> Message-ID: I think you'll find that you can buy multicolumn display ads cheaper than classifieds --where you can also get multi-column. display ad is almost always cheaper for one shot; and, you have a choice of position --and therefore cost On Wed, 26 Aug 1998, Jim Choate wrote: >Hi, > >I was wondering if we might go ahead and set a date for publishing across >the country the 3-line Perl RSA. I would like to suggest something like >Halloween, at least a month a way. > >The cpunks here in Austin believe we can handle Austin, Houston, Dallas, Ft. >Worth, San Antonio, and El Paso. > >One issue is that the columns in the paper are pretty limited, so it won't >be 3 lines in reality. Anybody know the standard paper column width? Who >wants to reformat the Perl? > From mix at anon.lcs.mit.edu Fri Sep 11 06:58:29 1998 From: mix at anon.lcs.mit.edu (lcs Mixmaster Remailer) Date: Fri, 11 Sep 1998 21:58:29 +0800 Subject: CDA? What CDA? Message-ID: <19980912030005.7730.qmail@nym.alias.net> CNN. Pathfinder. Everybody and his dog with a website. The White House. Posting "indecent material" on the web. I mean, I'm impressed. (A bit more seriously though: could this fact possibly help - in the future - if the US gvt was again seeking to "curb indecency onm the Net"?) From Raymond at fbn.bc.ca Fri Sep 11 07:02:49 1998 From: Raymond at fbn.bc.ca (Raymond D. Mereniuk) Date: Fri, 11 Sep 1998 22:02:49 +0800 Subject: Clinton's fake apologies In-Reply-To: <35F9B3BD.6DE6@lsil.com> Message-ID: <199809120319.UAA20709@leroy.fbn.bc.ca> Michael Motyka > It's worse than not impressive: it's PATHETIC. I thought we'd have 425 > pages of real output relating to the last 6 years of "work" and 25 pages > of Monica. I'd rather finance $600 toilet seats and $1200 gold-plated > hammers with my tax money than Starr's brand of open political warfare. > It's simple, partisan, Rottweiler politics. The kind of stuff that makes > you leave your shoes outside the door when you get home at night. >From what I have read of Ken Starr's report Washington insider's all knew of Clinton's relationship with "That Woman". Now if Law Enforcement (LA) knows Clinton has skeletons in his closet they can go to him and tell him he must support lets just say a total ban on strong encryption. Clinton is inbetween a rock and a hard place, he must go along with proposals from LA, whether he supports the proposals in principle or not. We have seen some of Clinton's dirty laundry in a segment of his life that his attorney wife was not able to advise him. Now do you think Clinton's general standard of morality was any different in his life before this scandal in areas where his attorney wife was able to pull the strings? I personally doubt it. I see the whole OIC crusade against Clinton as an attempt to bring honesty to government. Ken Starr is just playing the game by the rules set out be the Clintons. If the game looks too rough who do you blame? Virtually Raymond D. Mereniuk Raymond at fbn.bc.ca From whgiii at invweb.net Fri Sep 11 07:31:09 1998 From: whgiii at invweb.net (William H. Geiger III) Date: Fri, 11 Sep 1998 22:31:09 +0800 Subject: CDA? What CDA? In-Reply-To: <19980912030005.7730.qmail@nym.alias.net> Message-ID: <199809120332.XAA24689@domains.invweb.net> -----BEGIN PGP SIGNED MESSAGE----- In <19980912030005.7730.qmail at nym.alias.net>, on 09/12/98 at 03:00 AM, lcs Mixmaster Remailer said: >CNN. Pathfinder. Everybody and his dog with a website. The White House. >Posting "indecent material" on the web. >I mean, I'm impressed. >(A bit more seriously though: could this fact possibly help - in the >future - if the US gvt was again seeking to "curb indecency onm the >Net"?) It sure will be a nice thing to throw in thier face next time they bring CDA up. :) - -- - --------------------------------------------------------------- William H. Geiger III http://www.openpgp.net Geiger Consulting Cooking With Warp 4.0 Author of E-Secure - PGP Front End for MR/2 Ice PGP & MR/2 the only way for secure e-mail. OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html - --------------------------------------------------------------- Tag-O-Matic: Windows? WINDOWS?!? Hahahahahehehehehohohoho... -----BEGIN PGP SIGNATURE----- Version: 2.6.3a-sha1 Charset: cp850 Comment: Registered_User_E-Secure_v1.1b1_ES000000 iQCVAwUBNfntKY9Co1n+aLhhAQEdigQAoPF5AAB7oT0kvxxql0db2odiLihizWRY YtVbL8jn5vRDTcj80epu5/6hwJkA95RWNo3yIOCFFvkdzPlsmFeYRaMFvKYdPSwH G+a0/xPjAOhA/NiSAATXR9rEr+eotIWsInN55m0G5b8LCBXNIWxP1W2+P/+4gWcF 3hL3Nb595RM= =bzN7 -----END PGP SIGNATURE----- From mgering at ecosystems.net Fri Sep 11 08:43:31 1998 From: mgering at ecosystems.net (Matthew James Gering) Date: Fri, 11 Sep 1998 23:43:31 +0800 Subject: Starr report and CDA Message-ID: <33CCFE438B9DD01192E800A024C84A19284651@mossbay.chaffeyhomes.com> The US government violates their own CDA by posting this graphically detailed report to the Internet. Am I the only one that doesn't find that ironic. Well it's good ammo (perhaps) for the next time the CDA comes up. Matt > > http://www.cnn.com/starr.report/ From bill.stewart at pobox.com Fri Sep 11 08:53:23 1998 From: bill.stewart at pobox.com (Bill Stewart) Date: Fri, 11 Sep 1998 23:53:23 +0800 Subject: oil, greens, recycling, and poly-ticks. In-Reply-To: <35F7F329.E4836699@brainlink.com> Message-ID: <3.0.5.32.19980911143828.00899c80@idiom.com> Some whining Yankee wrote: >>What pisses me off is that in NYC the gas prices are ridiculous high... >>$1.35/Gal is the regular gas, drive just a few miles over a tunnel or bridge >>to n NJ, it's $1.00 or $.99 depending on which pump you hit... go a bit >south, >>say VA, and in some areas it drops as low as $0.87 a gallon! Over in Europe, prices are mostly about $1 -- per liter. Back here in California, prices have been varying a lot, and are generally higher in areas with lots of people, lots of money, or lots of restrictions on gas stations. Here in San Francisco, it's about $1.30, and down in Silicon Valley it's mostly about $1.20, with some cheaper stations and some more expensive. We have different gas - for environmental reasons, they add chemicals designed to pollute water and irritate people's lungs (while reducing smog a bit.) Those New Jersey prices, while lower than New York, are still articifially high, since they're "full-service". The People's Republic of New Jersey *knows* that regular untrained citizens can't be trusted to pump their own gasoline reliably - otherwise you'd be having frequent explosions at gasoline stations like you do in the rest of the country. Any time the legislature begins to suggest legalizing self-service gas, small gas station owners pretending to be little old ladies write to all the newspapers protesting that they'd have to pay a lot more money to have gas pumped for them and how dare these politicians be so mean to YOUR grandmothers, and the threat disappears again for a few years. Thanks! Bill Bill Stewart, bill.stewart at pobox.com PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639 From bill.stewart at pobox.com Fri Sep 11 08:53:55 1998 From: bill.stewart at pobox.com (Bill Stewart) Date: Fri, 11 Sep 1998 23:53:55 +0800 Subject: Webs of Trust, Conspiracies, and Six Degrees of Cypherpunks In-Reply-To: <199809091200.IAA18283@www.video-collage.com> Message-ID: <3.0.5.32.19980911192912.00959c50@idiom.com> At 12:47 AM 9/11/98 -0700, Vladimir Z. Nuri wrote: >wow, a new site called sixdegrees.com, in which everyone >registers and reveals who their friends are. the privacy >implications are really incredible. yet supposedly >close to 1 million people joined, with 900,000 of them >connected!! We've got a somewhat related Cypherpunks problem, which is PGP key signatures. The traditional software likes chains of less than 4 deep, yet the last time I checked the key servers, there were chains as deep as 12-14, and most people seemed to be at least 6 signatures away from Phil Zimmermann or Derek Atkins, who were the centers of the list at the time. (On the other hand, I suppose a lot of signatures between Joe Cypherpunk, Ivan Cypherpunk, T0T0M0nger, etc. could improve the averages :-) The PGP Web of Trust key management tools have the difficulty that they don't make it easy to decide which signatures on your key to export when giving someone a key to sign or distributing a key to a key server. You can manage this somewhat by creating different name/key pairs for different uses, with your Phil Zimmermann, Respected Entrepreneur key signed by venture capitalists and your Phil Zimmermann, Anti-Nuclear Activist signed by your fellow activists, and trying to make sure that people who attend meetings at the bank building where you have your office digitally sign in with their Respectable Software Developer or Free Speech Activist personnas, and not with their Buddhist Temple Assault Rifle Shooting Club personnas that seem to overlap with the Respected Entrepreneur web.... I'm not sure how solvable a problem this is - there are some parts that are easier to solve, like - storing secret keyrings entirely in encrypted form This could be done using a disk encryptor instead, or could be done using an additional passphrase to unlock the keyring before determining whether the specific key you want it on it; both are annoying. The threat is the attack currently being used against T0T0, whose secret keyring had a key for a personna that signed a supposedly incriminating message. In his case, it was probably just ranting or humor, but there are some PGP users who really _are_ trying to overthrow their governments. and friendlier GUI tools (e.g. the current PGPkeys lets you add and delete signatures from a key in the keyring, but doesn't let you decide which ones to export except by deleting them (or by exporting to a separate keyring and using the GUI on that keyring, which is awkward.) Thanks! Bill Bill Stewart, bill.stewart at pobox.com PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639 From stuffed at stuffed.net Sat Sep 12 01:22:06 1998 From: stuffed at stuffed.net (STUFFED NEWS DAILY) Date: Sat, 12 Sep 1998 01:22:06 -0700 (PDT) Subject: ----> http://stuffed.net/98/9/12/ <---- Message-ID: <19980912071001.29383.qmail@eureka.abc-web.com> Welcome to today's issue of Stuffed. To read it you should click on the URL above. If it is not made clickable by your email program you will need to use your mouse to highlight the URL, copy it and then paste it into your browser (then press Return). This email is never sent unsolicited. Stuffed is the supplement for the Eureka newsletter you subscribed to. Full instructions on unsubscribing are in every issue of Eureka! ----> http://stuffed.net/98/9/12/ <---- From export-control at qualcomm.com Fri Sep 11 10:30:22 1998 From: export-control at qualcomm.com (Eudora Export Control Team) Date: Sat, 12 Sep 1998 01:30:22 +0800 Subject: Access to Eudora Export Controlled Archives Message-ID: <199809120616.XAA11486@ithilien.eudora.com> You may access the Eudora/PGP archives at the following address. Your username and password are given below. Username: guest51285 Password: 4ChmcTZH ABOUT YOUR PASSWORD Most browsers allow you to paste passwords into the authentication box. If you have a problem with a username and password that we supplied, please try copying the password from this message, reload the PGP download area page in your browser and paste the password into the password field of the authentication dialog box that pops up in front of the page. Additionally, these passwords expire. If you are denied access to the PGP download area at a later date, please get a new password. Be sure to keep this username and password to yourself. If someone you know wants access to the archives, please send them to Thanks for your support! The Eudora Export Control Team From denverl at public.szonline.net Sat Sep 12 05:13:26 1998 From: denverl at public.szonline.net (Denver Liu) Date: Sat, 12 Sep 1998 05:13:26 -0700 (PDT) Subject: unsubscribe Message-ID: <199809121213.UAA10491@public.szonline.net> unsubscribe From frissell at panix.com Fri Sep 11 16:19:43 1998 From: frissell at panix.com (Duncan Frissell) Date: Sat, 12 Sep 1998 07:19:43 +0800 Subject: oil, greens, recycling, and poly-ticks. In-Reply-To: <3.0.6.32.19980910205225.0096d7d0@alaska.net> Message-ID: <199809121221.IAA15102@mail1.panix.com> At 02:38 PM 9/11/98 -0700, Bill Stewart wrote: >Those New Jersey prices, while lower than New York, are still >articifially high, since they're "full-service". The People's >Republic of New Jersey *knows* that regular untrained citizens >can't be trusted to pump their own gasoline reliably - >otherwise you'd be having frequent explosions at gasoline >stations like you do in the rest of the country. No. The legislature knows that the citizens of the Garden State are otherwise unemployable so they have established a protected job category of gas jockey to keep them off the streets. DCF From frissell at panix.com Fri Sep 11 16:35:48 1998 From: frissell at panix.com (Duncan Frissell) Date: Sat, 12 Sep 1998 07:35:48 +0800 Subject: Clinton's fake apologies In-Reply-To: <199809112128.OAA14441@zendia.mentat.com> Message-ID: <199809121230.IAA15602@mail1.panix.com> At 04:35 PM 9/11/98 -0700, Michael Motyka wrote: >It's worse than not impressive: it's PATHETIC. I thought we'd have 425 >pages of real output relating to the last 6 years of "work" and 25 pages >of Monica. I'd rather finance $600 toilet seats and $1200 gold-plated >hammers with my tax money than Starr's brand of open political warfare. >It's simple, partisan, Rottweiler politics. The kind of stuff that makes >you leave your shoes outside the door when you get home at night. Save that the impeachment of a president is not the main job of the OIC. He is supposed to 1) Investigate, 2) Indict, and 3) Report to the AG and the 3-judge panel that appointed him. If he stumbles across evidence of impeachable offenses he can send a report to the House but that is a SIDE job. Starr took 8 months to go from zero to "evidence of impeachable offenses" in Fornigate. The rest of the investigation continues. He has 5 different areas of responsibility. He submitted Monica to the House because he had rock solid proof that Clinton is a lying sack of shit and a multiple felon. Something we knew years ago but couldn't prove. With KKKlinton, you don't shoot unless you have an elephant gun. DCF From ulf at fitug.de Fri Sep 11 16:48:06 1998 From: ulf at fitug.de (Ulf =?ISO-8859-1?Q?M=F6ller?=) Date: Sat, 12 Sep 1998 07:48:06 +0800 Subject: A Cypherpunk Trial, Yes In-Reply-To: Message-ID: > in all kinds of nefarious activities. The same > post also names Tim May, Adam Back, Declan > McCullagh, Ulf Moller, Kent Crispen, and Blanc > Weber. I'm let off easy, being characterized > as only a 'terroist [sic] InterNet forger'. > I think that this is because I once complained > when someone (possibly Toto) forged a message > in my name. Hm. I hadn't seen that before. I didn't forge any messages or complain about forgeries, and I haven't claimed to have been working on proving the validity of the need for legislation declaring the value of Pi to be 3.0, either. If there is any truth in the Nutly News, it must be something else. :) From ravage at EINSTEIN.ssz.com Fri Sep 11 17:50:00 1998 From: ravage at EINSTEIN.ssz.com (Jim Choate) Date: Sat, 12 Sep 1998 08:50:00 +0800 Subject: Governemnts should give up regulating Internet [CNN] (fwd) Message-ID: <199809121414.JAA15432@einstein.ssz.com> Forwarded message: >From ravage at ssz.com Sat Sep 12 09:13:45 1998 From: Jim Choate Message-Id: <199809121413.JAA15418 at einstein.ssz.com> Subject: Governemnts should give up regulating Internet [CNN] To: users at ssz.com (SSZ User Mail List) Date: Sat, 12 Sep 1998 09:13:39 -0500 (CDT) Cc: friends at ssz.com (Ravage's Friends) X-Mailer: ELM [version 2.4 PL23] Content-Type: text Content-Length: 2001 Forwarded message: > X-within-URL: http://www.cnn.com/TECH/computing/9809/11/govnet.idg/ > GOVERNMENTS CAN'T HANDLE INTERNET, SAYS MAGAZINER > September 11, 1998 > Web posted at 1:20 PM EDT > > by Jana Sanchez-Klein > > LONDON (IDG) -- European countries should cooperate with the U.S. to > create an Internet that is regulated by the industry rather than by > governments, said Ira Magaziner, senior adviser to U.S. President Bill > Clinton for Internet policy development, at The Wall Street Journal > Europe's Fifth Annual CEO Summit on Converging Technologies. > > "We are trying to come to an agreement with the European Union where > they recognize our approach," said Magaziner, a speaker at the > conference here today. > > He outlined the importance of the Internet to the U.S. and world > economies and said that it was not up to governments to attempt to > control Internet use and commerce. Magaziner attributed one-third of > all economic growth in the U.S. to the building of the Internet. But, > he warned, "if goods are overtaxed or overregulated, it's hard to do > business. The private sector should lead." > > Governments are ill-equipped to handle the Internet, because it > changes too rapidly, it's too decentralized and too international, > suggested Magaziner. > > "The digital age moves too quickly for government action," he said. [text deleted] ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From declan at well.com Fri Sep 11 19:03:59 1998 From: declan at well.com (Declan McCullagh) Date: Sat, 12 Sep 1998 10:03:59 +0800 Subject: Clinton's fake apologies In-Reply-To: <199809112128.OAA14441@zendia.mentat.com> Message-ID: On Fri, 11 Sep 1998, Jim Gillogly wrote: > > If they decide this is now a requirement for high office, I'd like > to see all the Congresscritters who've had sex out of wedlock and > concealed it take one step forward. Shall we make hypocrisy in high > office impeachable also? A better question is: If Clinton is guilty of perjury and other felonies, should he be impeached? If you don't think about lying about sex and related issues under oath should be a crime, well, then change the law. But right now any form of lying under oath is perjury, whether you like it or not. -Declan From ravage at EINSTEIN.ssz.com Fri Sep 11 19:12:31 1998 From: ravage at EINSTEIN.ssz.com (Jim Choate) Date: Sat, 12 Sep 1998 10:12:31 +0800 Subject: Clinton's fake apologies (fwd) Message-ID: <199809121536.KAA15651@einstein.ssz.com> Forwarded message: > Date: Sat, 12 Sep 1998 08:05:07 -0700 (PDT) > From: Declan McCullagh > Subject: Re: Clinton's fake apologies > On Fri, 11 Sep 1998, Jim Gillogly wrote: > > > > If they decide this is now a requirement for high office, I'd like > > to see all the Congresscritters who've had sex out of wedlock and > > concealed it take one step forward. Shall we make hypocrisy in high > > office impeachable also? > > A better question is: If Clinton is guilty of perjury and other felonies, > should he be impeached? > > If you don't think about lying about sex and related issues under oath > should be a crime, well, then change the law. But right now any form of > lying under oath is perjury, whether you like it or not. As rare as it is, I agree with Declan here. If Clinton would lie under oath about a non-crime (ie sex between consenting adults) what would he do if faced with a real issue? He should have said "Yeah, I had sex with her. What business is it of yours?". ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From rah at shipwright.com Fri Sep 11 19:44:16 1998 From: rah at shipwright.com (Robert Hettinga) Date: Sat, 12 Sep 1998 10:44:16 +0800 Subject: IP: [Fwd: new threat to privacy] Message-ID: --- begin forwarded text Delivered-To: ignition-point at majordomo.pobox.com X-ROUTED: Sat, 12 Sep 1998 10:35:58 -0500 X-TCP-IDENTITY: Bucsplace Date: Sat, 12 Sep 1998 10:30:29 -0400 From: oldbat MIME-Version: 1.0 To: IP Subject: IP: [Fwd: new threat to privacy] Sender: owner-ignition-point at majordomo.pobox.com Precedence: list Reply-To: oldbat From: "Bill Prince" Newsgroups: misc.survivalism Subject: new threat to privacy Date: Thu, 10 Sep 1998 16:14:54 -0400 Organization: MindSpring Enterprises Message-ID: <6t9bu9$spm$1 at camel15.mindspring.com> NNTP-Posting-Host: user-37kbbqr.dialup.mindspring.com X-Server-Date: 10 Sep 1998 20:14:01 GMT X-Newsreader: Microsoft Outlook Express 5.00.0518.4 X-MimeOLE: Produced By Microsoft MimeOLE V5.00.0518.4 Path: news.dx.net!news.accessus.net!news2.rdr.net!news-out.internetmci.com!news.intern etMCI.com!newsfeed.internetmci.com!4.1.16.34!cpk-news-hub1.bbnplanet.com!news.bb nplanet.com!firehose.mindspring.com!not-for-mail There is another powerful tool for surreptitiously intercepting data, but it is only available to law enforcement and the military. Called DIRT (Data Interception and Remote Transmission), it was released in June by Codex Data Systems. http://www.thecodex.com/dirt.html Investigators need only know your e-mail address to secretly install the program. Once they do, investigators can read your documents, view your images, download your files and intercept your encryption keys. DIRT was developed to assist law enforcement in pedophilia investigations, but future uses could include drug investigations, money laundering cases and information warfare. - - Bill Prince | Orlando, Florida | Linuxori te salutamus! Take out the SPAM to email me! - - --- end forwarded text ----------------- Robert A. Hettinga Philodox Financial Technology Evangelism 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From jya at pipeline.com Fri Sep 11 19:46:58 1998 From: jya at pipeline.com (John Young) Date: Sat, 12 Sep 1998 10:46:58 +0800 Subject: Clinton's fake apologies In-Reply-To: <199809112128.OAA14441@zendia.mentat.com> Message-ID: <199809121548.LAA14443@camel14.mindspring.com> Declan, a few questions on the CDs of the Starr report: 1. Did the press get the CDs, say, embargoed, before the House authorized release? 2. Who handled the CD distribution, the House or Starr or 3rd party? 3. Do you know anything about how the CDs were made, by Starr's op or some other party, and when made? 4. Will there be pre-releases of press-only CDs of the remaining material, that is, is there a boxed-series prepared of the whole wad for lobbing week by weekly? This is a query about fake news, lying, perjuring, you know, to the American People, whatever that junk-populace is cooked up to be. From jimg at mentat.com Fri Sep 11 19:49:06 1998 From: jimg at mentat.com (Jim Gillogly) Date: Sat, 12 Sep 1998 10:49:06 +0800 Subject: Clinton's fake apologies Message-ID: <199809121549.IAA28683@zendia.mentat.com> Declan wrote: > On Fri, 11 Sep 1998, Jim Gillogly wrote: > > > > If they decide this is now a requirement for high office, I'd like > > to see all the Congresscritters who've had sex out of wedlock and > > concealed it take one step forward. Shall we make hypocrisy in high > > office impeachable also? > > A better question is: If Clinton is guilty of perjury and other felonies, > should he be impeached? IANAL (feel free to weigh in here, Unicorn), but I heard on one show or another that lying under oath is perjury only if it's material to the suit. Since the Jones case was dismissed, it was argued that even if he lied then, it wasn't material and thus wasn't perjury -- they claimed that nobody had every been convicted of perjury for lying in a case that was dismissed. Of course he's saying he didn't even lie: like Kinky Friedman and the Texas Jewboys, as espoused in their legal treatise "Waitret, please waitret, come sit on my face", he believes that "Eatin' ain't cheatin'." YMMV. In any case, despite these legalisms, I'm not convinced that perjury in any case should be considered treason or high crimes and misdemeanors. The Founding Fathers could have been more specific about what was impeachable, and they chose not to be, leaving it intentionally ambiguous. Despite those arguments, this stuff really isn't about perjury: it's about the Republicans' case of nixon envy... Clinton's peccadillos are a far cry from Watergate (or Teapot Dome or Iran-Contra), but it's the best chance they've had since the Crook was dumped. > If you don't think about lying about sex and related issues under oath > should be a crime, well, then change the law. But right now any form of > lying under oath is perjury, whether you like it or not. If he did commit perjury, would that be an impeachable offense? I claim it's up to the House to interpret just what constitutes high crimes and misdemeanors, since it isn't spelled out in the Constitution. Disclaimer -- I'm not a Democrat, and I'm annoyed with Clinton's behavior on crypto issues. If I appear to be defending him, it's inadvertant -- I just feel he should be attacked on material points rather than whatever sleazy stuff Starr has found under his rocks. Jim From ravage at einstein.ssz.com Fri Sep 11 20:02:29 1998 From: ravage at einstein.ssz.com (Jim Choate) Date: Sat, 12 Sep 1998 11:02:29 +0800 Subject: Clinton's fake apologies (fwd) Message-ID: <199809121625.LAA15937@einstein.ssz.com> Forwarded message: > Date: Sat, 12 Sep 1998 08:49:56 -0700 > From: jimg at mentat.com (Jim Gillogly) > Subject: Re: Clinton's fake apologies > In any case, despite these legalisms, I'm not convinced that perjury in > any case should be considered treason or high crimes and misdemeanors. > The Founding Fathers could have been more specific about what was > impeachable, and they chose not to be, leaving it intentionally ambiguous. What part of: High crimes and misdemeanors don't you understand? Oh, and it isn't 'high misdemeanors'... I figure it's the fact that 'principles' are involved that is confusing everybody, no room to move like there is with relativism. Bottem line, he held a public office, while in that office he should commit *NO* crime or else he should loose that office. There was no abmiguity there in the minds of the founding fathers and there shouldn't be in yours either. If this confuses you then take it as an indication that you have a axiomatic contradiction in your world view and need to rethink things in a serious way. As Jefferson said, if you hold a public office your public property. Nail the son of a bitch to the wall, he did the crime let him do the time. It's a pitty he doesn't have this sort of empathy for all those people he's put in jail for consensual crimes during his tenure. The man has a base double standard, let him pay for it. ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From honig at sprynet.com Fri Sep 11 20:18:21 1998 From: honig at sprynet.com (David Honig) Date: Sat, 12 Sep 1998 11:18:21 +0800 Subject: U.S. House only has a T-1 In-Reply-To: Message-ID: <3.0.5.32.19980912091319.007cca60@m7.sprynet.com> :: Anon-To: Tim May , Jim Burnes , Declan McCullagh At 12:12 PM 9/11/98 -0700, Tim May wrote: >details about Clinton's cigar being inserted into Monica's vagina, about >how Clinton talked with Congressional leaders while Monica was giving him a >blowjob, and how Clinton suborned perjury and tampered with evidence.... There's a footnote that mentions oral-anal sex. Perhaps in DC this is a crime? From honig at sprynet.com Fri Sep 11 20:18:35 1998 From: honig at sprynet.com (David Honig) Date: Sat, 12 Sep 1998 11:18:35 +0800 Subject: CDA? What CDA? In-Reply-To: <19980912030005.7730.qmail@nym.alias.net> Message-ID: <3.0.5.32.19980912091811.007c2750@m7.sprynet.com> At 03:00 AM 9/12/98 -0000, lcs Mixmaster Remailer wrote: >CNN. Pathfinder. Everybody and his dog with a website. The White >House. Posting "indecent material" on the web. > >I mean, I'm impressed. > Given the number of times that cigars are mentioned, its a regular advertisement. And I thought the gov't was fighting tobacco, not finding novel uses for it. From nobody at anon.olymp.org Fri Sep 11 20:23:04 1998 From: nobody at anon.olymp.org (Anonymous) Date: Sat, 12 Sep 1998 11:23:04 +0800 Subject: If there's a trial will some of us be witnesses? Message-ID: <2e7c5862e97aaec19ba22db438e362d3@anonymous> Vladimir Z. Nuri wrote: > at one time, kevin mitnick was on this list, rumor has > it. probably many of the world's premiere hackers have been at one time or > another. L. Detweiler and Phiber Optik were concurrently subscribed in early '93. But you know that, don't you? From honig at sprynet.com Fri Sep 11 20:37:43 1998 From: honig at sprynet.com (David Honig) Date: Sat, 12 Sep 1998 11:37:43 +0800 Subject: CDA? What CDA? In-Reply-To: <19980912030005.7730.qmail@nym.alias.net> Message-ID: <3.0.5.32.19980912092058.007c4ae0@m7.sprynet.com> At 10:39 PM 9/11/98 -0500, William H. Geiger III wrote: >It sure will be a nice thing to throw in thier face next time they bring >CDA up. :) > It'll help remind those youngsters who never experienced Nixon how much you can trust people in power... at least for the next few days, until their memories fade again... From honig at sprynet.com Fri Sep 11 20:49:56 1998 From: honig at sprynet.com (David Honig) Date: Sat, 12 Sep 1998 11:49:56 +0800 Subject: Altoids & email Message-ID: <3.0.5.32.19980912094145.007c4ae0@m7.sprynet.com> "o.(708) Ms. Lewinsky gave him an antique paperweight in the shape of the White House.(709) She also showed him an email describing the effect of chewing Altoid mints before performing oral sex. Ms. Lewinsky was chewing Altoids at the time, but the President replied that he did not have enough time for oral sex.(710) " So she followed the circulating email neterotica.. too bad she didn't know about infosec... "Some of Ms. Lewinsky's statements about the relationship were contemporaneously memorialized. These include deleted email recovered from her home computer and her Pentagon computer, email messages retained by two of the recipients," From geeman at best.com Fri Sep 11 21:08:13 1998 From: geeman at best.com (geeman at best.com) Date: Sat, 12 Sep 1998 12:08:13 +0800 Subject: IP: [Fwd: new threat to privacy] Message-ID: <3.0.32.19980912094344.006ba0ec@shell15.ba.best.com> ummm ... not to sound skeptical, but were did -this- thing come from? looks like a crock to me. here, guys: have at it, here's my email address. ps: can you spell "agent provocateur" ---- (I'm not sure *I* can...) At 11:43 AM 9/12/98 -0400, Robert Hettinga wrote: > > >--- begin forwarded text > > >Delivered-To: ignition-point at majordomo.pobox.com >X-ROUTED: Sat, 12 Sep 1998 10:35:58 -0500 >X-TCP-IDENTITY: Bucsplace >Date: Sat, 12 Sep 1998 10:30:29 -0400 >From: oldbat >MIME-Version: 1.0 >To: IP >Subject: IP: [Fwd: new threat to privacy] >Sender: owner-ignition-point at majordomo.pobox.com >Precedence: list >Reply-To: oldbat > > > >From: "Bill Prince" >Newsgroups: misc.survivalism >Subject: new threat to privacy >Date: Thu, 10 Sep 1998 16:14:54 -0400 >Organization: MindSpring Enterprises >Message-ID: <6t9bu9$spm$1 at camel15.mindspring.com> >NNTP-Posting-Host: user-37kbbqr.dialup.mindspring.com >X-Server-Date: 10 Sep 1998 20:14:01 GMT >X-Newsreader: Microsoft Outlook Express 5.00.0518.4 >X-MimeOLE: Produced By Microsoft MimeOLE V5.00.0518.4 >Path: >news.dx.net!news.accessus.net!news2.rdr.net!news-out.internetmci.com!news.i ntern >etMCI.com!newsfeed.internetmci.com!4.1.16.34!cpk-news-hub1.bbnplanet.com!ne ws.bb >nplanet.com!firehose.mindspring.com!not-for-mail > >There is another powerful tool for surreptitiously intercepting >data, but it is only available to law enforcement and the >military. Called DIRT (Data Interception and Remote >Transmission), it was released in June by Codex Data Systems. >http://www.thecodex.com/dirt.html > >Investigators need only know your e-mail address to secretly >install the program. Once they do, investigators can read your >documents, view your images, download your files and intercept >your encryption keys. DIRT was developed to assist law >enforcement in pedophilia investigations, but future uses could >include drug investigations, money laundering cases and >information warfare. > >- - >Bill Prince | Orlando, Florida | >Linuxori te salutamus! >Take out the SPAM to email me! >- - > >--- end forwarded text > > >----------------- >Robert A. Hettinga >Philodox Financial Technology Evangelism >44 Farquhar Street, Boston, MA 02131 USA >"... however it may deserve respect for its usefulness and antiquity, >[predicting the end of the world] has not been found agreeable to >experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' > > > From ravage at EINSTEIN.ssz.com Fri Sep 11 21:34:35 1998 From: ravage at EINSTEIN.ssz.com (Jim Choate) Date: Sat, 12 Sep 1998 12:34:35 +0800 Subject: Is cypherpunks-unedited@toad.com broken?... Message-ID: <199809121757.MAA16968@einstein.ssz.com> Forwarded message: > From MAILER-DAEMON at telekom.de Sat Sep 12 12:50:46 1998 > Date: Fri, 11 Sep 1998 18:53:07 +0200 > From: Mail Delivery Subsystem > Subject: Returned mail: Unable to deliver mail > Message-Id: <9809111653.AB07969 at fw9.telekom.de> > To: owner-cypherpunks at einstein.ssz.com > > ----- Transcript of session follows ----- > 554 sendall: too many hops 19 (17 max): from , to owner-cypherpunks at ssz.com > > ----- Unsent message follows ----- > Received: by fw9.telekom.de; (5.65v3.2/1.3/10May95) id AA07969; Fri, 11 Sep 1998 18:53:07 +0200 > Received: from einstein.ssz.com by fw9.telekom.de (smtpxd); id XA05182 > Received: (from bin at localhost) by einstein.ssz.com (8.6.12/8.6.9) id LAA00752 for cypherpunks-outgoing; Thu, 10 Sep 1998 11:16:26 -0500 > Received: from somewhere by smtpxd > Received: from somewhere by smtpxd > Received: from somewhere by smtpxd > Received: from somewhere by smtpxd > Received: from somewhere by smtpxd > Received: from somewhere by smtpxd > Received: from somewhere by smtpxd > Received: from somewhere by smtpxd > Received: from somewhere by smtpxd > Received: from somewhere by smtpxd > Received: from somewhere by smtpxd > From: myemail at any.where.com > Received: from somewhere by smtpxd > Received: from somewhere by smtpxd > Received: from somewhere by smtpxd > Received: from somewhere by smtpxd > Received: from somewhere by smtpxd > Message-Id: <199809101721.DEK5253 at myserver.com> > Date: ��, 10 ��� 1998 17:21:34 > Subject: Exhibitions in Russia > X-Uidl: 870483789,239 > To: cypherpunks-unedited at toad.com > X-Mailing-List: cypherpunks at algebra.com > X-List-Admin: ichudov at algebra.com > X-Loop: cypherpunks at algebra.com > Sender: owner-cypherpunks at ssz.com > Precedence: bulk > X-Mailing-List: cypherpunks at ssz.com > X-List-Admin: list at ssz.com > X-Loop: ssz.com > X-Language: English, Russian, German > > Dear cypherpunks-unedited at toad.com > > Me prepared pages they will be useful all > http://people.mosexpo.ru > Exhibitions in Russia > Food > http://www.mosexpo.ru/gurman > Telecom and Networks > http://www.mosexpo.ru/telecom > http://pc-expo.mosexpo.ru > http://unix-expo.mosexpo.ru > http://www.mosexpo.ru/svyaz98 > Flowers and Seed > http://www.mosexpo.ru/flowers > Fishing > http://www.mosexpo.ru/fishing > and more in http://www.mosexpo.ru > > To delete itself from list enter come in on server http://www.mosexpo.ru/rus > there Remove mailing list > info at mosexpo.ru > 7-095-974-7568 > > > > > This is a demo version of Dynamic Mail Server - > the leading Internet marketing promotion tool - > More details at: http://www.dynamicmail.com/ > ----------------------------------------------------- > From wombat at mcfeely.bsfs.org Fri Sep 11 21:41:05 1998 From: wombat at mcfeely.bsfs.org (Rabid Wombat) Date: Sat, 12 Sep 1998 12:41:05 +0800 Subject: U.S. House only has a T-1 In-Reply-To: <3.0.5.32.19980912091319.007cca60@m7.sprynet.com> Message-ID: On Sat, 12 Sep 1998, David Honig wrote: > :: > Anon-To: Tim May , Jim Burnes , Declan > McCullagh > > At 12:12 PM 9/11/98 -0700, Tim May wrote: > >details about Clinton's cigar being inserted into Monica's vagina, about > >how Clinton talked with Congressional leaders while Monica was giving him a > >blowjob, and how Clinton suborned perjury and tampered with evidence.... > > There's a footnote that mentions oral-anal sex. Perhaps in DC this > is a crime? > > If kissing an asshole is a crime, they'd have to lock up the whole city. Besides, where else can you get caught on tape smoking crack with a hooker, and still get re-elected mayor? From declan at well.com Fri Sep 11 21:53:22 1998 From: declan at well.com (Declan McCullagh) Date: Sat, 12 Sep 1998 12:53:22 +0800 Subject: Clinton's fake apologies In-Reply-To: <199809121549.IAA28683@zendia.mentat.com> Message-ID: 1. it's tough to argue that clinton's apparent perjury in Jones was immaterial 2. i know of no law saying perjury only a crime if it's "material" 3. perjury is certainly one of the "great offenses" that common law says is impeachable. 4. besides, non-criminal activities can constitute impeachable offenses -- look at second and third articles of impeachment in Nixon's case -Declan On Sat, 12 Sep 1998, Jim Gillogly wrote: > Declan wrote: > > On Fri, 11 Sep 1998, Jim Gillogly wrote: > > > > > > If they decide this is now a requirement for high office, I'd like > > > to see all the Congresscritters who've had sex out of wedlock and > > > concealed it take one step forward. Shall we make hypocrisy in high > > > office impeachable also? > > > > A better question is: If Clinton is guilty of perjury and other felonies, > > should he be impeached? > > IANAL (feel free to weigh in here, Unicorn), but I heard on one show or > another that lying under oath is perjury only if it's material to the > suit. Since the Jones case was dismissed, it was argued that even if he > lied then, it wasn't material and thus wasn't perjury -- they claimed that > nobody had every been convicted of perjury for lying in a case that was > dismissed. Of course he's saying he didn't even lie: like Kinky Friedman > and the Texas Jewboys, as espoused in their legal treatise "Waitret, please > waitret, come sit on my face", he believes that "Eatin' ain't cheatin'." > YMMV. > > In any case, despite these legalisms, I'm not convinced that perjury in > any case should be considered treason or high crimes and misdemeanors. > The Founding Fathers could have been more specific about what was > impeachable, and they chose not to be, leaving it intentionally ambiguous. > > Despite those arguments, this stuff really isn't about perjury: it's about > the Republicans' case of nixon envy... Clinton's peccadillos are a far cry > from Watergate (or Teapot Dome or Iran-Contra), but it's the best chance > they've had since the Crook was dumped. > > > If you don't think about lying about sex and related issues under oath > > should be a crime, well, then change the law. But right now any form of > > lying under oath is perjury, whether you like it or not. > > If he did commit perjury, would that be an impeachable offense? I claim > it's up to the House to interpret just what constitutes high crimes and > misdemeanors, since it isn't spelled out in the Constitution. > > Disclaimer -- I'm not a Democrat, and I'm annoyed with Clinton's behavior > on crypto issues. If I appear to be defending him, it's inadvertant -- I > just feel he should be attacked on material points rather than whatever > sleazy stuff Starr has found under his rocks. > > Jim > > From declan at well.com Fri Sep 11 21:57:04 1998 From: declan at well.com (Declan McCullagh) Date: Sat, 12 Sep 1998 12:57:04 +0800 Subject: Clinton's fake apologies In-Reply-To: <199809121548.LAA14443@camel14.mindspring.com> Message-ID: John, some of the press were relying on House sources to get the material up as quickly as possible. Also AP provided it to its members on a password-protected web site. I was the first in Time's DC bureau to get the report; I'm not going to reveal my source save to say it wasn't Starr's office. -Declan On Sat, 12 Sep 1998, John Young wrote: > Declan, a few questions on the CDs of the Starr report: > > 1. Did the press get the CDs, say, embargoed, before the House > authorized release? > > 2. Who handled the CD distribution, the House or Starr or 3rd > party? > > 3. Do you know anything about how the CDs were made, by > Starr's op or some other party, and when made? > > 4. Will there be pre-releases of press-only CDs of the remaining > material, that is, is there a boxed-series prepared of the whole > wad for lobbing week by weekly? > > This is a query about fake news, lying, perjuring, you know, to > the American People, whatever that junk-populace is cooked > up to be. > > > > > From nobody at replay.com Fri Sep 11 22:24:17 1998 From: nobody at replay.com (Anonymous) Date: Sat, 12 Sep 1998 13:24:17 +0800 Subject: Access to Eudora Export Controlled Archives Message-ID: <199809121825.UAA20834@replay.com> On Fri, 11 Sep 1998, Eudora Export Control Team wrote: > Be sure to keep this username and password to yourself. If someone You know, this kind of crap never ceases to make me chuckle. Mail a list with thousands of people, which is archived all over the place, and add in "Be sure to keep this username and password to yourself." This is very effective export control. From ravage at einstein.ssz.com Fri Sep 11 22:37:46 1998 From: ravage at einstein.ssz.com (Jim Choate) Date: Sat, 12 Sep 1998 13:37:46 +0800 Subject: Deletion test Message-ID: <199809121851.NAA17371@einstein.ssz.com> Deletion test ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From jya at pipeline.com Fri Sep 11 23:10:00 1998 From: jya at pipeline.com (John Young) Date: Sat, 12 Sep 1998 14:10:00 +0800 Subject: Investigating the Suspect Computer Message-ID: <199809121910.PAA03207@camel14.mindspring.com> Is there a PKZip-encryption cracker online for the following program which claims to offer a link to a couple of dozen shareware password crackers of popular programs? The exe-file is easily downloaded. There's a copy for testing for privacy protection: http://jya.com/pci-pack.exe (20K) Investigating the Suspect Computer PC Data Recovery for the Criminal Investigator Law Enforcement Use Only http//www.forensicdynamics.com/pccrime.htm WHAT EXACTLY, DOES THE SOFTWARE DO ? The software is designed to almost completely automate the formidable task of extracting forensic data from today's modern personal computers with large or multiple hard drives. The program automatically examines startup files for "booby traps", and searches the entire machine for "bomb" programs which, if triggered, could destroy valuable evidence on the machine. PC-Investigator runs exclusively from diskette, at the DOS level, and does NOT perform any write operations to the hard drive. This insures that fragile data, or files that may be evidence which have been deleted, or are resident in "slack space", are not inadvertently overwritten. A unique feature of the software is the ability to construct custom-tailored reports. The catalog function extracts and organizes all the files on the hard drive, and sorts them into order by type, date and time, according to directory. During this process, all the readable (text) files are extracted into a separate list, and are organized by type in the report. Also available is an extracted report listing of graphic (picture) files, and files that are typically used on the Internet, along with an extracted list of word processor files, backup files, ASCII text, and files that are recovered by CHKDSK or SCANDISK, which are commonly overlooked as a source of forensic evidence. PC-Investigator has unique features that duplicate the manual functions normally performed during such forensic investigations. The most valuable feature is the ability to search all the files on the disk for the presence of up to 600 words or phrases called HotWords, that you supply in an editable file. This function is the equivalent of the manual process of "Find Files and Folders" / "Files Containing" under Windows 95 , which typically takes 30 seconds to 3 minutes to do manually for each word or phrase you are looking for. The function is performed using words and phrases from the HotWord list, hundreds of times per second. A typical 2 Gigabyte hard drive may contain over 500 readable text files. A manual search for the occurrence of a single word or phrase occurring in those files typically takes 90 seconds. If you had to search for those 200 words manually, the time required would be 5 hours at the keyboard. The HotWord search feature of PC- Investigator performs this function on a 486/50 machine in just under 45 minutes. If the number of files to be searched is substantially higher, such as on today's large hard drives (typically 2 to 4 Gigabytes, with 12 Gigabyte drives available on top-end systems) the time required to perform an exhaustive search would be proportionately higher (500 to 1,000 man-hours). PC-Investigator completely searches a 2 Gigabyte drive n a 486/120 machine in just under 24 hours. The faster the processor, and hard disk controller, the faster the program will run to completion. The best part is that each file containing any of the words or phrases in your list is cataloged in the report, along with the number of "hits" or HotWords found in the file. After the program is started, and the desired options are selected, the program will run un-attended, doing the work that would normally not be done in such cases because of the tremendous amount of time and effort involved. Of course, files which do not contain "clear text", or are DES or BLOWFISH / PGP encrypted will not be flagged by the program. However, we have software which addresses the problem of APPLICATION encryption - that is - files which are encrypted by the application which created them. For example, LOTUS 123, Quick Books, PFS Professional, and WordPerfect are among the few programs which offer in-application encryption of files. The program does NOT extract or examine the data from "slack space". However, running the program is easy, and can be done by almost anyone with a bit of computer skills. The software is designed as a preliminary investigative tool, to determine if a machine should be examined by a professional. If this program indicates a "HOT" machine, you can be certain that a more extensive investigation is warranted. ----- PCI-PACK.EXE Includes PC-Investigator software, manual and Investigating The Suspect Computer THIS PACKAGE IS DISTRIBUTED TO LAW ENFORCEMENT AND PRIVATE INVESTIGATORS ONLY!! THE ARCHIVE FILE IS [PKZip] ENCRYPTED, AND YOU WILL NEED A PASSWORD TO EXTRACT THE ARCHIVE. IF YOU ARE NOT WORKING IN LAW ENFORCEMENT, DON'T BOTHER TO DOWNLOAD THE FILE, WE WILL NOT DISTRIBUTE THE PASSWORD UNLESS WE CAN VERIFY YOUR CREDENTIALS. From atomic at odyssee.net Sat Sep 12 14:21:09 1998 From: atomic at odyssee.net (Louis Archambault) Date: Sat, 12 Sep 1998 14:21:09 -0700 (PDT) Subject: ANNOUNCE: Bay Area Cypherpunks, Sat. Sept. 12, 12-6, KPMG Mountain View In-Reply-To: <3.0.5.32.19980910170625.00cd8ec0@idiom.com> Message-ID: <3.0.3.32.19980912172144.02cf4948@10.0.0.1> unsubscribe From ravage at EINSTEIN.ssz.com Sat Sep 12 00:29:19 1998 From: ravage at EINSTEIN.ssz.com (Jim Choate) Date: Sat, 12 Sep 1998 15:29:19 +0800 Subject: 2A (fwd) Message-ID: <199809122052.PAA17723@einstein.ssz.com> Forwarded message: > Date: Fri, 11 Sep 1998 22:00:12 -0400 > From: David Miller > Subject: 2A > The thought I had (actually, it was explained to me), about the > BoR is that, you know that in contracts/law, if there is a conflict > within a text/body of law, that which was legally written last > overrides the earlier statement. (e.g. the fine print is always > at *the bottom* of contracts). Think: a law is passed saying > that something is legal, now another one is passed saying that it > is illegal... Which law wins? The second one, obviously, so long > as it was legally passed. Contract law is civil law, the Constitution isn't civil law it is the charter defining how the government is supposed to work. If we accept this then no part of the Constitution is safe because it could be over-ridden this way, clearly not what the founding fathers intended in practice or principle. > Well, same with the BoR/Admendments. As AMENDMENTS, they override > the main body of the Constitution, if there is a conflict. This > is plain, simple, contractual law, and holds anywhere that people > negotiate contracts. > > Consider: The main body of the C says that the Senate can ratify > treaties, such as the UN resolution to confiscate privately-owned > small arms. Yet there is the 2A. Which wins? The 2A because it > is the overriding law of the land, higher than the authority of > the main body of the C to give the Senate that power when there is > a conflict between parts of the law. > > Conclusion: The UN should get your guns and ammo one bullet at a > time. This is lawyer bullshit, the 10th states very clearly, as well as the last sentence of the inter-state commerce clause, that the Constitution has to be taken in toto. The legislators and courts don't get to pick and choose. Furthermore, since the amendments dealing with prohabition were passed prior to the 16th they set a precedence that requires that subsequent amendemnts must specify what they are changing, the 16th doesn't do that. One could argue on that alone that the 16th as currently worded is invalid since it didn't meet prior precedence and by extension wasn't passed legaly. ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From honig at sprynet.com Sat Sep 12 01:07:31 1998 From: honig at sprynet.com (David Honig) Date: Sat, 12 Sep 1998 16:07:31 +0800 Subject: Clinton's fake apologies (fwd) In-Reply-To: <199809121625.LAA15937@einstein.ssz.com> Message-ID: <3.0.5.32.19980912140527.007d2ad0@m7.sprynet.com> At 11:25 AM 9/12/98 -0500, Jim Choate wrote: >Forwarded message: > >What part of: > >High crimes and misdemeanors don't you understand? > >Oh, and it isn't 'high misdemeanors'... There is no evidence that Clinton actually *inhaled* on the flavored cigar... From ravage at EINSTEIN.ssz.com Sat Sep 12 01:32:55 1998 From: ravage at EINSTEIN.ssz.com (Jim Choate) Date: Sat, 12 Sep 1998 16:32:55 +0800 Subject: Ooops...16 is before 18th & 21st Message-ID: <199809122156.QAA18031@einstein.ssz.com> Ooops, guess I was in some sort of fugue and forgot how to count... Clearly the 16th is before the 18th or 21st amendments. ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From brian at smarter.than.nu Sat Sep 12 01:37:27 1998 From: brian at smarter.than.nu (Brian W. Buchanan) Date: Sat, 12 Sep 1998 16:37:27 +0800 Subject: Investigating the Suspect Computer In-Reply-To: <199809121910.PAA03207@camel14.mindspring.com> Message-ID: > THIS PACKAGE IS DISTRIBUTED TO LAW ENFORCEMENT AND > PRIVATE INVESTIGATORS ONLY!! THE ARCHIVE FILE IS [PKZip] > ENCRYPTED, AND YOU WILL NEED A PASSWORD TO EXTRACT > THE ARCHIVE. IF YOU ARE NOT WORKING IN LAW ENFORCEMENT, > DON'T BOTHER TO DOWNLOAD THE FILE, WE WILL NOT DISTRIBUTE > THE PASSWORD UNLESS WE CAN VERIFY YOUR CREDENTIALS. 6161234432565677 possibilities for up to 8 printable-characters (roughly 2^52) 217180147133 poss. for up to 8 lowercase letters (roughly 2^38) 54507958502609 poss. for up to 8 lower/upper letters (roughly 2^46) 221919451578029 poss. for up to 8 alphanumeric chars. (roughly 2^48) Apparently, the password can be up to 80 printable characters in length... 715934338421370680344382998236434541670979942120825502830105586745112050\ 939906381266091474511676185877408805164512571770773165479768270778933665\ 90119714237357 possibilities worst-case (roughly 2^524) According to one of the READMEs that comes with a public domain implementation of the PKZIP crypto algorithm, there is a known-plaintext attack against it described at http://www.cryptography.com/. If it's 8 or less lower-case letters, it would seem that it's probably crackable in a reasonable amount of time on a high-end desktop PC or workstation. Anything more would probably require a distributed attack. -- Brian Buchanan brian at smarter.than.nu Never believe that you know the whole story. From brianbr at together.net Sat Sep 12 01:45:54 1998 From: brianbr at together.net (Brian B. Riley) Date: Sat, 12 Sep 1998 16:45:54 +0800 Subject: radio net Message-ID: <199809122147.RAA23457@mx01.together.net> On 9/8/98 2:29 PM, Ryan Lackey (ryan at systemics.ai) passed this wisdom: >Is anyone else interested in setting up a radio net (probably packet radio >relay) to relay small quantities of data in the event the telecommunications >infrastructure becomes unavailable (either technically or >legally/politically/militarily)? There are existing packet relay nets, but >in my experience amateur radio people, especially in the US, are very >willing to roll over for the government at the slightest cause. you tar with too wide a brush ... one of the pioneers of ham packet radio is Phil Karn, who definitely isn't in to submissive roll overs! For that matter neither am I, though, sadly the greater number of hams do fit your description. >I think the cost would be something like $1-5k per station, and it could >be done in a fairly turnkey fashion. Exactly how to handle routing and >what protocol to use on the network is kind of an open question -- there >are a lot of solutions, none of them optimal. so what are you interested in setting up???? Brian B. Riley --> http://members.macconnect.com/~brianbr For PGP Keys "One of the deep mysteries to me is our logo, the symbol of lust and knowledge, bitten into, all crossed with in the colors of the rainbow in the wrong order. You couldn't dream of a more appropriate logo: lust, knowledge, hope, and anarchy." -- Gassee - Apple Logo From nobody at sind.hyperreal.art.pl Sat Sep 12 01:53:42 1998 From: nobody at sind.hyperreal.art.pl (HyperReal-Anon) Date: Sat, 12 Sep 1998 16:53:42 +0800 Subject: Clinton's fake apologies (fwd) Message-ID: On Sat, 12 Sep 1998, David Honig wrote: > There is no evidence that Clinton actually *inhaled* on the > flavored cigar... Something here is a little fishy... From vznuri at netcom.com Sat Sep 12 02:49:36 1998 From: vznuri at netcom.com (Vladimir Z. Nuri) Date: Sat, 12 Sep 1998 17:49:36 +0800 Subject: Clinton's fake apologies In-Reply-To: <199809121549.IAA28683@zendia.mentat.com> Message-ID: <199809122249.PAA03858@netcom13.netcom.com> Jimmy: the "sockpuppets" (as Lucien Goldberg calls them) who defend clinton on TV (and are probably paid to) are trying to advance the case that lying in a civil case is rarely prosecuted, which is true, but has nothing to do with the law. apparently clinton & his slimy lawyer teammates would tend to reassure all the women, such as Gennifer Flowers as I recall, that they could lie without consequence in a civil trial. at least those women whom they didn't threaten to "break their pretty legs". a capricious bunch, hmm? also, there may be some legal precedent that unless the lying had to do with the case, it is not relevant to the case (a reasonable situation I wouldn't be surprised if some judge ruled) but there's just no laws, as I understand it, that ever allow lying under any circumstances, particularly in sitations such as court hearings, depositions, etc. in fact it can be argued our whole legal system breaks down if lying is ever sanctioned in any way. that's the problem. weasel clinton will always be looking for a loophole. I'm surprised you gave the slightest credibility to claims that lying is ever sanctioned under the law. there are a lot of paid-lowlife tentacles making the television circuit defending clinton, I suspect. you've fallen prey to one of their arguments. he would have been trashed long ago if it weren't for their thick, odious & treacherous smokescreens, imho. there are a lot more traitors in this country than Clinton, for sure. they all hang out together, but few sheeple will ever know. From jmcc at hackwatch.com Sat Sep 12 03:05:11 1998 From: jmcc at hackwatch.com (John McCormac) Date: Sat, 12 Sep 1998 18:05:11 +0800 Subject: Investigating the Suspect Computer In-Reply-To: Message-ID: <35FAFEA3.D737AC1B@hackwatch.com> Brian W. Buchanan wrote: > > > THIS PACKAGE IS DISTRIBUTED TO LAW ENFORCEMENT AND > > PRIVATE INVESTIGATORS ONLY!! THE ARCHIVE FILE IS [PKZip] > > ENCRYPTED, AND YOU WILL NEED A PASSWORD TO EXTRACT > > THE ARCHIVE. IF YOU ARE NOT WORKING IN LAW ENFORCEMENT, > According to one of the READMEs that comes with a public domain > implementation of the PKZIP crypto algorithm, there is a A few years ago the plaintext attack was implmented. One of the first tests was on an encrypted file released in Europe that was supposed to contain the source code and emulation of the Sky 0A smartcard. It cracked it in about 3 hours I seem to recall. The implementation worked exceedingly well and ran on Linux. The page says that the w95 version is also available. http://www.unix-ag.uni-kl.de/~conrad/krypto/pkcrack.html Regards...jmcc -- ******************************************** John McCormac * Hack Watch News jmcc at hackwatch.com * 22 Viewmount, Voice: +353-51-873640 * Waterford, BBS&Fax: +353-51-850143 * Ireland http://www.hackwatch.com/~kooltek ******************************************** -----BEGIN PGP PUBLIC KEY BLOCK----- Version: 2.6 mQCNAzAYPNsAAAEEAPGTHaNyitUTNAwF8BU6mF5PcbLQXdeuHf3xT6UOL+/Od+z+ ZOCAx8Ka9LJBjuQYw8hlqvTV5kceLlrP2HPqmk7YPOw1fQWlpTJof+ZMCxEVd1Qz TRet2vS/kiRQRYvKOaxoJhqIzUr1g3ovBnIdpKeo4KKULz9XKuxCgZsuLKkVAAUX tCJKb2huIE1jQ29ybWFjIDxqbWNjQGhhY2t3YXRjaC5jb20+tBJqbWNjQGhhY2t3 YXRjaC5jb20= =sTfy -----END PGP PUBLIC KEY BLOCK----- From brianbr at together.net Sat Sep 12 04:05:14 1998 From: brianbr at together.net (Brian B. Riley) Date: Sat, 12 Sep 1998 19:05:14 +0800 Subject: radio net (fwd) Message-ID: <199809130003.UAA29856@mx01.together.net> On 9/9/98 8:39 AM, Jim Choate (ravage at einstein.ssz.com) passed this wisdom: >Forwarded message: > >> Date: Wed, 09 Sep 1998 00:51:49 -0700 >> From: "William J. Hartwell" >> Subject: Re: radio net > >> I think a radio network linked to the Amateur networks sending secure >> packets, >> using tunneling or maybe just encrypted traffic (There may be some FCC >> rules regarding this. > >The FCC prohibits the transmission of encrypted data via analog or digital >signals by amateurs. The FCC prohibits the use of transmissions encoded specifically to obscure the content of the traffic (which is exactly what our reason for using encryption would be), in essence they prohibit using encrypted transmisions. However, by wording the ruling that way they leave the door open for things like the ham radio satellite command channel uplinks being encrypted for security reasons ... but to do so they must, upon request, be able to provide the Friendly Chocolate Company with their keys. Brian B. Riley --> http://members.macconnect.com/~brianbr For PGP Keys "For every action, there is an equal and opposite criticism." From ravage at EINSTEIN.ssz.com Sat Sep 12 04:07:38 1998 From: ravage at EINSTEIN.ssz.com (Jim Choate) Date: Sat, 12 Sep 1998 19:07:38 +0800 Subject: radio net (fwd) Message-ID: <199809130029.TAA18636@einstein.ssz.com> Forwarded message: > Subject: Re: radio net (fwd) > Date: Sat, 12 Sep 1998 20:03:56 -0400 > From: "Brian B. Riley" > open for things like the ham radio satellite command channel uplinks > being encrypted for security reasons ... but to do so they must, upon Actualy the control channel for satellites must be encrypted by international law. ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From brianbr at together.net Sat Sep 12 04:26:34 1998 From: brianbr at together.net (Brian B. Riley) Date: Sat, 12 Sep 1998 19:26:34 +0800 Subject: radio net Message-ID: <199809130024.UAA12462@mx02.together.net> On 9/10/98 10:28 PM, Robert Hettinga (rah at shipwright.com) passed this wisdom: >Hey, guys, > >Someone here already said it, but nobody else got it, so I'll repeat it: >SSB, or Single Sideband. It's commercial ham radio, if you will, and all >the ships use it. I expect that you can shove anything down an SSB set that >you want, including encrypted traffic. > >Ham radio is a government nerd subsidy, and as such, doesn't do much but >make more government funded/sactioned/approved/whatever nerds. :-). > >SSB would do just fine. It's an international standard, after all, and >probably not under the control of any one government, even.e Bob, I am afraid you are showing your ignorance here. SSB is just one of the many modes of emission standardized in radio communications, its used by the amateur radio service (ham) , the citizens radio service (cb), the military, etc ... The real problem is that to build any sort of network would require some fixed positions, which, if it were intended to be 'clandestine' would be compromised sooner or later ... either that or several poor shnooks would have full time jobs driving vans around and around to keep the RDF snoops guessing ... In general there would be a better chance of pulling it off if you stayed away from the ham radio bands. 'self-policing' is not a character of another bands except the commercial broadcast bands. Spread spectrum would have more promise as many stations could be on the air at once on the same frequency thus making life quite confusing for the T-hunters. Brian B. Riley --> http://members.macconnect.com/~brianbr For PGP Keys "I would rather be exposed to the inconveniences attending too much liberty than those attending too small a degree of it." -- Thomas Jefferson From jya at pipeline.com Sat Sep 12 04:59:39 1998 From: jya at pipeline.com (John Young) Date: Sat, 12 Sep 1998 19:59:39 +0800 Subject: Investigating the Suspect Computer In-Reply-To: Message-ID: <199809130056.UAA05048@camel8.mindspring.com> There's a batch of PKZip and other program cracker tools at: http://www.theargon.com/tools.html With links to other sites, which link to more, into the dark psychoses of Trans-Ural and Andean regions -- some of the DNS's are off the charts. Even so, none seem to work on the pci-pack.exe I grabbed, at least not for me. The file may not be complete, or it's a decoy, or all the vile crackers I unzipped are DIRT-virii death-writhing in my unzapped prostate. From frissell at panix.com Sat Sep 12 05:52:33 1998 From: frissell at panix.com (Duncan Frissell) Date: Sat, 12 Sep 1998 20:52:33 +0800 Subject: Clinton's fake apologies In-Reply-To: <199809121549.IAA28683@zendia.mentat.com> Message-ID: <199809130146.VAA08964@mail1.panix.com> At 10:54 AM 9/12/98 -0700, Declan McCullagh wrote: >1. it's tough to argue that clinton's apparent perjury in Jones was >immaterial > >2. i know of no law saying perjury only a crime if it's "material" > >3. perjury is certainly one of the "great offenses" that common law says >is impeachable. > >4. besides, non-criminal activities can constitute impeachable offenses -- >look at second and third articles of impeachment in Nixon's case > >-Declan In addition, the last man impeached and convicted by Congress (circa 1988) Judge Alcy Hastings (sp?) was convicted for perjury in a tax evasion case in which he was acquitted of the original charges. Hastings was later elected to Congress from Florida and last week dissed Clinton by not attending a fundraiser he held there for the Democrat candidate for governor. Hastings said that he has yet to make up his mind on Clinton and wants to review the evidence. DCF From tcmay at got.net Sat Sep 12 06:16:36 1998 From: tcmay at got.net (Tim May) Date: Sat, 12 Sep 1998 21:16:36 +0800 Subject: Clinton--Why I am Chortling In-Reply-To: <199809121625.LAA15937@einstein.ssz.com> Message-ID: I've seen several Cypherpunks express the opinion that can be summarized as "We paid $40 million for _this_?" And "Ken Starr is on a witch hunt." Indeed, a lot of money spend by the Independent Prosecutor. And Starr is indeed a Grand Inquisitor. But he is following the law, and Attorney General Janet Reno authorized his latest venture. I'm generally pleased with what's happening. Many points to make: * What goes around, comes around. The Liberal puke Democrats who crucified Bob Packwood, Clarence Thomas, and any number of corporate people charged with "sexual harassment," are now reaping what they sowed. "If she says it happened, it happened," the mantra of the feminazi left, is now apparently forgotten by Patricia It's not our business" Ireland. * And it was the Dems who pushed through the Independent Prosecutor Act (or whatever the precise name is). They've reaped the whirlwind, as it were. * Lawmaking is paralzyed, frozen, stillborne. This I count as a Good Thing. Even better will be another 8-10 months of this nightly spectacle. No Health Care Reform, no Communications Decency Act II, no Tobacco Act, nothing. (By the way, a danger will be having Republicans sweep into power in November and then making mischief about morality, new laws about crypto and terrorism, etc.) * Clinton is of course shown to be a liar, a perjurer, a suborner of perjury, an abuser of his office, and a duplicitous jerk who spouts NOW mantras while doing what any CEO in America would be fired and sued over. (Not that I support any such lawsuits.) * This disgraces the Presidency, which I also count as a Good Thing. There were hopes that Nixon's downfall would be the end of the Imperial Presidency, but, alas, the pomp and circumstance continued unabated. It's time we demystify this whole President thing and start asking why the fuck we should let some tinhorn politician spend our money. * Children will be taught that the President is a liar, adulterer, creep, jerk, fool, pervert, and general scumbag. (A friend of mine has been pointing out to his 10-year-old son that Clinton is a lying piece of dog shit, a monster who professes to lead us all morally while poking cigars in Monica's cunt and then going to church to piously opine about the need for values....not that the cigar thing is ipso facto immoral, just at odds with his "family values" nonsense. * Let us all hope this "does not go to completion" (ha ha) for many, many months. Let us hope all see that this nation of laws is built on lies and perjurious talking points. * I know that if I'm called to testify in court I'll be sorely tempted to say: "As for telling the truth, I plan to follow the example of the President." Ironically, this situation is now so well known that such a statement would almost certainly be taken by a judge today as contempt of court. And yet we put up with having this lying sack of shit in the White House. I am chortling. --Tim May (This space left blank pending determ. of acceptability to the gov't.) ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, ComSec 3DES: 831-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Licensed Ontologist | black markets, collapse of governments. From blancw at cnw.com Sat Sep 12 06:56:21 1998 From: blancw at cnw.com (Blanc) Date: Sat, 12 Sep 1998 21:56:21 +0800 Subject: Clinton's fake apologies In-Reply-To: Message-ID: <000301bddec2$d088f460$238195cf@blanc> >From Bill Clinton, via WASHINGTON (Reuters): : First, I want to say to all of you that, as you might imagine, I : have been on quite a journey these last few weeks to get to the end : of this, to the rock bottom truth of where I am and where we all are. But we are not the ones whose direction (moral compass?) is in question, as we're not all in this together. We only found out about it in Jan/February. : I agree with those who have said that in my first statement after I : testified I was not contrite enough. I don't think there is a fancy : way to say that I have sinned. i.e.: Now that there was unavoidable evidence of a DNA match, and in view of 23 boxes of a report distributed to everyone in Congress and everyone else in the whole world, it's time to look more seriously repentant, in an off-hand sort of way. (memory: "I hope things go well for her." For HER ! ) : It is important to me that everybody who has been hurt know that : the sorrow I feel is genuine: first and most important, my family; : also my friends, my staff, my Cabinet, Monica Lewinsky and her : family, and the American people. I have asked all for their : forgiveness. He wasn't hurting in January. Nor in February, March, April, May, June, July . . . : But I believe that to be forgiven, more than sorrow is required : -- at least two more things. First, genuine repentance -- a : determination to change and to repair breaches of my own making. I : have repented. Since his sex life is personal, and nobody really cares as long as it doesn't affect his Presidential duties, why would anybody care that he's repentant? (don't tell me, I know. . .) :Second, what my bible calls a "broken spirit"; an : understanding that I must have God's help to be the person that I : want to be; a willingness to give the very forgiveness I seek; a : renunciation of the pride and the anger which cloud judgment, lead : people to excuse and compare and to blame and complain. To excuse and compare and to blame who? What makes him think anyone will be blaming him for doing anything wrong? He didn't think it was wrong for 3 or so years with Monica. Nor for 10 or so years with Jennifer. What would make it wrong now, at this "particular moment in time. . . ." : Now, what does all this mean for me and for us? First, I will : instruct my lawyers to mount a vigorous defense, using all available : appropriate arguments. But legal language must not obscure the fact : that I have done wrong. Legally defensible; morally indefensible. Any relation? :Second, I will continue on the path of : repentance, seeking pastoral support and that of other caring people : so that they can hold me accountable for my own commitment. Because of his proven "pattern" of straying from the "path of righteousness". : Third, I will intensify my efforts to lead our country and the : world toward peace and freedom, prosperity and harmony, in the hope : that with a broken spirit and a still strong heart I can be used for : greater good, for we have many blessings and many challenges and so : much work to do. : In this, I ask for your prayers and for your help in healing our : nation. But it is not we need healing, being it not we, are sick. :And though I cannot move beyond or forget this -- indeed, I : must always keep it as a caution light in my life -- it is very : important that our nation move forward. He and his counsel keep saying this ("put it behind us", "move on", "move forward"), as though trying to erase it from view - to obfuscate what has become apparent and continue as though there was not something going on; something which seems to need "healing". Yet Starr keeps pressing on; on and onward. It is ironic, in these times of absurd laws being created by both sides in government, legislation advanced and supported by all manner of political interest groups, that lately these creations of theirs come back to bite them. Had there been no laws regarding "sexual harrassment in the workplace", the Jones case would not have come up, Monica would not have been brought into the picture, and Clinton would not have had to ever worry about being revealed for his "not-illegal" behavior. Contradictions abound in this situation: . everyone should have a private life - but you're not supposed to do it in the Whitehouse (that holy place of morally superior governing operations); in particular, while you're discussing "matters of greater importance to the nation" on the phone . having sex is not illegal, when it's between consenting parties - but you're not supposed to cheat on your spouse, in particular if you're a Christian (Baptist?) who goes to Church every Sunday and worships the source of the 10 Commandments . people are saying that the sex acts were "horrible" and "nasty" and "disgusting" - like they themselves would *never* think of doing equally lascivious things to each other (like, who are they kidding) . whose fault is it that Ken Starr was assigned to hound down Clinton, and that it took so long to get to this point? Who was stalling, who needed to tell the truth, why was Clinton unavoidably *obligated* to tell the truth? How paradoxical that an inveterate liar (according to his reputation) would have put himself in a position where legally, according to the law, the law of this Nation which he supports and leads into the Future, he is required to reveal the truth, even when decency would say that one should not be coerced into self-incrimination over a personal, private matter, and should not have to confess such things. Deep irony, for times like these . . . .. Blanc From frissell at panix.com Sat Sep 12 07:10:16 1998 From: frissell at panix.com (Duncan Frissell) Date: Sat, 12 Sep 1998 22:10:16 +0800 Subject: Clinton--Why I am Chortling In-Reply-To: <3.0.5.32.19980912140527.007d2ad0@m7.sprynet.com> Message-ID: <199809130309.XAA14731@mail1.panix.com> At 07:18 PM 9/12/98 -0700, Tim May wrote: > >I've seen several Cypherpunks express the opinion that can be summarized as >"We paid $40 million for _this_?" And "Ken Starr is on a witch hunt." Ken Starr is investigating 5 separate Clinton criminal conspiracies. Walsh took 7 years and $60megs to investigate Iran/Contra (two criminal conspiracies). I like it when the rulers are consumed by their own creations. DCF Extra credit awarded for naming Starr's 5 investigations. From tcmay at got.net Sat Sep 12 07:39:33 1998 From: tcmay at got.net (Tim May) Date: Sat, 12 Sep 1998 22:39:33 +0800 Subject: Clinton--Why I am Chortling In-Reply-To: Message-ID: At 8:11 PM -0700 9/12/98, Duncan Frissell wrote: >At 07:18 PM 9/12/98 -0700, Tim May wrote: >> >>I've seen several Cypherpunks express the opinion that can be summarized as >>"We paid $40 million for _this_?" And "Ken Starr is on a witch hunt." > >Ken Starr is investigating 5 separate Clinton criminal conspiracies. Walsh >took 7 years and $60megs to investigate Iran/Contra (two criminal >conspiracies). > >I like it when the rulers are consumed by their own creations. > >DCF > >Extra credit awarded for naming Starr's 5 investigations. Let's see: -- Whitewater and Madison Guarantee (may be 2 separate investigations) -- Filegate (White House had 1100 FBI files, overseen by Craig the Bar Bouncer) -- Travelgate (replacing the old staff is kosher, but accusing them of crimes is not) -- Cigargate And of course there were and are investigations of Ron Brown, Hazel O'Leary, Ron Espe, Henry Cisneros, and nearly every one of the "rainbow coalition" he installed...seems only the honkies are not being investigated, which says either there's a coincidence, or the honkies are getting a pass, or the minorities he put in were your basic political graft appointees. I'd say that a President who lives by the sword will die by the sword, but this might get me a visit by one of his pimps, er, Secret Service stooges. They grep for "President" and "die" in the same paragraph and have no understanding of allusions. --Tim May (This space left blank pending determ. of acceptability to the gov't.) ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, ComSec 3DES: 831-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Licensed Ontologist | black markets, collapse of governments. From honig at sprynet.com Sat Sep 12 08:25:05 1998 From: honig at sprynet.com (David Honig) Date: Sat, 12 Sep 1998 23:25:05 +0800 Subject: radio net (fwd); RAND '64 In-Reply-To: <199809130029.TAA18636@einstein.ssz.com> Message-ID: <3.0.5.32.19980912212340.007c3670@m7.sprynet.com> On a radio data network: See http://www.rand.org/publications/RM/RM3762/ In this Memorandum we consider something we have earlier referred to as "poor-boy" microwave. The "poor-boy" designation resulted from an imposed constraint on the design of an ensemble of microwave communications equipments--namely, that the designer should have to pay for the system out of his own pocket! Even so, a look at price tags for anything to do with any large electronic or communications system would appear to render the term "poor-boy" inappropriate. "Mini-cost," a contraction of "minimum-cost," now seems more fitting. Mini-cost microwave, therefore, is a minimum-cost, line-of-sight microwave communications system designed to transmit digital information in as inexpensive a manner as possible. It is one way of building the links for the proposed Distributed Adaptive Message Block communications system with which this series of Memoranda is concerned. The distributed system itself is designed around digital modulation, using redundant paths selected on an instant-by-instant basis. The communications links for such a system can be built in a different manner than their equivalents in today's systems, taking advantage of the system's less rigid distortion level and tandem reliability requirements. The fundamental objective for the system's links is that they permit formation of new routes cheaply (a necessary survivability criterion), yet allow transmission on the order of millions of bits per second (see ODC-I, -VII[1]); system reliability and a low raw error rate are secondary. And, since future networks conveying military traffic must be designed with the expectation of heavy damage, powerful digital error detection and error removal methods have been built into the system. From alan at clueserver.org Sat Sep 12 08:28:11 1998 From: alan at clueserver.org (Alan Olsen) Date: Sat, 12 Sep 1998 23:28:11 +0800 Subject: Monica, slavegirl of Gor (fwd) Message-ID: This was found on a different mailing lists. names have been removed to protect the guilty. alan at ctrl-alt-del.com | Note to AOL users: for a quick shortcut to reply Alan Olsen | to my mail, just hit the ctrl, alt and del keys. ---------- Forwarded message ---------- Subject: Re: Monica, slavegirl of Gor The best opinion I've heard so far on this topic: "If the government's going to spend $50 million on pornography, I'd rather it be by artists I support." Carol From honig at sprynet.com Sat Sep 12 08:34:06 1998 From: honig at sprynet.com (David Honig) Date: Sat, 12 Sep 1998 23:34:06 +0800 Subject: radio net (fwd) In-Reply-To: <199809130029.TAA18636@einstein.ssz.com> Message-ID: <3.0.5.32.19980912213251.007cd230@m7.sprynet.com> See also http://www.rand.org/publications/RM/RM3420/ In fact you may want to look at RAND's work On Distributed Communications http://www.rand.org/publications/RM/RM3420/RM3420.list.html Duck and cover your packets... From alan at clueserver.org Sat Sep 12 08:38:31 1998 From: alan at clueserver.org (Alan Olsen) Date: Sat, 12 Sep 1998 23:38:31 +0800 Subject: Clinton--Why I am Chortling In-Reply-To: Message-ID: On Sat, 12 Sep 1998, Tim May wrote: > I've seen several Cypherpunks express the opinion that can be summarized as > "We paid $40 million for _this_?" And "Ken Starr is on a witch hunt." > > Indeed, a lot of money spend by the Independent Prosecutor. And Starr is > indeed a Grand Inquisitor. "Our weapons are Fear, Surprise, and our fanatical devotion to the Demipublican party." > But he is following the law, and Attorney General Janet Reno authorized his > latest venture. > > I'm generally pleased with what's happening. Many points to make: [snip] Another that I think is relivant: * He has been very anti-encryption for the American public, but is very willing to use it to protect his own ass. The hypocrasy of the situation is glaring. > Ironically, this situation is now so well known that such a statement would > almost certainly be taken by a judge today as contempt of court. And yet we > put up with having this lying sack of shit in the White House. > > I am chortling. "Now is the time on Sprockets when we dance!" alan at ctrl-alt-del.com | Note to AOL users: for a quick shortcut to reply Alan Olsen | to my mail, just hit the ctrl, alt and del keys. From honig at sprynet.com Sat Sep 12 09:25:12 1998 From: honig at sprynet.com (David Honig) Date: Sun, 13 Sep 1998 00:25:12 +0800 Subject: voice from the past Message-ID: <3.0.5.32.19980912221213.007c9870@m7.sprynet.com> On Secrecy of Secrecy Without the freedom to expose the system proposal to widespread scrutiny' by clever minds of diverse interests, is to increase the risk that significant points of potential weakness have been overlooked. A frank and open discussion here is to our advantage. http://www.rand.org/publications/RM/RM3765/RM3765.chapter2.html Chapter 3 has an excellent picture of a binary key on a hollerith card... http://www.rand.org/publications/RM/RM3765/RM3765.chapter3.html From honig at sprynet.com Sat Sep 12 09:25:17 1998 From: honig at sprynet.com (David Honig) Date: Sun, 13 Sep 1998 00:25:17 +0800 Subject: canadian cryptanalysis, eh? Message-ID: <3.0.5.32.19980912221243.007cf100@m7.sprynet.com> http://watserv1.uwaterloo.ca/~brobinso/cryptan.html also http://watserv1.uwaterloo.ca/~brobinso/rqmts.html Suggested courses �CA-105 - Introduction to Cryptography and Exploitation of Manual Cryptosystems �CA-107 - Exploitation of Manual Cryptosystems �CA-123 - Shift-Register Cryptology �CA-223 - Advanced Shift-Register Cryptology �CA-247 - Vocoders for Cryptanalysts �MA-213 - PTAH �MA-246 - Cryptomathematics for Mathematicians �MA-256 - Signal Processing Mathematics[24] Knowledge of the following areas of Mathematics is required: �Probability and Statistics including Stochastic and Markov Processes, �Linear Algebra and Abstract Algebra including Finite Field Theory, Shift Register and Polynomial Theory, �Communications, Information and Coding Theory, �Sampling Theory, �Digital Filtering, �Numerical Methods, and �Fast Transformation Algorithms. From stuffed at stuffed.net Sun Sep 13 06:51:37 1998 From: stuffed at stuffed.net (STUFFED NEWS DAILY) Date: Sun, 13 Sep 1998 06:51:37 -0700 (PDT) Subject: COME & GET IT - HOTTEST ISSUE YET! Message-ID: <19980913121914.16214.qmail@eureka.abc-web.com> IN TODAY'S ISSUE: 30 SUPER-HOT JPEG PHOTOS; 5 MEGA HOT SEXY STORIES; BAG A BILLIONARE BABE; BEST OF EUREKA; WINE, (NAKED) WOMEN AND SONG; MAYOR McLAPDANCE; CROSS-DRESSING ALIEN ABDUCTORS; DEWEY DECIMAL DRACULA DATE; THE NUDE BOMB; HAPPY (HOOKER) MEDIUM; VIAGRA SUNRISE; BOOB AIR; RELIGIOUS EXPERIENCE; MUCH, MUCH MORE! ----> http://stuffed.net/98/9/13/ <---- Welcome to today's issue of Stuffed. To read it you should click on the URL above. If it is not made clickable by your email program you will need to use your mouse to highlight the URL, copy it and then paste it into your browser (then press Return). This email is never sent unsolicited. Stuffed is the supplement for the Eureka newsletter you subscribed to. Full instructions on unsubscribing are in every issue of Eureka! ----> http://stuffed.net/98/9/13/ <---- From rah at shipwright.com Sat Sep 12 16:15:39 1998 From: rah at shipwright.com (Robert Hettinga) Date: Sun, 13 Sep 1998 07:15:39 +0800 Subject: radio net In-Reply-To: <199809130024.UAA12462@mx02.together.net> Message-ID: At 8:24 PM -0400 on 9/12/98, Brian B. Riley wrote: > Bob, I am afraid you are showing your ignorance here. I don't think so. > SSB is just one of > the many modes of emission standardized in radio communications, its used > by the amateur radio service (ham) , the citizens radio service (cb), the > military, etc ... I know what Single Sideband means. As I've said before, and what you failed to read later on in this thread, evidently, is that there are commercial Single Sideband radios out there which have the range of ham sets. These radios are used for commercial ship-to-shore traffic, and I expect that encryption is legal on them. I expect that, because these frequencies are subject to international convention rather than federal law, they have more leeway (heh... nautical pun) on their use. Including, I bet, digital packets and encryption. > The real problem is that to build any sort of network would require some > fixed positions, which, if it were intended to be 'clandestine' would be > compromised sooner or later ... either that or several poor shnooks would > have full time jobs driving vans around and around to keep the RDF snoops > guessing ... My understanding is that Ryan's looking for some kind of post-infocalyptic radio network for when it All Falls Down Sometime Soon (tm). I expect that in that event, Ham would be fine, because there is no, as Mr. Gore likes to say, controlling legal authority, to worry about. But, to put up and test a network, commercial SSB would do just fine. And, of course, After The Big One, what kind of long-distance shortwave radio you run it on will be superfluous, ham, SSB or no. > In general there would be a better chance of pulling it off if you > stayed away from the ham radio bands. 'self-policing' is not a character > of another bands except the commercial broadcast bands. Right, so (he says for the third time), why not just order a commerial ship-to-shore SSB rig, something which costs within an order of magnitude, plus or minus, of a Ham set, and go play? > Spread spectrum would have more promise as many stations could be on the > air at once on the same frequency thus making life quite confusing for > the T-hunters. Right. If we had some, um, ham, we could have some ham and eggs. If we had some eggs. Cheers, Bob Hettinga ----------------- Robert A. Hettinga Philodox Financial Technology Evangelism 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From sorens at workmail.com Sat Sep 12 17:02:27 1998 From: sorens at workmail.com (Soren) Date: Sun, 13 Sep 1998 08:02:27 +0800 Subject: radio net Message-ID: <35FBC34E.6B4F9127@workmail.com> SSB xceivers cost <$700. Try any marine electronics store. Best choice is a ham xceiver with strap selectable SSB (actually a violation of FCC dictate to enable SSB on a ham rig, but everyone does it anyway). This would cost ~$1500, the Icom 7658 is a good one I know of. Go and get your local equivalent of a VHF license, send in the extension to cover SSB (~$50). Then purchase a 'PacRat' from any ham hangout. I got mine in Redwood City CA, on El Camino real - some years back now though. This is a little box that hooks into the back of the ham/SSB set and into a serial port of your PC. It comes with some basic packet handling software. Last time I looked, PacRats were <$200. Don't expect any great xfr rates however. Noise to signal requires many packet retransmissions as the ionosphere is not a very good mirror. Running TCP/IP over it should be easily doable. Basic use is to dial in the frequency yourself on the SSB (this usually requires an auto-tuner ~$700 AND a manual tuner ~$100, for best results). You need to get the best antenna you can afford. Unfortunately, antennas are frequency range specific, so you'll probably need 3: one for 0-5000 miles, 5000-12000, 12000-?. Its easy to rig the tuner to support 2-3 antennas, switch selectable. You need a Good Earth for anything to happen as expected. By now it should be possible to get some extra SW to drive the freq selection, so you could do spread spectrum. This is not allowed of course, as you are expected to do the call-sign exchange protocol on each freq session. There are freqs that are dedicated to digital (ship-to-shore commercial). You may have to get a commercial license for this though. One nasty thing about radio is that you share the spectrum with others, so collisions tend to make a hash out of reliability. Store and forward at unpopular times such as 3:00 EST, could be a good alternative. The longer distance freqs (>12000), are the most uncluttered, but suffer from the most noise to signal. A bounce across the pacific to the house next door, would be potentially more reliable than a lower freq. Most of the ham sets also support FM, so it would also be possible to piggyback on the ricochet freqs for line of sight use. Or for a real adrenaline rush, piggyback the mil freqs. If you really want to give the hams fits, write a noise to morse engine (or better yet, some captured call signs repeated endlessly) and swamp the channels, where the old popular mechanics guys discuss their antenna envy, at random intervals. 9:00 in the Ozarks is a fine time. Sit back and wait for the black vans to drive up. "Educate, don't Agitate" From frissell at panix.com Sat Sep 12 17:13:59 1998 From: frissell at panix.com (Duncan Frissell) Date: Sun, 13 Sep 1998 08:13:59 +0800 Subject: Clinton's fake apologies Message-ID: <199809131313.JAA12863@mail1.panix.com> If nothing else, Clinton deserves his troubles because he is a very strong supporter of the legal structures that caused them. 1) He is a lawyer and a strong supporter of the trial lawyers who have promoted extremely expansive civil discovery of the sort that allowed Clinton to be questioned about Monica in the Jones case. 2) He is a strong advocate of the sort of sexual harassment law that led to the Jones case. He thinks it should be punished harshly. A real feminist. 3) He is a strong advocate of the Ethics in Government Act and pushed its renewal through Congress in 1994 when the Act was going to expire and when the Dems controlled both houses of Congress. 4) He is a law-and-order liberal who believes in executing retarded murderers and jailing hospital execs who submit Medicare bills based on misunderstandings of detailed and contradictory regulations. 5) His wife (and presumably he) was a strong supporter of an expansive definition of "high crimes and misdemeanors" during Watergate. "Hoist on your own petard" (and I even know what a petard is). DCF From frissell at panix.com Sat Sep 12 17:51:47 1998 From: frissell at panix.com (Duncan Frissell) Date: Sun, 13 Sep 1998 08:51:47 +0800 Subject: Clinton--Why I am Chortling In-Reply-To: <199809130309.XAA14731@mail1.panix.com> Message-ID: <199809131351.JAA14866@mail1.panix.com> At 08:41 PM 9/12/98 -0700, Tim May wrote: >>Extra credit awarded for naming Starr's 5 investigations. > >Let's see: > >-- Whitewater and Madison Guarantee (may be 2 separate investigations) > >-- Filegate (White House had 1100 FBI files, overseen by Craig the Bar Bouncer) > >-- Travelgate (replacing the old staff is kosher, but accusing them of >crimes is not) > >-- Cigargate > 1) Whitewater 2) Vince Foster 3) Travelgate 4) Filegate 5) Fornigate DCF From whgiii at invweb.net Sat Sep 12 18:53:38 1998 From: whgiii at invweb.net (William H. Geiger III) Date: Sun, 13 Sep 1998 09:53:38 +0800 Subject: Clinton--Why I am Chortling In-Reply-To: <199809131351.JAA14866@mail1.panix.com> Message-ID: <199809131451.KAA19264@domains.invweb.net> -----BEGIN PGP SIGNED MESSAGE----- In <199809131351.JAA14866 at mail1.panix.com>, on 09/13/98 at 09:53 AM, Duncan Frissell said: >At 08:41 PM 9/12/98 -0700, Tim May wrote: >>>Extra credit awarded for naming Starr's 5 investigations. >> >>Let's see: >> >>-- Whitewater and Madison Guarantee (may be 2 separate investigations) >> >>-- Filegate (White House had 1100 FBI files, overseen by Craig the Bar >Bouncer) >> >>-- Travelgate (replacing the old staff is kosher, but accusing them of >>crimes is not) >> >>-- Cigargate >> >1) Whitewater >2) Vince Foster >3) Travelgate >4) Filegate >5) Fornigate Unfortunately, there is still Chinagate that Reno is still stonewalling the investigations on. What ever happened with Cattlegate ($100,000 bribe payed to Hillary)? - -- - --------------------------------------------------------------- William H. Geiger III http://www.openpgp.net Geiger Consulting Cooking With Warp 4.0 Author of E-Secure - PGP Front End for MR/2 Ice PGP & MR/2 the only way for secure e-mail. OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html - --------------------------------------------------------------- Tag-O-Matic: Windows: an Unrecoverable Acquisition Error! -----BEGIN PGP SIGNATURE----- Version: 2.6.3a-sha1 Charset: cp850 Comment: Registered_User_E-Secure_v1.1b1_ES000000 iQCVAwUBNfvd/Y9Co1n+aLhhAQGJogQAykoBWz4jqHhFpvp4LGapjp5lyHtuxdEv wZUyZzGUfu5rlhPem1TofJ4fGii+v4KpisnOCyB7MlwpSHkYYQf/gXio9Dwie9RF hm+esP7c9HatDZFosoNU5Mq6VEyYJyNx8aZDR2SPiVeE5dCqV1QmGNejcNaNOELo ogoLYXXKNtE= =Ie5X -----END PGP SIGNATURE----- From nobody at earth.wazoo.com Sat Sep 12 19:05:57 1998 From: nobody at earth.wazoo.com (Anonymous) Date: Sun, 13 Sep 1998 10:05:57 +0800 Subject: No Subject In-Reply-To: Message-ID: <199809131506.PAA02152@earth.wazoo.com> >>>>> "Bobby" == Robert Hettinga writes: > My understanding is that Ryan's looking for some kind of > post-infocalyptic radio network for when it All Falls Down > Sometime Soon (tm). I expect that in that event, Ham would be > fine, because there is no, as Mr. Gore likes to say, controlling > legal authority, to worry about. Worse, there may be any number of "controlling legal authorities". You don't suppose that all the existing radio monitoring equipment is going to stop working just because the infrastructure for managing it is in disarray? Or that people with access to that equipment are going to have any problem getting fuel for their helicopters from government fuel dumps? But your communication network is going to become a valuable resource, and more than one tin-pot wannabe is going to want to get his hands on it. From frissell at panix.com Sat Sep 12 19:07:13 1998 From: frissell at panix.com (Duncan Frissell) Date: Sun, 13 Sep 1998 10:07:13 +0800 Subject: Clinton--Why I am Chortling In-Reply-To: <199809131351.JAA14866@mail1.panix.com> Message-ID: <199809131506.LAA19297@mail1.panix.com> At 09:57 AM 9/13/98 -0500, William H. Geiger III wrote: >What ever happened with Cattlegate ($100,000 bribe payed to Hillary)? Statute of Lim had long passed. Also, I'm not sure if an unemployed hausfrau living in public housing in the District of Columbia is a "covered person" under the Ethics in Government Act. Ken *can* prosecute her for crimes uncovered in the course of his investigation and she has no special privileges (other than spousal). Chelsea too (Misprison of a Felony, probably). Socks and Buddy are immune since animal prosecutions ended with the Middle Ages. DCF From schear at lvcm.com Sat Sep 12 19:55:46 1998 From: schear at lvcm.com (Steve Schear) Date: Sun, 13 Sep 1998 10:55:46 +0800 Subject: Citizenship silliness. Re: e$: crypto-expatriatism In-Reply-To: <199809090418.AAA25605@domains.invweb.net> Message-ID: >And it wouldn't have happened had the victorious superpowers decided the >sand niggers in Palestine could be kicked off their land. (I have no beef >with those Jews who peacefully bought land in Palestine prior to this mass >resettlement.) No doubt the Arabs were being given the shaft. First by the Ottomans (western lackys that they were) and then by the superpowers themselves after they could no longer hide behind a puppet regime. The Arabs didn't make things any better by refusing to accept any Jewish settlers, including those who had purchased land from first the Ottomans and then the Palestinians. The Palestinians had been told no harm would come to those of them who stood aside and warned if they fought or fled their lands they wouldn't be welcomed back. When it comes to nations, fairness has historically had little influence on such outcomes. In the end, all property belongs to those who can keep it (by whatever means are necessary). --Steve --------------------------------------------------------------------- reply to schear - at - lvcm - dot - com --- PGP mail preferred, see http://www.pgp.com and http://web.mit.edu/network/pgp.html RSA fingerprint: FE90 1A95 9DEA 8D61 812E CCA9 A44A FBA9 RSA key: http://keys.pgp.com:11371/pks/lookup?op=index&search=0x55C78B0D --------------------------------------------------------------------- From nobody at replay.com Sat Sep 12 21:17:03 1998 From: nobody at replay.com (Anonymous) Date: Sun, 13 Sep 1998 12:17:03 +0800 Subject: No Subject Message-ID: <199809131705.TAA10263@replay.com> son of gomez From nobody at replay.com Sat Sep 12 21:30:38 1998 From: nobody at replay.com (Anonymous) Date: Sun, 13 Sep 1998 12:30:38 +0800 Subject: No Subject Message-ID: <199809131728.TAA11651@replay.com> Sunday, September 13, 1998 - 19:23:30 MET Talk about unimaginable control. How many times did Monica provoke William Jefferson Clinton? Four or five, before he deigned that there should be a denouement? And why? Because, deep in his heart, he knew it was just wrong! Impeachment? Hardly. Instead, Congress should award this Man, our magnificent President, a new decoration, the �Presidential Blue Spheres of Steel�! Can one imagine any other person on Earth with such iron control? Fortunately, yes! And who could this be? You guessed it! None other than Will-O-Iron�s buddy and potential replacement, Ol Stiffy himself, Al. O blessed land. O fortunate realm. This is one American who will sleep more soundly tonight, knowing that, whatever the provocation, there can be no accidental discharge of US weaponry, that the finger on the button is controlled by a Will-of-Iron. From rah at shipwright.com Sat Sep 12 22:18:35 1998 From: rah at shipwright.com (Robert Hettinga) Date: Sun, 13 Sep 1998 13:18:35 +0800 Subject: The Empire Strikes Back (was IP: Army Tests Land Warrior for 21stCentury Soldiers) Message-ID: --- begin forwarded text Delivered-To: ignition-point at majordomo.pobox.com X-Sender: believer at telepath.com Date: Sun, 13 Sep 1998 09:33:31 -0500 To: believer at telepath.com From: believer at telepath.com Subject: IP: Army Tests Land Warrior for 21st Century Soldiers Mime-Version: 1.0 Sender: owner-ignition-point at majordomo.pobox.com Precedence: list Reply-To: believer at telepath.com Source: Department of Defense http://www.defenselink.mil/news/Sep1998/n09111998_9809117.html ------- NOTE: Website includes three photographs of device in use. No mention of whether the computerized software in the device, of the GPS link and its satellites are Y2K compliant. ------- Army Tests Land Warrior for 21st Century Soldiers By Jim Garamone American Forces Press Service FORT BELVOIR, Va. -- American soldiers and Marines are already among the most deadly in the world, but a system called Land Warrior will soon make them unmatched. Land Warrior integrates small arms with high-tech equipment enabling ground forces to deploy, fight and win on the battlefields of the 21st century. "Land Warrior soldiers fight as a system, and the most important part of the system is what's between his ears," said Army Lt. Col. Robert Serino, Land Warrior product manager. Land Warrior came about in 1991 when an Army study group recommended the service look at the soldier as a complete weapon system. The first priority in Land Warrior is lethality. The second is survivability and the third, command and control. The program will cost $2 billion when 45,000 sets of the equipment are fielded between 2001-2014. The Marine Corps, Air Force and many foreign countries are interested in the system. "First and foremost, Land Warrior is a fighting system," Serino said. Land Warrior has several subsystems: the weapon, integrated helmet assembly, protective clothing and individual equipment, computer/radio, and software. The weapon subsystem is built around the M-16/M-4 modular carbine. It has a laser range finder/digital compass, a daylight video camera, a laser aiming light and a thermal sight. "This system will allow infantrymen to operate in all types of weather and at night," Serino said. In conjunction with other components, a soldier can even shoot around corners without exposing himself to enemy fire. The integrated helmet assembly is lighter and more comfortable than today's helmet, Serino said. It has a helmet-mounted monocular day display, a night sensor with flat panel display, a laser detection module, ballistic/laser eye protection, a microphone and a headset. The protective clothing and individual equipment subsystem incorporates modular body armor and upgrade plates that can stop small-arms rounds fired point-blank. It includes an integrated load-bearing frame, chemical/biological protective garments and modular rucksack. The infantryman will attach the computer/radio subsystem to his load-bearing frame. Over this goes the rucksack for personal gear. The computer processor is fused with radios and a Global Positioning System locator. A hand grip wired to the pack and attached to the soldier's chest acts as a computer mouse and also allows the wearer to change screens, key on the radio, change frequencies and send digital information. The subsystem comes in two flavors: The leader version has two radios and a flat panel display/keyboard, and soldiers have one radio. With the equipment, leaders and soldiers can exchange information. Soldiers using their weapon-mounted camera, for example, can send videos to their leaders. Finally, the software subsystem includes tactical and mission support modules, maps and tactical overlays, and the ability to capture and display video images. The system also contains a power management module. Designers set up the system so it can be updated as technology improves. The soldiers who will actually use Land Warrior have been consulted every step of the way. Prime contractor Raytheon worked with experts at the U.S. Army Infantry Center at Fort Benning, Ga., in designing the system. They have taken the system to the users to ensure the system is headed in the right direction. For instance, Serino said, "The rucksack has quick-release straps so an infantryman can just drop it if the need arises. This is what our soldiers asked for -- which is really great." One problem the Army must overcome before fielding is power. Current batteries last about 150 minutes with all systems running. "Clearly soldiers won't have all systems running all the time, but this is still not acceptable," said Serino. Other batteries under development by the Army's Communications-Electronics Command may push the time up to 30 hours. The Army plans to test the Land Warrior system with a platoon from the 82nd Airborne Division, Fort Campbell, Ky. Later, a battalion-sized test is planned, Serino said. "Ultimately, soldiers will define the end state of Land Warrior -- and we'll know more every time the soldiers employ the system," he said. "We'll get the system up to a certain point, then the soldiers will be the people who say how far it can really go." ----------------------- NOTE: In accordance with Title 17 U.S.C. section 107, this material is distributed without profit or payment to those who have expressed a prior interest in receiving this information for non-profit research and educational purposes only. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml ----------------------- ********************************************** To subscribe or unsubscribe, email: majordomo at majordomo.pobox.com with the message: (un)subscribe ignition-point email at address ********************************************** www.telepath.com/believer ********************************************** --- end forwarded text ----------------- Robert A. Hettinga Philodox Financial Technology Evangelism 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From rah at shipwright.com Sat Sep 12 22:19:05 1998 From: rah at shipwright.com (Robert Hettinga) Date: Sun, 13 Sep 1998 13:19:05 +0800 Subject: radio net Message-ID: --- begin forwarded text MIME-Version: 1.0 Date: Sun, 13 Sep 1998 09:11:29 -0700 To: Robert Hettinga From: Somebody Subject: Re: radio net > >I know what Single Sideband means. As I've said before, and what you failed >to read later on in this thread, evidently, is that there are commercial >Single Sideband radios out there which have the range of ham sets. These >radios are used for commercial ship-to-shore traffic, and I expect that >encryption is legal on them. I expect that, because these frequencies are >subject to international convention rather than federal law, they have more >leeway (heh... nautical pun) on their use. Including, I bet, digital >packets and encryption. > > If I remember correctly, this is escrowed encryption using code books deposited with the appropriate authorities. --- end forwarded text *That* sucks... I wonder who the "appropriate authorities" are? Cheers, Bob Hettinga ----------------- Robert A. Hettinga Philodox Financial Technology Evangelism 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From nobody at replay.com Sat Sep 12 22:56:36 1998 From: nobody at replay.com (Anonymous) Date: Sun, 13 Sep 1998 13:56:36 +0800 Subject: No Subject Message-ID: <199809131855.UAA18056@replay.com> How about a line-of-sight (LOS) infrared network, a neighbor-net? Always thought this could be a method for a local technical entrepreneur to fund and share their personal T-1 link or for some small network enterprise to avoid local and US federal regulations and compete with the big cable and telephone companies. Appears that LOS infrared is currently unregulated and could be encrypted. Get enough people in a neighborhood to put LOS infrared relays on top of their houses, allow them to tap in, and feed this neighbor-net from some central point that is equipped with a more conventional link. I dunno why infrared, which theoretically has much more capacity than a phone line or coax cable, seems currently so slow, i.e., less than 10 MB in many commercial offerings. I�ve no cost estimate for the roof top boxes. Heavy wet weather, fog, rain, snow obviously can affect LOS infrared, esp. low power. Personally, I would like more choices than just the phone and cable lines, especially something that is locally controlled. However, I imagine that if any significant traffic was generated over such infrared or wireless neighbor-nets, the Feds would eventually step in and regulate them. They'd probably want to regulate the traffic over a taut string, between paper cups. From declan at well.com Sun Sep 13 00:19:54 1998 From: declan at well.com (Declan McCullagh) Date: Sun, 13 Sep 1998 15:19:54 +0800 Subject: Clinton--Why I am Chortling In-Reply-To: Message-ID: On Sat, 12 Sep 1998, Tim May wrote: > * What goes around, comes around. The Liberal puke Democrats who crucified > Bob Packwood, Clarence Thomas, and any number of corporate people charged > with "sexual harassment," are now reaping what they sowed. "If she says it > happened, it happened," the mantra of the feminazi left, is now apparently > forgotten by Patricia It's not our business" Ireland. There's also the idea popular in some gender feminist circles that the imbalance of power in manager-employee relationships makes it impossible for genuine consent to be given. Can there be any greater power imbalance than the president of the United States and an intern? Where are the feminist cries of outrage? > * Lawmaking is paralzyed, frozen, stillborne. This I count as a Good Thing. > Even better will be another 8-10 months of this nightly spectacle. No > Health Care Reform, no Communications Decency Act II, no Tobacco Act, > nothing. In general you might be right. But for "noncontroversial" measures like CDA II, well, it'll be in one of the appropriations bills that will be approved in the next three weeks. > * This disgraces the Presidency, which I also count as a Good Thing. There > were hopes that Nixon's downfall would be the end of the Imperial > Presidency, but, alas, the pomp and circumstance continued unabated. It's The balance of power in the U.S. government is too tilted in favor of the executive and federal agencies; I think more should be returned to Congress and the states but don't think we're going to see that happen. To do that Congress needs to be willing to seize it; they're not. If we get Al Gore in the Oval Office we'll have business as usual. -Declan From alan at clueserver.org Sun Sep 13 00:33:18 1998 From: alan at clueserver.org (Alan Olsen) Date: Sun, 13 Sep 1998 15:33:18 +0800 Subject: Clinton--Why I am Chortling In-Reply-To: Message-ID: On Sun, 13 Sep 1998, Declan McCullagh wrote: > On Sat, 12 Sep 1998, Tim May wrote: > > > * What goes around, comes around. The Liberal puke Democrats who crucified > > Bob Packwood, Clarence Thomas, and any number of corporate people charged > > with "sexual harassment," are now reaping what they sowed. "If she says it > > happened, it happened," the mantra of the feminazi left, is now apparently > > forgotten by Patricia It's not our business" Ireland. > > There's also the idea popular in some gender feminist circles that the > imbalance of power in manager-employee relationships makes it impossible > for genuine consent to be given. Can there be any greater power imbalance > than the president of the United States and an intern? Where are the > feminist cries of outrage? "But Clinton is on their side!" I think the gender feminists are being quiet because they supported Clinton. It all comes down to politics. There are other feminists I know (of the non-politically correct variety) that have very unkind things to say about the man. > > * Lawmaking is paralzyed, frozen, stillborne. This I count as a Good Thing. > > Even better will be another 8-10 months of this nightly spectacle. No > > Health Care Reform, no Communications Decency Act II, no Tobacco Act, > > nothing. > > In general you might be right. But for "noncontroversial" measures like > CDA II, well, it'll be in one of the appropriations bills that will be > approved in the next three weeks. Actually this is *JUST* the time for moralistic political posturing. Expect to see a great deal of "holier than thou" legislation put through under "bringing back morality to America". (And anyone who tries to fight such lunacy will be labeled a hedonistic scum.) It is scandals just like this that fuel the fires of the anti-sex league. > > * This disgraces the Presidency, which I also count as a Good Thing. There > > were hopes that Nixon's downfall would be the end of the Imperial > > Presidency, but, alas, the pomp and circumstance continued unabated. It's > > The balance of power in the U.S. government is too tilted in favor of the > executive and federal agencies; I think more should be returned to > Congress and the states but don't think we're going to see that happen. To > do that Congress needs to be willing to seize it; they're not. If we get > Al Gore in the Oval Office we'll have business as usual. And remember that Tipper is part of that baggage. Expect a moralistic crusade or two from the first lady if that happens. alan at ctrl-alt-del.com | Note to AOL users: for a quick shortcut to reply Alan Olsen | to my mail, just hit the ctrl, alt and del keys. From honig at sprynet.com Sun Sep 13 01:27:39 1998 From: honig at sprynet.com (David Honig) Date: Sun, 13 Sep 1998 16:27:39 +0800 Subject: radio net In-Reply-To: <35FBC34E.6B4F9127@workmail.com> Message-ID: <3.0.5.32.19980913142530.007d1bc0@m7.sprynet.com> At 09:06 AM 9/13/98 -0400, Soren wrote: >If you really want to give the hams fits, write a noise to morse engine >(or better yet, some captured call signs repeated endlessly) and swamp >the channels, where the old popular mechanics guys discuss their antenna >envy, at random intervals. 9:00 in the Ozarks is a fine time. Sit back >and wait for the black vans to drive up. Performance art: solar-powered low-power, low-freq modulators (Hams get off designing this stuff) with digitized true noise inputs, scattered about the desert. Maybe scattered in a big smiley face pattern. Extra points for burst transmissions. Too subtle for SRL but amusing nonetheless.... From ryan at michonline.com Sun Sep 13 01:31:01 1998 From: ryan at michonline.com (Ryan Anderson) Date: Sun, 13 Sep 1998 16:31:01 +0800 Subject: Revenge of the AOLHoles In-Reply-To: <199809110152.DAA09397@replay.com> Message-ID: > The problem is that most of the AOL users who publish to the net seem to > be morons. They use some annoying Russo-Germanic quoting style, they can't > use English, they're clueless, they post off-topic, or something else. In all fairness, many of the users on AOL *know* that the AOL quoting style is utterly horrible. Unofrtunatley, they don't have much choice in what they use. Ryan Anderson PGP fp: 7E 8E C6 54 96 AC D9 57 E4 F8 AE 9C 10 7E 78 C9 From nobody at replay.com Sun Sep 13 01:49:12 1998 From: nobody at replay.com (Anonymous) Date: Sun, 13 Sep 1998 16:49:12 +0800 Subject: No Subject Message-ID: <199809132148.XAA29865@replay.com> Found this: http://offshorehaven.nu/banking/index.html no idea whether a trap or a jewel. From mix at anon.lcs.mit.edu Sun Sep 13 03:10:34 1998 From: mix at anon.lcs.mit.edu (lcs Mixmaster Remailer) Date: Sun, 13 Sep 1998 18:10:34 +0800 Subject: MISTY encryption algorithm source code Message-ID: <19980913230004.14914.qmail@nym.alias.net> Nobuki Nakatuji wrote: > MISTY source code posted by me at long ago had many mistake. > Attachment file are revised MISTY source code and revised readme. > Thanks. > > > ______________________________________________________ > Get Your Private, Free Email at http://www.hotmail.com BRAIN used by you always since at long ago have many insect. Attachment brain not here because was exhausted in decypher you message. You go back at Hotmail now and stop spam Cypherpunks list. Chop chop. From nobody at replay.com Sun Sep 13 03:12:25 1998 From: nobody at replay.com (Anonymous) Date: Sun, 13 Sep 1998 18:12:25 +0800 Subject: Revenge of the AOLHoles Message-ID: <199809132311.BAA03065@replay.com> On Sun, 13 Sep 1998, Ryan Anderson wrote: > > > The problem is that most of the AOL users who publish to the net seem to > > be morons. They use some annoying Russo-Germanic quoting style, they can't > > use English, they're clueless, they post off-topic, or something else. > > In all fairness, many of the users on AOL *know* that the AOL quoting > style is utterly horrible. Unofrtunatley, they don't have much choice in > what they use. Sure they do. They can use a different mail reader. (After all, 32-bit AOL allows AOL users to use all the TCP/IP protocols...) They can cut and paste manually, or, probably best, they can go to another ISP. I understand what you're saying, Ryan, and I understand what they're saying, but there all alternatives out there; they just don't want to use them. In fact, they've installed proprietary packages that do this. There are plenty of free alternatives out there which don't have this problem. If my ISP pushed a bunch of proprietary software down my throat, I'd find another ISP. That goes double if the proprietary software sucks. That goes triple if the software sucks and the ISP is trying to get every idiot they can to use it. (I got a "100 hours free network abuse" disk in the mail recently from AOL.) Another AnonMonger From nobody at replay.com Sun Sep 13 03:15:52 1998 From: nobody at replay.com (Anonymous) Date: Sun, 13 Sep 1998 18:15:52 +0800 Subject: No Subject Message-ID: <199809132309.BAA02915@replay.com> "It has been claimed, for example, that free application of cryptography enables drug traffickers and terrorists to communicate in secret, without the law enforcement officials being able to intercept their messages. In some countries, strong encryption has been banned or the keys have to be escrowed for government officials. With invisibility readily available to anyone with moderate programming skills, it is obvious that any such measures are ineffective. " This from the most recent online National Counterintelligence Center Counterintelligence News and Developments Volume 2 June 1998 http://www.nacic.gov/cind/june98.htm#rtoc4 "In some countries" indeed. From jamesd at echeque.com Sun Sep 13 03:37:47 1998 From: jamesd at echeque.com (James A. Donald) Date: Sun, 13 Sep 1998 18:37:47 +0800 Subject: Offshore Banking In Latvia In-Reply-To: <199809132148.XAA29865@replay.com> Message-ID: <199809132336.QAA12214@proxy3.ba.best.com> -- At 11:48 PM 9/13/98 +0200, Anonymous wrote: > Found this: http://offshorehaven.nu/banking/index.html no > idea whether a trap or a jewel. Looks a whole lot more promising than the EUB (which turned out to be a classic take the money and run operation) The web site is not in the US, which shows that they are serious. Latvia is a pro capitalist, anti communist government. (I regard the US government as anti capitalist and soft on communism), The government sees itself as presiding over an economy that is still basically socialist, even though they have transformed far more rapidly and radically than most of the former Soviet Union, in particularly they have transformed far more radically than Russia. On the other hand, many of the facts that one would need to know in order to know how safe your money is are simply not made available. In particular the web site does not mention the banks name. Oh wow. That does not inspire confidence. They write: Q. What is the name of the Bank? A. This is the typical question asked by "wannabes" and competitors. Our firm does not disclose the name of the Bank until confirmation of the payment of our fees is received. The Bank only wants to deal with people interested in opening and operating such accounts. If the information provided by our firm does not satisfy you, then it definitely means that you are not interested in opening an offshore bank account. Well actually it means that any sane person would regret handing over their money as soon as they discover the name of the bank. Some time ago a bank in Russia opened. Its name was "Fuck you" in Russian, spelt backwards. The bank soon disappeared, with the depositors money. What is "fuck you" in Latvian? --digsig James A. Donald 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG 5f1OaRdJKerB2Mx0HCiBWPBIAzs9ziDsmpdrl/m1 4cfQ2P6hHFL6HZHebpSnhsUfLL4PwuUmFSRu6dP+9 > > > > > > > > > > ----------------------------------------------------- We have the right to defend ourselves and our property, because of the kind of animals that we are. True law derives from this right, not from the arbitrary power of the omnipotent state. http://www.jim.com/jamesd/����� James A. Donald From jamesd at echeque.com Sun Sep 13 03:52:09 1998 From: jamesd at echeque.com (James A. Donald) Date: Sun, 13 Sep 1998 18:52:09 +0800 Subject: Offshore Banking In Latvia Message-ID: <199809132350.QAA02796@proxy4.ba.best.com> -- > > Found this: http://offshorehaven.nu/banking > > noidea whether a trap or a jewel. Just in case my first message was unclear: Offshore banking in Latvia looks good. The above website looks like a con. --digsig James A. Donald 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG JXDMmaEyma+jN7wyVhvlYcOrLB7iNaWSDaDfE2dl 4B2lFoTKEej/7263gNwJ8CpUWXMXIdco2pG0PzcFL ----------------------------------------------------- We have the right to defend ourselves and our property, because of the kind of animals that we are. True law derives from this right, not from the arbitrary power of the omnipotent state. http://www.jim.com/jamesd/����� James A. Donald From xenedra at hotmail.com Sun Sep 13 05:37:44 1998 From: xenedra at hotmail.com (Well now I am a Mommy!) Date: Sun, 13 Sep 1998 20:37:44 +0800 Subject: sixdegrees Message-ID: <19980914012729.12617.qmail@hotmail.com> hi, I see you added me as a friend..... just wondering who you are. :) Christy ______________________________________________________ Get Your Private, Free Email at http://www.hotmail.com From tcmay at got.net Sun Sep 13 06:23:05 1998 From: tcmay at got.net (Tim May) Date: Sun, 13 Sep 1998 21:23:05 +0800 Subject: sixdegrees In-Reply-To: <19980914012729.12617.qmail@hotmail.com> Message-ID: At 6:27 PM -0700 9/13/98, Well now I am a Mommy! wrote: >hi, > >I see you added me as a friend..... just wondering who you are. :) > >Christy > Hi Christy, Got your name from the Stalker's R Us group. Please post more details about your personal fantasies. Send us nude pictures, too. You say you're a Mommy. Hope there are no stretch marks. Oh, and your children can join our group too. Got any photos? --Tim May (This space left blank pending determ. of acceptability to the gov't.) ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, ComSec 3DES: 831-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Licensed Ontologist | black markets, collapse of governments. From nnburk at cobain.hdc.net Sun Sep 13 06:54:56 1998 From: nnburk at cobain.hdc.net (nnburk) Date: Sun, 13 Sep 1998 21:54:56 +0800 Subject: Remailers Message-ID: <35FCA076.6F15@yankton.com> Are _any_ of the remailers working? From bv7b5063 at auto.sixdegrees.com Sun Sep 13 07:12:38 1998 From: bv7b5063 at auto.sixdegrees.com (sixdegrees) Date: Sun, 13 Sep 1998 22:12:38 +0800 Subject: Your new password Message-ID: <199809140305.UAA16429@toad.com> Name: Joe Cypherpunk sixdegrees Password: kindread In response to your request for a new sixdegrees(tm) password, we have sent you the following temporary password: kindread. As soon as you come to the site, http://www.sixdegrees.com , and use it to log-in on the home page, it will become your official password, and your old password will be deactivated. (If you end up remembering your old password and use that to log-in at the site before using this new temporary password, the temporary password will be deactivated.) This may seem wacky, but it's for your security. And, either way, once you successfully log-in at the site, you can go to your personal profile and choose whatever password you like - in fact, we encourage you to do so. If you never requested a new password and got this message in error, just continue using your old password and e-mail us at issues at sixdegrees.com. ==================================================================== PLEASE NOTE: All replies to this address are processed by a computer. If you have any problems, questions or requests send an e-mail to issues at sixdegrees.com and someone will get back to you as soon as possible. ==================================================================== E.SI.REQPW.1 From ravage at EINSTEIN.ssz.com Sun Sep 13 07:13:05 1998 From: ravage at EINSTEIN.ssz.com (Jim Choate) Date: Sun, 13 Sep 1998 22:13:05 +0800 Subject: Remailers (fwd) Message-ID: <199809140335.WAA23282@einstein.ssz.com> Forwarded message: > Date: Sun, 13 Sep 1998 21:49:58 -0700 > From: nnburk > Subject: Remailers > > Are _any_ of the remailers working? > Which remailers? The CDR members or the anonymous remailers? ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From vznuri at netcom.com Sun Sep 13 07:30:03 1998 From: vznuri at netcom.com (Vladimir Z. Nuri) Date: Sun, 13 Sep 1998 22:30:03 +0800 Subject: IP: British Openly Prepare for Y2K Martial Law Message-ID: <199809140329.UAA27171@netcom13.netcom.com> From: believer at telepath.com Subject: IP: British Openly Prepare for Y2K Martial Law Date: Sat, 12 Sep 1998 22:26:39 -0500 To: believer at telepath.com Source: http://www.garynorth.com/y2k/detail_.cfm/2553 Category: Martial_Law Date: 1998-09-11 13:47:42 Subject: British Openly Prepare for Y2K Martial Law Link: http://www.independent.co.uk/stories/A1109820.html Comment: The British government is way ahead of every other nation in facing up to the implications of y2k. It is obvious the the U.S. military is preparing for martial law in late 1999, but no official publicly admits that this is the case. The British are more forthright. This is from THE INDEPENDENT (Sept. 11). [The link was dead within hours.] * * * * * * * * TROOPS may be on the streets in the year 2000 under emergency Home Office plans to maintain vital services which could be crippled by the millennium computer bug. Armed forces will be on standby to help councils and police provide disaster relief if key infrastructures such as hospitals, water supplies and roads are hit by the electronic change. The Home Office confirmed yesterday that local authorities are being encouraged to draw up contingency plans to deal with the "nightmare scenario" of failed traffic lights, disabled water pumping stations, fuel shortages and other disrupted services. The bug, which represents the inability of most computers and electronic systems to deal with the change of date from 1999 to 2000, could also hit vital equipment in hospitals, lifts, benefits payments and phone lines. Most computer experts believe that major failures are unlikely, but councils, which have a statutory duty to provide emergency relief, have been told to prepare for the worst. They will be allowed to use the Armed Forces Military Aid to Civil Authorities Act to call in emergency help. . . . Rail, telecommunications, gas and electricity regulators were joined by BT, Shell, Transco and Trailtrack to agree ways to reassure the public that their computers were being adapted to avoid the bug. . . . In one key sanction, BT and Cable and Wireless have been told they will be given the power to disconnect firms that corrupt phone connections. . . . Home Secretary Jack Straw is ultimately responsible for emergency planning as chairman of a body called the Civil Contingencies Committee. The Home Office Emergency Planning Division will meet this month to firm its own proposals. ----------------------- NOTE: In accordance with Title 17 U.S.C. section 107, this material is distributed without profit or payment to those who have expressed a prior interest in receiving this information for non-profit research and educational purposes only. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml ----------------------- ********************************************** To subscribe or unsubscribe, email: majordomo at majordomo.pobox.com with the message: (un)subscribe ignition-point email at address ********************************************** www.telepath.com/believer ********************************************** From vznuri at netcom.com Sun Sep 13 07:30:22 1998 From: vznuri at netcom.com (Vladimir Z. Nuri) Date: Sun, 13 Sep 1998 22:30:22 +0800 Subject: IP: Y2K: 316,862 Reasons Why FedReserve Won't Make It Message-ID: <199809140329.UAA27154@netcom13.netcom.com> From: believer at telepath.com Subject: IP: Y2K: 316,862 Reasons Why FedReserve Won't Make It Date: Sat, 12 Sep 1998 22:24:39 -0500 To: believer at telepath.com North's Comments about Article Below: In June, 1998, a pair of experts -- one is a y2k optimist -- produced a report on the likelihood of system-wide failures based on the number of external exchanges of data an organization has. It is called the Beach/Oleson Pain Index. (Oleson is the optimist; Beach edits CIO MAGAZINE.) BUSINESS TODAY reported: "The Beach/Oleson Pain Index illustrates how the Y2K software glitch is further compounded by connectivity to external organizations, such as suppliers, customers, banks and other business partners." There is a 10.4% likelihood of catastrophic failure for any organization with over 1,000 external connections. It is only 0.5% for 50 connections, 1.1% for 100, 5.4% for 500. The Federal Reserve System, the most important of all central banks, has 316,862. This is from a July 1, 1998 report of the General Accounting Office of the U.S. Congress. The report outlines what every organization must do to protect itself from importing noncompliant data. This list is long, and the task is gigantic. Congressional committees should insist on receiving detailed quarterly progress reports on these procedures from the Federal Reserve. Of course, no elected official would be so bold or so impolite as to ask, let alone demand. To ask such questions, the questioner would have to assume that Congress has effective authority over the Federal Reserve, as the law says. No Congressman who has served over one term is so naive as to believe that. * * * * * * * * * Federal agencies reported that they have a total of almost 500,000 data exchanges with other federal agencies, states, local governments, and the private sector for their mission-critical systems. Almost 90 percent of the exchanges were reported by the Federal Reserve and the Department of Housing and Urban Development (HUD) which reported having 316,862 and 133,567, respectively. The Federal Reserve exchanges data with federal agencies and the private sector using software it provides to these entities. . . . As part of their Year 2000 correction efforts, organizations must identify the date formats used in their data exchanges, develop a strategy for dealing with exchanges that do not use 4-digit year formats, and implement the strategy. These efforts generally involve the following steps. -- Assess information systems to identify data exchanges that are not Year 2000 compliant. -- Contact the exchange partner and reach agreement on the date format to be used in the exchange. -- Determine if data bridges and filters are needed. -- Determine if validation processes are needed for incoming data. -- Set dates for testing and implementing new exchange formats. -- Develop and test bridges and filters to handle nonconforming data. -- Develop contingency plans and procedures for data exchanges and incorporate into overall agency contingency plans. -- Implement the validation process for incoming data. -- Test and implement new exchange formats. The testing and implementation of new data exchanges must be closely coordinated with exchange partners to be completed effectively. In addition to an agency testing its data exchange software, effective testing involves end-to-end testing--initiation of the exchange by the sending computer, transmission through intermediate communications software and hardware, and receipt and acceptance by receiving computer(s), thus completing the exchange process. . . . The Federal Reserve has 2-digit and 4-digit year formats in its data exchanges. It plans to use 4-digit formats for all exchanges in the future, but will continue using the 2-digit year format for some exchanges and have exchange partners bridge to these if necessary. Federal Reserve's Year 2000 officials estimated that 20 percent of their data exchanges have 2-digit year formats. They also told us that they have not set a target date for the conversion to 4-digit year formats. . . . ---------------------------------- Source: Business Today http://www.businesstoday.com/techpages/y2kindex03.htm BT EXCLUSIVE: Local researchers predict Y2K pain Wednesday, June 3, 1998 by Bill Burke/BusinessToday staff A team of technology researchers has come up with an index that they say can tell a business just how bad its Year 2000 computer problem is going to be. The "Beach/Oleson Pain Index" is a chart of Y2K probabilities and predictions based on a formula developed by team leaders Gary Beach, publisher of CIO magazine, and International Data Corp. analyst Tom Oleson. The index determines the "degree of pain" companies are likely to experience when the Millennium Bug strikes. The Beach/Oleson Pain Index illustrates how the Y2K software glitch is further compounded by connectivity to external organizations, such as suppliers, customers, banks and other business partners. The pair will unveil the index today at a Year 2000 conference in Omaha. In the end, Beach says, no one is going to make it through the Millennium threshold untouched. "Realistically, no connected company can expect to survive the Year 2000 unscathed," Beach said. He said the formula answers the fifty-thousand dollar question: 'Just how bad is it going to be?' The index works by taking a company's number of connected applications and plugging that figure into the index. "A company can determine the severity of its Year 2000 problem and create an appropriate contingency plan," Beach said. The index can help companies plan for the deadline, and develop contingency plans, say the designers. "Companies implementing various Year 2000 compliance projects must come to the realization that the Year 2000 problem is not 100 percent solvable," Oleson said. The index uses the number of applications a company has connected to external partners, vendors and customers to determine the severity of the Y2K situation. The probability of experiencing a Year 2000 problem is broken down into four degrees of severity: Annoying; Disruptive; Business Critical and Catastrophic. "0"> Number of Connected Applications Probability: Catastrophic Probability: Business Critical Probability: Disruptive Probability: Annoying 5 0.1% 1.0% 3.7% 7.4% 10 0.1% 2.1% 7.3% 14.3% 20 0.2% 4.1% 14.0% 26.5% 50 0.5% 10.0% 31.4% 53.7% 100 1.1% 19.0% 52.9% 78.6% 500 5.4% 65.0% 97.7% 100.0% 1000 10.4% 87.8% 99.9% 100.0% ----------------------- NOTE: In accordance with Title 17 U.S.C. section 107, this material is distributed without profit or payment to those who have expressed a prior interest in receiving this information for non-profit research and educational purposes only. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml ----------------------- ********************************************** To subscribe or unsubscribe, email: majordomo at majordomo.pobox.com with the message: (un)subscribe ignition-point email at address ********************************************** www.telepath.com/believer ********************************************** From vznuri at netcom.com Sun Sep 13 07:30:25 1998 From: vznuri at netcom.com (Vladimir Z. Nuri) Date: Sun, 13 Sep 1998 22:30:25 +0800 Subject: IP: Two Reporters Attacked at Governor's Rally* Message-ID: <199809140329.UAA27203@netcom13.netcom.com> From: vols-fan at juno.com (Football Fan) Subject: IP: Two Reporters Attacked at Governor's Rally* Date: Sun, 13 Sep 1998 10:55:22 -0500 To: ignition-point at majordomo.pobox.com Alex at 989kjfk.com ********************************************** Quantum Reality News Two Reporters Attacked at Governor's Rally* *********************************************** This morning two Free Press Reporters at Governor George Bush's Rally at the Du Pont Factory in Round Rock Texas were assaulted and silenced from questioning Gov. Bush, while asking pertinent questions. Questions specifically about the CFR and Federal Reserve involvement in Texas and the US. No response was given and orders were immediately given to the Secret Service and Texas DPS, to remove the reporters. Alex Jones Alex at 989kjfk.com "Talk Radio Show Host for KJFK 98.9 FM" [www.989kjfk.com] Austin and Central Texas and "Republic National Radio Broadcasting System" and his Producer Mike Hansen of the Austin Access TV Show "Exposing Corruption" Channel 10 ACTV were grabbed and roughed up and removed from the rally by force. Alex Jones was forceably arrested and taken away and later released by a radio call to the police unit. The radio transmission instructed the officers to release Alex Jones. Governor Bush had ordered his release stating, they had nothing to hold him on. Mike Hansen while filming the incident was hit from behind in an attempt to break his camera. The blow thrown from behind nearly knocked Hansen off his feet. Mike Hansen was not near the scuffle or in the area, he was filming from a distance. Both men received injuries. Not only were their 1st Amendment rights trampled and forceable abridged by the Secret Service and DPS agents but their questions were ignored, questions that are very important to voters. Evidentially these questions, that many of Governor Bush's constituents are asking, were not address by our Governor, and possible President hopeful. The Question were about the Federal Reserve control of our currency and it's role in the perpetuation of oppressive debt in our country. The active part the CFR (Council on Foreign Relations) are playing in the take over and control of our Country and their role in movement toward the New World Order. People expect the same accountability from the Governor, that Governor Bush has been talking about in his campaign advertisements. Why were these citizens attacked? Why were these questions so offensive? A Public Servant should be able to stay cool and have an interest in all of his constituents and all their concerns. If our leadership will not calmly answer honest questions, it leads us as responsible informed voters to ask questions of ourselves. Why aren't all of Governor Bush's constituents concerns and views addressed? Are special interest views and concerns, more valid or more important than the majority of people and voters? Is our leadership truly representing "We the People" if they have someone removed that asks a controversial question? reporter: Randy Clark/Quantum Reality --- You are currently subscribed to tuac-alerts as: [vols-fan at juno.com] To unsubscribe, forward this message to leave-tuac-alerts-184675B at XC.Org --------- End forwarded message ---------- ********************************************** To subscribe or unsubscribe, email: majordomo at majordomo.pobox.com with the message: (un)subscribe ignition-point email at address ********************************************** www.telepath.com/believer ********************************************** From vznuri at netcom.com Sun Sep 13 07:30:40 1998 From: vznuri at netcom.com (Vladimir Z. Nuri) Date: Sun, 13 Sep 1998 22:30:40 +0800 Subject: IP: Germ sabotage scare empties city buildings-Australia Message-ID: <199809140329.UAA27192@netcom13.netcom.com> From: believer at telepath.com Subject: IP: Germ sabotage scare empties city buildings-Australia Date: Sun, 13 Sep 1998 08:49:10 -0500 To: believer at telepath.com Source: The Australian http://www.theaustralian.com.au/webie.asp?URL=/state/4366234.htm>http://www. theaustralian.com.au/webie.asp?URL=/state/4366234.htm Germ sabotage scare empties city buildings The Courier-Mail - 12sep98 POLICE are investigating a possible attempt to sabotage a Brisbane city building by putting the potentially deadly legionella bacteria in the air-conditioner. A canister suspected of containing the bacteria was found in the water cooling system for the Mercantile Mutual building's air- conditioning unit on Thursday. Police suspect the canister was placed there deliberately because recent routine tests on the Edward Street building's air-conditioning showed no sign of the deadly bacteria in its system. Det Snr-Sgt Bryan Paton said the maintenance company responsible for the unit had not seen the canister when it previously checked the water cooling tower. "There is an indication that the device has been put in the water deliberately and there is a concern there may have been some legionella bacteria in the device and we have to wait for those results," Sgt Paton said. "It wasn't a threat to the public or anybody and the air-conditioning system has since been decontaminated but the concern is that someone has done it deliberately. "At this stage we are treating it very seriously." Police also are investigating how someone got access to the air-conditioning unit. The canister sparked a mass evacuation of another city building yesterday when it was delivered there by mistake. Maintenance workers delivered the canister to the Mercantile Mutual building managers, whose offices are in the MLC building. The MLC building, in George Street, was evacuated about 2pm yesterday when the canister, sealed in a metal container, was discovered by office staff. Police and fire and ambulance crews were called to the scene and two Queensland Fire Service officers wearing protective clothing removed the canister. The building was declared safe 90 minutes later and staff returned to work. Insp John Flanagan said the evacuations were a precautionary measure and the canister had been taken to the Government Chemical Laboratory for analysis. The company responsible for managing the MLC building refused to comment, but a staff member said the scare had been blown out of proportion. The bacteria needs a moist environment to develop into the water-borne legionnaires' disease which can cause pneumonia, fever and death. The disease is contracted by inhaling air contaminated by air-conditioning cooling towers, or through whirlpool spas and showers containing contaminated water. The Australian upper limit for legionella bacteria in air- conditioning is a colony count of 10,000. The Mercantile Mutual building had a colony count of 2000. Sgt Paton said police did not know the reason for the possible sabotage and no demands or threats had been made. "People maintaining the air-conditioning units in other buildings should be aware of this and ensure all proper precautions are made," Sgt Paton said. Brisbane Southside Public Health Unit medical officer Brad McCall said legionella was a very common bacterium found in creeks, ponds, air-conditioning cooling towers and hot and cold water taps. � News Limited 1998 ----------------------- NOTE: In accordance with Title 17 U.S.C. section 107, this material is distributed without profit or payment to those who have expressed a prior interest in receiving this information for non-profit research and educational purposes only. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml ----------------------- ********************************************** To subscribe or unsubscribe, email: majordomo at majordomo.pobox.com with the message: (un)subscribe ignition-point email at address ********************************************** www.telepath.com/believer ********************************************** From vznuri at netcom.com Sun Sep 13 07:30:45 1998 From: vznuri at netcom.com (Vladimir Z. Nuri) Date: Sun, 13 Sep 1998 22:30:45 +0800 Subject: IP: Vote on Clinton Message-ID: <199809140329.UAA27214@netcom13.netcom.com> From: vols-fan at juno.com (Football Fan) Subject: IP: Vote on Clinton Date: Sun, 13 Sep 1998 19:24:26 -0500 To: baldmccoy at prodigy.net, PiercedEar at juno.com, TTMCCOY at juno.com, psm127_dad at mailcity.com, phmitch at mindspring.com, stringtickler at hotmail.com, Jimjean5013 at juno.com, laney at arkansas.net, JESSICA.HARDAGE at charleston.af.mil, teyze-barbi at juno.com, rjohnson at bstream.com, iarthuriarthur at juno.com, w-t-14 at juno.com, Bripowell at nidlink.com, supertrician at juno.com, barsotti at bstream.com Dear Friends: MSNBC has a poll asking whether Clinton should go! Right now its 70% yes and 30% No. Please go and vote. Lets tell Clinton where he gets off! There was 117904 responses. http://www.msnbc.com/news/default.asp http://www.msnbc.com/news/default.asp ********************************************** To subscribe or unsubscribe, email: majordomo at majordomo.pobox.com with the message: (un)subscribe ignition-point email at address ********************************************** www.telepath.com/believer ********************************************** From kriek at bigfoot.com Sun Sep 13 07:37:47 1998 From: kriek at bigfoot.com (Neels Kriek) Date: Sun, 13 Sep 1998 22:37:47 +0800 Subject: Offshore Banking In Latvia Message-ID: <001b01bddf90$ffbb6dc0$95060cd1@alien> I have had dealings with the Paritate bank in Latvia. Good bank and no con. http://www.paritate.lv Lots of different types of accounts. Regards From vznuri at netcom.com Sun Sep 13 08:06:56 1998 From: vznuri at netcom.com (Vladimir Z. Nuri) Date: Sun, 13 Sep 1998 23:06:56 +0800 Subject: IP: Impeachment Petition Message-ID: <199809140329.UAA27182@netcom13.netcom.com> From: vols-fan at juno.com (Football Fan) Subject: IP: Impeachment Petition Date: Sat, 12 Sep 1998 22:59:15 -0500 To: baldmccoy at prodigy.net, PiercedEar at juno.com, TTMCCOY at juno.com, psm127_dad at mailcity.com, phmitch at mindspring.com, stringtickler at hotmail.com, Jimjean5013 at juno.com, laney at arkansas.net, JESSICA.HARDAGE at charleston.af.mil, teyze-barbi at juno.com, rjohnson at bstream.com, iarthuriarthur at juno.com, w-t-14 at juno.com, Bripowell at nidlink.com, supertrician at juno.com, barsotti at bstream.com http://congress.nw.dc.us/impeach/petition.html ********************************************** To subscribe or unsubscribe, email: majordomo at majordomo.pobox.com with the message: (un)subscribe ignition-point email at address ********************************************** www.telepath.com/believer ********************************************** From nobody at replay.com Sun Sep 13 08:46:48 1998 From: nobody at replay.com (Anonymous) Date: Sun, 13 Sep 1998 23:46:48 +0800 Subject: The Empire Strikes Back (was IP: Army Tests Land Warrior for 21st Message-ID: <199809140446.GAA23564@replay.com> On Sun, 13 Sep 1998, Robert Hettinga wrote: > "First and foremost, Land Warrior is a fighting system," Serino said. Land > Warrior has several subsystems: the weapon, integrated helmet assembly, > protective clothing and individual equipment, computer/radio, and software. > > The weapon subsystem is built around the M-16/M-4 modular carbine. It has > a laser range finder/digital compass, a daylight video camera, a laser > aiming light and a thermal sight. Great. So now instead of having ninjas come through our windows, we will have Borg coming through our windows. "Citizen-unit, we are Government. Resistance is futile. You will be assimilated. Your personality will conform to our specifications. Resistance is futile." All they need to do now is employ nanotechnology and get some cool "whir whir" sound effects, a big cube-shaped HQ, and maybe a cutting beam to carve your house and car up like roasts when they seize them. From declan at well.com Sun Sep 13 09:30:11 1998 From: declan at well.com (Declan McCullagh) Date: Mon, 14 Sep 1998 00:30:11 +0800 Subject: ANNOUNCEMENT: DC cypherpunks meeting this Saturday, Sep 19 Message-ID: There will be a cypherpunks meeting and party this Saturday, September 19 starting at 5 pm in Adams Morgan, Washington, DC. Our two out-of-town guests are Doug McGowan from HP (who will speak about his company's encryption products that became controversial early this year) and David Burt of filteringfacts.org (who's here for a Christian Coalition conference and may or may not feel like speaking about his position on some of the anti-porn legislation likely to pass Congress). Interested in coming? RSVP and I'll send directions. -Declan From schear at lvcm.com Sun Sep 13 10:14:05 1998 From: schear at lvcm.com (Steve Schear) Date: Mon, 14 Sep 1998 01:14:05 +0800 Subject: radio net In-Reply-To: <199809130024.UAA12462@mx02.together.net> Message-ID: > Spread spectrum would have more promise as many stations could be on the >air at once on the same frequency thus making life quite confusing for >the T-hunters. I investigated this application several years back and see two practical approaches: one adapt a commercial SSB or Ham transciever to use frequency hopping spread spectrum, or two build a pirate spread spectrum satellite ground station. Until recently most SSB gear didn't have the RF characteristics to use FH. Now there are a number of inexpensive sets which use direct frequency synthesis (as opposed to the older, and much slower, phase-locked loop approach) and can be driven at hundreds or even thousands of hops per second. FH helps solve two problems: first it provides privacy, second it can mitigate or eliminate fading (which is highly time-frequency correlated). Also, the higher the hop rate, the higher the process gain, jam resistance and the lower the probablity of intecept (all other things being equal). It think it was Phil Karn (Qualcomm) who once mused that it would be rather straightforward to masquarade a high process gain SS signal on a commercial satellite transponder. To it's owners the SS signal would be almost invisible, making itself known as only a very slight depression in the transponder's gain. Effectively, this could offer an inexpensive covert channel for tunneling packets and thwarting traffic analysis. After the Captain Midnight episode I discussed this possibility with a very technically knowledgeable staffer at the FCC and was assured that discovery of such signals were beyond (at that time) the ability of commercial and national technical (e.g., Lacrosse) means. There's much more, but this should give you the general idea. --Steve --------------------------------------------------------------------- reply to schear - at - lvcm - dot - com --- PGP mail preferred, see http://www.pgp.com and http://web.mit.edu/network/pgp.html RSA fingerprint: FE90 1A95 9DEA 8D61 812E CCA9 A44A FBA9 RSA key: http://keys.pgp.com:11371/pks/lookup?op=index&search=0x55C78B0D --------------------------------------------------------------------- From k9bb50g7 at auto.sixdegrees.com Sun Sep 13 10:57:46 1998 From: k9bb50g7 at auto.sixdegrees.com (sixdegrees) Date: Mon, 14 Sep 1998 01:57:46 +0800 Subject: Larry Gilbert Message-ID: <199809140644.XAA17608@toad.com> Just a quick update from sixdegrees(tm). Unfortunately Larry Gilbert (irving at pobox.com) asked not to be listed as your contact with sixdegrees. We also wanted to make sure you were aware that you currently have no other confirmed contacts, so it will be hard for you to have a productive sixdegrees experience. As you probably know, without any confirmed contacts, you won't get any results from our networking searches. So, we just wanted to recommend that you head over to http://www.sixdegrees.com , log-in, and go to MY CONTACTS to list additional relationships. ==================================================================== PLEASE NOTE: All replies to this address are processed by a computer. If you have any problems, questions or requests send an e-mail to issues at sixdegrees.com and someone will get back to you as soon as possible. ==================================================================== E.DB.BRESP.3 From stuffed at stuffed.net Mon Sep 14 02:00:10 1998 From: stuffed at stuffed.net (STUFFED NEWS DAILY) Date: Mon, 14 Sep 1998 02:00:10 -0700 (PDT) Subject: HOTTEST ISSUE OF THE SUMMER TO KEEP YOU WARM IF FALL IS HEADING YOUR WAY! Message-ID: <19980914071000.22081.qmail@eureka.abc-web.com> IN TODAY'S ISSUE: 30 NEW EXTRA HOT JPEGS! 5 NEW SIZZLING STORIES LISTEN TO GET LAID BAYWATCH CONFESSIONAL DOING THE DRAG KING THING PREGO BY PLEASURE SEX DRUGS AND ARACHNIDS THE BARON OF BALLS THE BEST OF EUREKA NUCLEAR HARD-ON MILLION DOLLAR SHEIK SHAG ----> http://stuffed.net/98/9/14/ <---- Welcome to today's issue of Stuffed. To read it you should click on the URL above. If it is not made clickable by your email program you will need to use your mouse to highlight the URL, copy it and then paste it into your browser (then press Return). This email is never sent unsolicited. Stuffed is the supplement for the Eureka newsletter you subscribed to. Full instructions on unsubscribing are in every issue of Eureka! ----> http://stuffed.net/98/9/14/ <---- From lharrison at dueprocess.com Sun Sep 13 11:20:04 1998 From: lharrison at dueprocess.com (Lynne L. Harrison) Date: Mon, 14 Sep 1998 02:20:04 +0800 Subject: Clinton--Why I am Chortling Message-ID: <3.0.5.32.19980914032054.007d3b40@pop.mhv.net> > On Sat, 12 Sep 1998, Tim May wrote: > > There's also the idea popular in some gender feminist circles that the > imbalance of power in manager-employee relationships makes it impossible > for genuine consent to be given. Can there be any greater power imbalance > than the president of the United States and an intern? Where are the > feminist cries of outrage? Could be because, at least from what I read in the report and from other sources, Monica came onto Clinton. One could make the argument that the imbalance of power was the other way around ;) On another note, instead of the report, it may be extremely more interesting to read: http://www.reagan.com/HotTopics.main/document-9.1.1998.1.html I can't vouch for the veracity of all of those listed. Of those individuals, however, with whom I am familiar by way of the media, it is accurate - and eerie, to say the least. *************************************************************************** Lynne L. Harrison, Esq. | "If we are all here, Poughkeepsie, New York | then we are not mailto:lharrison at dueprocess.com | all there." http://www.dueprocess.com | - old Zen saying ************************************************************************* DISCLAIMER: I am not your attorney; you are not my client. Accordingly, the above is *NOT* legal advice. From update at annex.liveupdate.com Sun Sep 13 11:57:03 1998 From: update at annex.liveupdate.com (LiveUpdate News) Date: Mon, 14 Sep 1998 02:57:03 +0800 Subject: Crescendo News - September 1998 Message-ID: <039975445070e98ANNEX@annex.liveupdate.com> CRESCENDO NEWS - September 1998 Well, it's almost fall here in New England - we're looking forward to the foliage turning color and the snow starting to fall. The leaves up North aren't the only things that are about to change - we're working harder than ever to deliver the best music products on the Internet. You're receiving this email because you downloaded Crescendo in the past, and we want to keep you up to date with some of the exciting things that are happening at LiveUpdate. We hope you are enjoying Crescendo! These are some of the items included in this newsletter: * Crescendo Forte Showcase is now open * Crescendo PLUS version 4.0 Beta 2 now includes LiveSynth * Crescendo Forte featured on RealNetworks Music Showcase * Crescendo Forte featured in Keyboard Magazine's "net smarts" * Re-enabling Crescendo after installing other plugins * Controlling Crescendo using JavaScript * What would you like to see in future versions of Crescendo? * Subscribing / Unsubscribing ---------------------------------- CRESCENDO FORTE SHOWCASE IS NOW OPEN On September 10th, 1998, the long awaited Crescendo Forte Showcase publicly opened its doors. Crescendo Forte is an add-on to RealNetworks' RealPlayer G2, and allows MIDI music to be synchronized with other media types such as RealAudio, video, animation, and text. Rob Glaser, CEO of RealNetworks sums Crescendo Forte up best by saying "Crescendo Forte Rocks!". Crescendo Forte has been called "unbelievable", and it has been said to be "Music the way it was meant to be heard." See (and hear) for yourself what all the excitement is about at the Crescendo Forte Showcase, found at http://www.liveupdate.com/cforte/showcase.html. After you've heard the difference Crescendo Forte makes to music on the Internet, get Crescendo PLUS version 4.0 Beta 2 for an upgrade to LiveSynth that makes the music sound even better! (Keep reading for more details...) ---------------------------------- CRESCENDO PLUS VERSION 4.0 BETA 2 NOW INCLUDES LIVESYNTH It's finally here! Crescendo PLUS version 4.0 Beta 2 is now available, and includes streaming, a software wavetable synthesizer (for more realistic instrument sounds), and more. If you have purchased a Crescendo PLUS subscription within the past year, you should have already received an email giving you instructions on how to download version 4.0 Beta 2. If you haven't experienced Crescendo PLUS yet, now is the time to do so. LiveSynth uses the processing power of your PC to play MIDI music using real instrument samples. Therefore a Pentium processor is required to take advantage of LiveSynth. If you don't have a Pentium processor, you will still be able to take advantage of streaming and the other features found in Crescendo PLUS. For a short time, the Crescendo PLUS subscription which entitles you to both the shipping 3.0 version of Crescendo and 4.0 Beta 2 including LiveSynth is available for $19.95 at our on-line store, https://secure.liveupdate.com. ---------------------------------- CRESCENDO FORTE FEATURED ON REALNETWORKS MUSIC SHOWCASE Atlantic Records, Polygram, Capitol Records, Warner Brothers, Sony Music, Maverick, Virgin Records can all be found on the G2 Music Showcase area on the RealNetworks web site. And who should be featured among these titans of the music industry? LiveUpdate, of course! Visit the G2 music showcase at http://www.real.com/showcase/realplayer/music.html and hear how the combination of RealPlayer G2 and Crescendo Forte are redefining the way music is heard on the Internet. ---------------------------------- CRESCENDO FORTE FEATURED IN KEYBOARD MAGAZINE'S NET SMARTS Are you hungry for more information on creating content for Crescendo Forte? Would you like to know what Dan Barrett, author of "net smarts" for Keyboard Magazine has to say about Crescendo Forte? Read the rave artice in the October issue of Keyboard magazine, where Dan Barrett says, "It's so satisfying to encounter a product that just plain works" and "The pre-beta version of Crescendo Forte installed easily on my PC and ran transparently inside of RealPlayer G2, keeping the audio and MIDI streams (to my ears) in perfect sync. It's definitely worth a look." Get it at your local newsstand, or check out Keyboard Magazine online at http://www.keyboardmag.com. ---------------------------------- RE-ENABLING CRESCENDO AFTER INSTALLING OTHER PLUGINS Probably the most common question our on-line helpdesk (helpdesk at liveupdate.com) looks something this: "I have been using Crescendo to play MIDI on-line for over two years now, and I love it. I just installed QuickTime to play a movie, but now when I go to a web site that has MIDI, Crescendo doesn't load any more. I want my Crescendo back!" If this looks familiar to you, we have good news - you can have your QuickTime and Crescendo too! Netscape decides which plugin will be used for a given media type based on their position on your Netscape/program/plugins directory. If you go to the Help/About Plugins from the Navigator window, you will probably see "LiveUpdate Crescendo" listed, but one or more of the MIME types listed there will most likely be listed as disabled. To cure this problem, we have created a page which outlines how to re-arrange your plugins directory so that Crescendo will be enabled for all MIDI MIME types, while co-existing with other plugins such as QuickTime. Surf to http://www.liveupdate.com/atlashelp.html for more details! ---------------------------------- CONTROLLING CRESCENDO USING JAVASCRIPT Are you a JavaScript programmer? Would you like to see how Crescendo can be controlled using JavaScript? We have created a page that demonstrates Crescendo being controlled by JavaScript methods and standard HTML buttons. See it in action at http://www.liveupdate.com/wiretest.html. To look "under the hood," just view the page's source to see how simple it is to control Crescendo through JavaScript. ---------------------------------- WHAT WOULD YOU LIKE TO SEE IN FUTURE VERSIONS OF CRESCENDO? We are still looking for new ideas to be included in future versions of the Crescendo player. If you have any cool features you would like to see added to Crescendo, send them to feedback at liveupdate.com. Who knows - maybe your suggestion will makes its way into the next version of Crescendo! ---------------------------------- SUBSCRIBING / UNSUBSCRIBING Note: Messages from LiveUpdate to this list will not be sent any more frequently than once a month, and your information has not, and will not, be given to others or sold. If you wish to unsubscribe from this list, or if this message has been forwarded to you by a friend and you would like to subscribe to our newsletter, please send a message to newsletter at liveupdate.com. ******************************************* Spread the Music! From joswald at rpkusa.com Mon Sep 14 04:31:09 1998 From: joswald at rpkusa.com (Jack Oswald / CEO / RPK Security) Date: Mon, 14 Sep 1998 04:31:09 -0700 (PDT) Subject: ANNOUNCEMENT: RPK InvisiMail NOW DISTRIBUTED THROUGH ONLINE RESELLERS Message-ID: <199809141123.EAA22441@proxy3.ba.best.com> You have received this message because at some time in the past your name was submitted to our e-mail mailing list database. If you do not wish (or no longer wish) to receive announcements, updates and news concerning the RPK Encryptonite Engine or the RPK InvisiMail e-mail security products, please forward this message to remove at rpkusa.com ---------------------------------------------------------------------------------------------- FOR IMMEDIATE RELEASE CONTACT Paula Miller Lyn Oswald Nadel Phelan, Inc. RPK Security, Inc. 408-439-5570 x277 212-488-9891 paulam at nadelphelan.com lynoswald at rpkusa.com RPK InvisiMail NOW DISTRIBUTED THROUGH ONLINE RESELLERS Alexa Internet, Parsons Technology and Buyonet International Partner with InvisiMail International Ltd. SAN FRANCISCO, CA. August 31, 1998 - InvisiMail International Ltd., a specialist in Internet commerce and communications systems, announced today the completion of joint marketing agreements with Alexa Internet, Parsons Technology Inc. and Buyonet International for the RPK InvisiMail e-mail security software product. RPK InvisiMail is a standards-based e-mail security add-in for POP3/SMTP Internet e-mail software and Internet gateway servers. RPK InvisiMail is completely transparent, allowing users to easily send and receive private e-mail messages securely over the Internet, without having to learn about cryptography. RPK InvisiMail was developed using RPK Security Inc.'s core technology, the RPK Encryptonite Engine. Alexa, a free Web navigation service, Parsons Technology, a catalog marketer of high quality computing solutions, and Buyonet International, an online software reseller with sales in more than 110 countries, will market and resell RPK InvisiMail products to customers through multiple distribution channels. Alexa's core marketing efforts for InvisiMail include advertising InvisiMail through banner ads and e-mail announcements to Alexa's customers. "We are delighted to have established a mutually profitable marketing partnership with RPK Security in support of InvisiMail," said Darian Patchin, director of media and distribution for Alexa Internet. "This partnership brings many benefits and is complementary to our Web navigation tool. RPK InvisiMail offers customers a flexible, easy to use and configurable secure e-mail add-in." more RPK InvisiMail PARTNERS WITH ONLINE RESELLERS PG. 2 OF 2 As part of the licensing deal with Parsons Technology, a Broderbund Company, InvisiMail will be branded to reflect the Parsons name. Parsons� RPK InvisiMail will be offered through Parsons Technology direct to consumers, with marketing efforts focusing on catalog exposure, electronic mailings, Parsons' website and other on-line channels. "Parsons Technology has always stood for high quality software at affordable prices. InvisiMail is no exception. We are excited to bring this level of protection and ease of use to our customers," said Brian Kristiansen of Parsons Technology. Buyonet will distribute RPK InvisiMail Intro on the freeware/shareware portion of their online store and will sell RPK InvisiMail Deluxe online. "This new agreement gives us an even larger assortment of e-mail tools," said Buyonet Chairman Tore Helgeson. ABOUT InvisiMail INTERNATIONAL LTD. InvisiMail International Ltd., founded in 1997, specializes in secure Internet commerce and communications solutions for a wide range of applications. An adherence to open communication standards, using a distinctive Proxy Architecture, makes the InvisiMail International approach to security the most flexible available. Developed using RPK Security, Inc.'s core technology, the RPK Encryptonite Engine, the InvisiMail range of products supports secure message-based applications including Client Services, E-Commerce, EDI and others that require absolute confidentiality and the highest security levels. This allows the simplest e-mail systems to become the most powerful business and commerce tools. Contact InvisiMail at www.InvisiMail.com or call +44 1624 611 003. ABOUT RPK SECURITY Founded in 1995, RPK Security, Inc. is a technology leader in fast public key cryptography. Its flagship RPK Encryptonite Engine, a uniquely fast and strong public key encryption technology, is available worldwide in custom hardware and software toolkits on multiple platforms. Developed from widely accepted security mathematics and techniques, the RPK Encryptonite Engine is easily embedded into new and existing hardware and software applications. RPK's cryptographic research and product development is based in New Zealand, Switzerland and the U.K, with worldwide sales and marketing operations in San Francisco, CA. Visit RPK's website at www.rpkusa.com or call (212) 488-9891. From demona at demona.doldrums.dyn.ml.org Sun Sep 13 14:25:42 1998 From: demona at demona.doldrums.dyn.ml.org (the scent of old bones and fresh blood) Date: Mon, 14 Sep 1998 05:25:42 +0800 Subject: 023026.htm Message-ID: <199809140625.CAA00774@demona.doldrums.dyn.ml.org> [1]That's Racin' [INLINE] [2]Mercury Center [3][ISMAP]-[4]This image allows you to access site resources [INLINE] [5]Register for free e-mail Dispatches Sections [INLINE] [6]News [INLINE] [7]Business & Stocks [INLINE] [8]Technology [INLINE] [9]Sports [INLINE] [10]Opinion [INLINE] [11]Living & Comics [INLINE] [12]Weather Classifieds & Services [INLINE] [13]Jobs: Talent Scout [INLINE] [14]Homes: HomeHunter [INLINE] [15]Cars: CarHunter [INLINE] [16]Entertainment: Just Go [INLINE] [17]Yellow Pages [INLINE] [18]Mercury News Classifieds [INLINE] [19]Archives: NewsLibrary [INLINE] [20]News agent: NewsHound [INLINE] [21]Membership: Passport Related Features [INLINE] [22]Business Home [INLINE] [23]Business Today [INLINE] [24]Tech Wire [INLINE] [25]Mercury News Business [INLINE] [26]Apple Watch [INLINE] [27]Asia Tech Update [INLINE] [28]Breaking News [INLINE] [29]Computing [INLINE] [30]Getting Ahead [INLINE] [31]GMSV [INLINE] [32]HomeHunter [INLINE] [33]Intel Watch [INLINE] [34]Microsoft Watch [INLINE] [35]Money Tree [INLINE] [36]Silicon Valley 150 [INLINE] [37]Mortgage Watch [INLINE] [38]Motley Fool [INLINE] [39]Stocks [INLINE] [40]Talent Scout [INLINE] [41]Greg Carpluk [INLINE] [42]Dan Gillmor [INLINE] [43]Adam Lashinsky [INLINE] [44]Chris Nolan [INLINE] [45]Cheryl Shavers [INLINE] [INLINE] [46]Contact Us [INLINE] [47]About this page [INLINE] [INLINE] Posted at 12:54 a.m. PDT Sunday, September 13, 1998 Net Security Takes Key Step BY JAMES J. MITCHELL Mercury News Staff Writer TriStrata Security Inc. of Redwood Shores isn't your usual Internet start-up. Its chief executive recently gave up the reins of a $2 billion subsidiary to run it. The company's founder and chairman is the man who invented the personal identification number (PIN). America's largest accounting firm is already endorsing it. And its promise lured some of the best-connected executives onto its board. Three months ago, Paul Wahl was running German software maker SAP AG's U.S. operations, which has 5,000 employees and first-half 1998 sales of nearly $1 billion. Last week he became chief executive of TriStrata, a 35-person start-up that makes Internet security software. The reason for Wahl's sudden career change and move from Philadelphia is a tremendous opportunity . . .to make Internet history by changing the way the world keeps information secure on the Internet, says Wahl, 46. That same dream brought John Atalla out of retirement in 1993 to form TriStrata. Atalla, now 74, decades ago created the PIN system and the security used today in 80 percent of the world's automatic-teller machines. He was enjoying the beaches of the world when friends in the banking industry asked him to work on the problem of Internet security. Both men believe TriStrata's software -- which works efficiently with voice and video as well as with data -- will revolutionize electronic commerce, enabling companies to create virtual private networks and permitting, for example, the secure and inexpensive sale of software, music and videos over the Internet. Some outside observers agree. PricewaterhouseCoopers LLP, which is the largest of the Big Five accounting firms and has 2,200 employees devoted to Internet security, believes this could be the de facto standard for encryption technology, says Jim Coriston, a PWC managing partner. TriStrata software is being implemented throughout the firm, which is also offering the product to its clients. It's a whole different approach to cryptography, says Larry Dietz, director of information security and legal strategies for Current Analysis, a market research firm. Its key principles make a lot of sense. But some critics question whether TriStrata's product is as secure as the company claims. And the company faces tough competition from established security companies such as Network Associates Inc. of Santa Clara and Secure Computing Corp. of San Jose, as well as from computer vendors like IBM and Hewlett-Packard Co., which include security in their products. Atalla rejected the traditional approach for enterprise security using public key encryption, a system that uses two keys, both controlled by the user: a private key, which must be kept secret, and a public key, which can be freely distributed. Such systems can be broken, have performance limitations and have restrictions on the strength of the key that can be exported. Instead, he turned to the one-time pad approach invented in 1917 by Gilbert Vernam. It uses randomly generated numbers that are never replicated in the exact same sequence. The one-time pad is theoretically unbreakable, cryptographers agree. But it hasn't been useful because it requires so much computing and telecommunications power. Atalla decided that the great advances in computer memory and processing technology and today's powerful and relatively inexpensive communications capability made the Vernam cipher practical, and he built his security system around it. As a result, each encrypted document has a different code. The system is so fast, so inexpensive and provides such a good audit trail that it will lead companies to make encrypted transmissions the rule instead of the exception, Atalla and Wahl say. The federal government, including the National Security Agency and the FBI, has cleared it for export because the system allows access to specific documents for which an appropriate court order has been issued. The company expects the product to be received warmly overseas, since the U.S. government cannot decode information at will. But it's unclear whether this feature will diminish foreign concerns about U.S. security products. Skeptics wonder whether the company has created a sufficiently large string of random numbers to approximate randomness, Dietz says. And TriStrata's approach is so different it won't be an easy sell. It requires companies to transform their security systems, a decision likely to be made by the chief executive and chief information officers, Dietz says, not the people who normally purchase security software. Here the many contacts of Atalla, Wahl and TriStrata's directors should prove useful. Atalla is well known in the high-tech community. At Bell Laboratories his research resulted in his patents for the metal oxide semiconductor (MOS), a key component of modern electronic devices. Then he co-founded Hewlett-Packard Associates and Hewlett-Packard Laboratories and directed the company's solid-state division. He founded Atalla Corp. in 1973 and sold it to Tandem Computers Inc. in 1987. Atalla was able to attract to TriStrata a star-studded board that includes John Young, former chief executive of HP; Tom Perkins, partner in the venture capital firm of Kleiner Perkins Caufield & Byers; and William Zuendt, retired president of Wells Fargo & Co. and former chairman of MasterCard. The company released its first product last November. As it prepared to move from R&D to large-scale sales, it added as a director David Beirne, a general partner of venture capital firm Benchmark Capital. Beirne, who had made his mark as one of the most successful executive recruiters before joining Benchmark last year, approached Wahl about the CEO job two months ago. Wahl, quite content at SAP, was negotiating a move back to Europe with the company when Beirne called and persuaded him to fly here to take a look at TriStrata. After a second quick visit, Wahl and his wife decided to come west. TriStrata is unlikely to become a huge employer; Wahl expects the workforce to perhaps double to 70 in the next year or two and reach 200 over five years. But it's impact on the Internet could be quite dramatic. And Wahl found that attraction irresistible. _________________________________________________________________ Write James J. Mitchell at the Mercury News, 750 Ridder Park Drive, San Jose, Calif. 95190; phone (408) 920-5544; fax (408) 920-5917; or e-mail to [48]JMitchell at sjmercury.com . [INLINE] [INLINE] [49]Return to top [50][ISMAP]-[51]This image allows you to access site resources [INLINE] [52]That's Racin' �1997 - 1998 Mercury Center. The information you receive online from Mercury Center is protected by the copyright laws of the United States. The copyright laws prohibit any copying, redistributing, retransmitting, or repurposing of any copyright-protected material. References 1. http://www.mercurycenter.com/event.ng/Type=click&ProfileID=442&RunID=1618&AdID=1530&GroupID=1&FamilyID=1&TagValues=154.197.298.414&Redirect=http:%2F%2Fwww.thatsracin.com 2. http://www.mercurycenter.com/ 3. http://www.mercurycenter.com/graphics/toolbar.map 4. LYNXIMGMAP:http://www.mercurycenter.com/business/top/023026.htm#toolbar 5. http://www.passport.realcities.com/osform/AuthenticateService?osform_template=/sjm/frame.oft&content=benefits.html&final_template= 6. http://www.mercurycenter.com/front/ 7. http://www.mercurycenter.com/business/ 8. http://www.mercurycenter.com/gmsv/ 9. http://www.mercurycenter.com/sports/ 10. http://www.mercurycenter.com/opinion/ 11. http://www.mercurycenter.com/svlife/ 12. http://www.mercurycenter.com/weather/ 13. http://www.talentscout.com/ 14. http://www.homehunter.com/siliconvalley/ 15. http://enterprise.sjmercury.com/products/carhunter/ 16. http://www.justgo.com/bayarea/ 17. http://www.zip2.com/bayarea/ 18. http://classifieds.sjmercury.com/classifieds/indexnojava.html 19. http://www.mercurycenter.com/resources/search/search_archive.shtml 20. http://www.newshound.com/ 21. http://www.passport.realcities.com/osform/AuthenticateService?osform_template=/sjm/frame.oft&content=benefits.html&final_template= 22. http://www.mercurycenter.com/business/ 23. http://www.mercurycenter.com/today/today_business.shtml 24. http://www.mercurycenter.com/business/tech/ 25. http://www.mercurycenter.com/business/business_section.shtml 26. http://www.mercurycenter.com/business/apple/ 27. http://www.mercurycenter.com/business/asia/ 28. http://www.mercurycenter.com/breaking/ 29. http://www.mercurycenter.com/compute/ 30. http://www.mercurycenter.com/business/business_getahead.shtml 31. http://www.mercurycenter.com/gmsv/ 32. http://www.mercurycenter.com/realestate/ 33. http://www.mercurycenter.com/business/intel/ 34. http://www.mercurycenter.com/business/microsoft/ 35. http://www.mercurycenter.com/business/moneytree/ 36. http://www.mercurycenter.com/business/sv15098/150home.htm 37. http://www.mercurycenter.com/realestate/mortgage/ 38. http://www.mercurycenter.com/stocks/motleyfool/ 39. http://www.mercurycenter.com/stocks/ 40. http://www.mercurycenter.com/talentscout/ 41. http://www.mercurycenter.com/columnists/carpluk/ 42. http://www.mercurycenter.com/columnists/gillmor/ 43. http://www.mercurycenter.com/columnists/lashinsky/ 44. http://www.mercurycenter.com/columnists/nolan/ 45. http://www.mercurycenter.com/columnists/shavers/ 46. http://www.mercurycenter.com/business/business_feedback.shtml 47. http://www.mercurycenter.com/business/business_help.shtml 48. mailto:JMitchell at sjmercury.com 49. http://www.mercurycenter.com/business/top/023026.htm#backtotop 50. http://www.mercurycenter.com/graphics/toolbar.map 51. LYNXIMGMAP:http://www.mercurycenter.com/business/top/023026.htm#toolbar 52. http://www.mercurycenter.com/event.ng/Type=click&ProfileID=442&RunID=1618&AdID=1530&GroupID=1&FamilyID=1&TagValues=154.197.298.414&Redirect=http:%2F%2Fwww.thatsracin.com From nobody at sind.hyperreal.art.pl Sun Sep 13 15:23:58 1998 From: nobody at sind.hyperreal.art.pl (HyperReal-Anon) Date: Mon, 14 Sep 1998 06:23:58 +0800 Subject: Remailers Message-ID: <3472f166e843de1880a781de2ecd3050@anonymous> On nnburk wrote: >Are _any_ of the remailers working? Take a look at the remailer stats. http://anon.efga.org/~rlist/rlist.html http://anon.efga.org/~rlist/mlist.html Kinda obvious really huh? -+DiGiTaL+- Greets to AOHell 3l33T HaCkerz - the badest dudes ever! (yeah, they probably have root on your machine now!) From sorens at workmail.com Sun Sep 13 15:50:28 1998 From: sorens at workmail.com (Soren) Date: Mon, 14 Sep 1998 06:50:28 +0800 Subject: MISTY encryption algorithm source code In-Reply-To: <19980913230004.14914.qmail@nym.alias.net> Message-ID: <35FD02A6.6473F7D0@workmail.com> � lcs Mixmaster Remailer wrote: Nobuki Nakatuji wrote: > MISTY source code posted by me at long ago had many mistake. > Attachment file are revised MISTY source code and revised readme. > Thanks. > > > ______________________________________________________ > Get Your Private, Free Email at http://www.hotmail.com BRAIN used by you always since at long ago have many insect. Attachment brain not here because was exhausted in decypher you message. You go back at Hotmail now and stop spam Cypherpunks list. Chop chop. And of course we know that this list should be the exclusive province of white-boys-who-speak-american-english.� Give us all a laugh, and attempt saying that in Japanese.� BTW, get the culture for your cultural slurs correct.� The etymology of chop chop is Shanghai, late 19th century.� A chop is an engraved ideogram representing a non-forgeable signature - sort of a smartcard.� Hence chop chop, translates as "sign on the dotted line and get on with the deal". Taking this a little further, chopsticks are so-called because they usually bear the 'chop' of the eating house from whence you stole them.� Needless to say, the chinese don't call them that. This is akin to messages to you, being in spanish because your neighbors to the south speak it.� I suspect Nakatuji-san is entirely 'misty'fied by your random cultural references. Unless you haven't realized, the internet actually exists outside of the Union of Shortsighted Assholes.� Perhaps you'd be happier returning to your nakama on Assholes On-Line?�� Here's a self-study course, on asian anatomical and cultural differences, for your perusal. "Educate, don't agitate" � From dejanews at list.emailpub.com Mon Sep 14 07:16:15 1998 From: dejanews at list.emailpub.com (Deja News Members) Date: Mon, 14 Sep 1998 07:16:15 -0700 (PDT) Subject: What's New at Deja News Message-ID: <19980914081041.000172@mulder.emailpub.com> ____________________________________________________________ WHAT'S NEW AT DEJA NEWS! 09/14/1998 ____________________________________________________________ Greetings from Deja News! This monthly newsletter is exclusively for registered Deja News members. It's designed to let you know about new products and services available on the Deja News site, so that you can get the most from your Deja News membership. We'll be sending this newsletter to your mailbox once per month as long as you want us to keep sending it. (Unsubscribe instructions are at the bottom of this email in the MANAGE YOUR SUBSCRIPTION section.) ____________________________________________________________ If a longer URL below appears broken, please manually cut and paste the link into your browser. NEW THIS MONTH ON DEJA NEWS NEW CHANNELS. Stunned by the wealth of 50,000+ discussion forums and wondering how to get to them? Head for Deja News' home page and jump into our new channels. We've organized thousands of the best discussion forums into an easy-to-browse directory, so you can find just what you're looking for in a few clicks. Start exploring now at: http://www.dejanews.com/%5Bst_cam=none.none.none.email0914chan%5D/ ____________________________________________________________ MEMBER FORUMS. Can't find a discussion forum on your favorite topic? Then make your own! Start a free discussion forum on Deja News today for your small business, community organization, family, or your favorite special interest. It takes less than five minutes and it's free! Create one now at: http://www.dejanews.com/%5Bst_cam=none.none.none.email0914memf%5D/rg_mkgrp.xp ____________________________________________________________ LANGUAGE SEGMENTATION. Habla Espanol? We've segmented our discussions so you can easily find them in any of 18 languages. Have it your way at: http://www.dejanews.com/%5Bst_cam=none.none.none.email0914lang%5D/home_ps.shtml ____________________________________________________________ AUTO SIGNATURE. Use My Deja News to keep up with your favorite groups and post messages? We've added an auto signature capability so you can automatically append a personal trailer to each message you post. Customize yours at: http://www.dejanews.com/%5Bst_cam=none.none.none.email0914sig%5D/rg_edit_post.xp ____________________________________________________________ MANAGE YOUR SUBSCRIPTION: To subscribe to or unsubscribe from this newsletter, please visit: http://www.dejanews.com/%5Bst_cam=none.none.none.email0914sub%5D/rg_edit_personal.xp and update the Deja News Email option. Note: You must be logged in to change your status. QUESTIONS? Email us at newsletter at dejanews.com. This newsletter is a free service of Deja News. Copyright 1998 Deja News, Inc. All rights reserved. ------------------------------------------------------------- Distributed by Email Publishing Inc. - http://www.emailpub.com From ravage at EINSTEIN.ssz.com Sun Sep 13 16:28:12 1998 From: ravage at EINSTEIN.ssz.com (Jim Choate) Date: Mon, 14 Sep 1998 07:28:12 +0800 Subject: McDougal denied medical aid prior to death [CNN] (fwd) Message-ID: <199809141249.HAA24512@einstein.ssz.com> Forwarded message: >From ravage at ssz.com Mon Sep 14 07:49:25 1998 From: Jim Choate Message-Id: <199809141249.HAA24500 at einstein.ssz.com> Subject: McDougal denied medical aid prior to death [CNN] To: users at ssz.com (SSZ User Mail List) Date: Mon, 14 Sep 1998 07:49:23 -0500 (CDT) Cc: friends at ssz.com (Ravage's Friends) X-Mailer: ELM [version 2.4 PL23] Content-Type: text Content-Length: 2034 Forwarded message: > X-within-URL: http://www.cnn.com/US/9809/14/mcdougal.report.ap/ > McDougal September 14, 1998 > Web posted at: 2:21 a.m. EDT (0621 GMT) > > FORT WORTH, Texas (AP) -- Whitewater witness James McDougal did not > have access to his heart medication in the hours before he died in > prison, a federal government report revealed. > > McDougal, a former business partner of President Clinton who later > agreed to testify for Independent Counsel Ken Starr, also was not seen > by a doctor although he complained of feeling ill the day before his > death, according to a report obtained by the Fort Worth Star-Telegram > under the Freedom of Information Act. > > McDougal was moved from his regular cell to solitary confinement at > the Federal Medical Center prison in Fort Worth a day before his death > as punishment for failing to provide a urine sample for a drug test. > > McDougal had complained of being unable to provide urine for drug > tests because of the medications he took for a variety of ailments. > > During the move, guards did not find McDougal's heart medication > because they did not want to search McDougal's regular cell and > disturb his sleeping cell mate, the report said. > > One of the medicines, nitroglycerin, could have bought McDougal some > time after he suffered a heart attack, a prison official who asked not > to be identified said in the Sunday paper. [text deleted] ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From declan at well.com Sun Sep 13 17:34:48 1998 From: declan at well.com (Declan McCullagh) Date: Mon, 14 Sep 1998 08:34:48 +0800 Subject: Clinton--Why I am Chortling In-Reply-To: <3.0.5.32.19980914032054.007d3b40@pop.mhv.net> Message-ID: Careful with your attributions. I don't believe Tim wrote what you said he did. As for Monica-Clinton, what appears to be the case doesn't matter in some ideologies. Can meaningful consent be given with such a power imbalance? -Declan On Mon, 14 Sep 1998, Lynne L. Harrison wrote: > > On Sat, 12 Sep 1998, Tim May wrote: > > > > There's also the idea popular in some gender feminist circles that the > > imbalance of power in manager-employee relationships makes it impossible > > for genuine consent to be given. Can there be any greater power imbalance > > than the president of the United States and an intern? Where are the > > feminist cries of outrage? > > Could be because, at least from what I read in the report and from other > sources, Monica came onto Clinton. One could make the argument that the > imbalance of power was the other way around ;) > > On another note, instead of the report, it may be extremely more > interesting to read: > http://www.reagan.com/HotTopics.main/document-9.1.1998.1.html > > I can't vouch for the veracity of all of those listed. Of those > individuals, however, with whom I am familiar by way of the media, it is > accurate - and eerie, to say the least. > > > > > > *************************************************************************** > Lynne L. Harrison, Esq. | "If we are all here, > Poughkeepsie, New York | then we are not > mailto:lharrison at dueprocess.com | all there." > http://www.dueprocess.com | - old Zen saying > ************************************************************************* > > DISCLAIMER: I am not your attorney; you are not my client. > Accordingly, the above is *NOT* legal advice. > > > > > > From tcmay at got.net Sun Sep 13 18:30:36 1998 From: tcmay at got.net (Tim May) Date: Mon, 14 Sep 1998 09:30:36 +0800 Subject: Clinton--Why I am Chortling In-Reply-To: <3.0.5.32.19980914032054.007d3b40@pop.mhv.net> Message-ID: At 12:20 AM -0700 9/14/98, Lynne L. Harrison wrote: >> On Sat, 12 Sep 1998, Tim May wrote: >> >> There's also the idea popular in some gender feminist circles that the >> imbalance of power in manager-employee relationships makes it impossible >> for genuine consent to be given. Can there be any greater power imbalance >> than the president of the United States and an intern? Where are the >> feminist cries of outrage? > Just to be clear, I didn't write any of the above that was attributed to me. Declan wrote it. I don't even know what a "gender feminist" is. Some kind of typical feminazi or feminista screwball, I assume. --Tim May (This space left blank pending determ. of acceptability to the gov't.) ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, ComSec 3DES: 831-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Licensed Ontologist | black markets, collapse of governments. From mok-kong.shen at stud.uni-muenchen.de Sun Sep 13 18:35:21 1998 From: mok-kong.shen at stud.uni-muenchen.de (Mok-Kong Shen) Date: Mon, 14 Sep 1998 09:35:21 +0800 Subject: IP: [Fwd: new threat to privacy] In-Reply-To: Message-ID: <35FD2950.98C77B4D@stud.uni-muenchen.de> Robert Hettinga wrote: > > Investigators need only know your e-mail address to secretly > install the program. Once they do, investigators can read your > documents, view your images, download your files and intercept > your encryption keys. DIRT was developed to assist law > enforcement in pedophilia investigations, but future uses could > include drug investigations, money laundering cases and > information warfare. Does downloading of files includes files without public read permit? From petro at playboy.com Sun Sep 13 19:15:15 1998 From: petro at playboy.com (Petro) Date: Mon, 14 Sep 1998 10:15:15 +0800 Subject: Clinton's fake apologies In-Reply-To: <199809121549.IAA28683@zendia.mentat.com> Message-ID: At 10:49 AM -0500 9/12/98, Jim Gillogly wrote: >Declan wrote: >> On Fri, 11 Sep 1998, Jim Gillogly wrote: >> > >> > If they decide this is now a requirement for high office, I'd like >> > to see all the Congresscritters who've had sex out of wedlock and >> > concealed it take one step forward. Shall we make hypocrisy in high >> > office impeachable also? >> >> A better question is: If Clinton is guilty of perjury and other felonies, >> should he be impeached? > >IANAL (feel free to weigh in here, Unicorn), but I heard on one show or >another that lying under oath is perjury only if it's material to the >suit. Since the Jones case was dismissed, it was argued that even if he >lied then, it wasn't material and thus wasn't perjury -- they claimed that >nobody had every been convicted of perjury for lying in a case that was >dismissed. Of course he's saying he didn't even lie: like Kinky Friedman Whether anyone was convicted or not, he still LIED UNDER OATH (Allegedly, allegedly allegedly). It doesn't matter whether the case was dismissed or not. >In any case, despite these legalisms, I'm not convinced that perjury in >any case should be considered treason or high crimes and misdemeanors. He VIOLATED HIS OATH OF OFFICE. >The Founding Fathers could have been more specific about what was >impeachable, and they chose not to be, leaving it intentionally ambiguous. > >Despite those arguments, this stuff really isn't about perjury: it's about >the Republicans' case of nixon envy... Clinton's peccadillos are a far cry >from Watergate (or Teapot Dome or Iran-Contra), but it's the best chance >they've had since the Crook was dumped. Yeah, Nixon only worked to conceal the actions of others, attempting to protect himself, and the people who worked for him. He did this concerning a crime he did not know was going to be committed. Clinton on the other hand LIED UNDER OATH about something HE DID, lied to PROTECT HIMSELF, and ONLY HIMSELF. At least Nixon worried about more than his historical legacy, and his wee-willy. >> If you don't think about lying about sex and related issues under oath >> should be a crime, well, then change the law. But right now any form of >> lying under oath is perjury, whether you like it or not. >If he did commit perjury, would that be an impeachable offense? I claim >it's up to the House to interpret just what constitutes high crimes and >misdemeanors, since it isn't spelled out in the Constitution. > >Disclaimer -- I'm not a Democrat, and I'm annoyed with Clinton's behavior >on crypto issues. If I appear to be defending him, it's inadvertant -- I >just feel he should be attacked on material points rather than whatever >sleazy stuff Starr has found under his rocks. As it's been said before, if he'll lie UNDER OATH about this, what about other things? -- petro at playboy.com----for work related issues. I don't speak for Playboy. petro at bounty.org-----for everthing else. They wouldn't like that. They REALLY Economic speech IS political speech. wouldn't like that. From xasper8d at lobo.net Sun Sep 13 19:28:16 1998 From: xasper8d at lobo.net (X) Date: Mon, 14 Sep 1998 10:28:16 +0800 Subject: Clinton's fake apologies In-Reply-To: Message-ID: <000101bddff3$d5e14840$9f2580d0@ibm> What chance is there that the Paula Jones case was dismissed BECAUSE Wild Bill lied under oath? Remember OJ? X -----Original Message----- From: owner-cypherpunks at minder.net [mailto:owner-cypherpunks at minder.net] On Behalf Of Petro Sent: Monday, September 14, 1998 9:03 AM To: Jim Gillogly; declan at well.com Cc: cypherpunks at cyberpass.net Subject: Re: Clinton's fake apologies At 10:49 AM -0500 9/12/98, Jim Gillogly wrote: >IANAL (feel free to weigh in here, Unicorn), but I heard on one show or >another that lying under oath is perjury only if it's material to the >suit. Since the Jones case was dismissed, it was argued that even if he >lied then, it wasn't material and thus wasn't perjury -- they claimed that >nobody had every been convicted of perjury for lying in a case that was >dismissed. From sunder at brainlink.com Sun Sep 13 19:59:32 1998 From: sunder at brainlink.com (Ray Arachelian) Date: Mon, 14 Sep 1998 10:59:32 +0800 Subject: IP: Impeachment Petition -- NOT! In-Reply-To: <199809140329.UAA27182@netcom13.netcom.com> Message-ID: <35FD3C3C.EC8102E6@brainlink.com> So much for this being a working thing: Anyone else get a bounce? Date: Mon, 14 Sep 1998 11:20:14 -0400 From: System Administrator To: sunder at sundernet.com Subject: Undeliverable: Impeach Clinton Now! Your message did not reach some or all of the intended recipients. To: tmanton at mail.house.gov Subject: Impeach Clinton Now! Sent: 9/14/98 11:20:14 AM The following recipient(s) could not be reached: tmanton at mail.house.gov on 9/14/98 11:20:14 AM Recipient Not Found MSEXCH:IMC:U.S. House of Representatives:U.S. House:MSG05 Vladimir Z. Nuri wrote: > > From: vols-fan at juno.com (Football Fan) > Subject: IP: Impeachment Petition > Date: Sat, 12 Sep 1998 22:59:15 -0500 > To: baldmccoy at prodigy.net, PiercedEar at juno.com, TTMCCOY at juno.com, psm127_dad at mailcity.com, phmitch at mindspring.com, stringtickler at hotmail.com, Jimjean5013 at juno.com, laney at arkansas.net, JESSICA.HARDAGE at charleston.af.mil, teyze-barbi at juno.com, rjohnson at bstream.com, iarthuriarthur at juno.com, w-t-14 at juno.com, Bripowell at nidlink.com, supertrician at juno.com, barsotti at bstream.com > > http://congress.nw.dc.us/impeach/petition.html > > ********************************************** > To subscribe or unsubscribe, email: > majordomo at majordomo.pobox.com > with the message: > (un)subscribe ignition-point email at address > ********************************************** > www.telepath.com/believer > ********************************************** -- =====================================Kaos=Keraunos=Kybernetos============== .+.^.+.| Ray Arachelian |Prying open my 3rd eye. So good to see |./|\. ..\|/..|sunder at sundernet.com|you once again. I thought you were |/\|/\ <--*-->| ------------------ |hiding, and you thought that I had run |\/|\/ ../|\..| "A toast to Odin, |away chasing the tail of dogma. I opened|.\|/. .+.v.+.|God of screwdrivers"|my eye and there we were.... |..... ======================= http://www.sundernet.com ========================== From mmotyka at lsil.com Sun Sep 13 20:05:35 1998 From: mmotyka at lsil.com (Michael Motyka) Date: Mon, 14 Sep 1998 11:05:35 +0800 Subject: Clinton's fake apologies In-Reply-To: <199809120319.UAA20709@leroy.fbn.bc.ca> Message-ID: <35FD3C1F.514C@lsil.com> >If the game looks too rough who do you blame? > Nice point. > I see the whole OIC crusade against Clinton as an attempt to bring > honesty to government. Ken Starr is just playing the game by the > rules set out be the Clintons. > But I guess I can't quite buy into it because I see no first order differences between the Republocrats and the Demicans. The whole thing looks to me like a redefinition of the rules of engagement in the same old power struggle. Hardly Control vs. Kaos. Mike From lharrison at dueprocess.com Sun Sep 13 20:22:48 1998 From: lharrison at dueprocess.com (Lynne L. Harrison) Date: Mon, 14 Sep 1998 11:22:48 +0800 Subject: Clinton--Why I am Chortling In-Reply-To: <3.0.5.32.19980914032054.007d3b40@pop.mhv.net> Message-ID: <3.0.5.32.19980914122452.0086a750@pop.mhv.net> At 06:32 AM 9/14/98 -0700, Declan McCullagh wrote: >Careful with your attributions. I don't believe Tim wrote what you said he >did. And at 07:31 AM 9/14/98 -0700, Tim May wrote: >Just to be clear, I didn't write any of the above that was attributed to >me. Declan wrote it. >I don't even know what a "gender feminist" is. Some kind of typical >feminazi or feminista screwball, I assume. My mistake. Sometimes when you're reading a post that's been re-quoted several times, it gets confusing as to who posted what. >As for Monica-Clinton, what appears to be the case doesn't matter in some >ideologies. Can meaningful consent be given with such a power imbalance? >-Declan I don't see a power imbalance here. If a young woman in her 20's invitingly flashes her thong panties at a man, I don't see how she can be portrayed as the victim. The only way that the issue of power arises is that Monica was not overwhelmed by someone in power - she was attracted to the power. On another but connected note, explain why Monica saved that dress! I found this little tidbit to be the "yuck" factor... *********************************************************** Lynne L. Harrison, Esq. | "The key to life: Poughkeepsie, New York | - Get up; mailto:lharrison at dueprocess.com | - Survive; http://www.dueprocess.com | - Go to bed." *********************************************************** DISCLAIMER: I am not your attorney; you are not my client. Accordingly, the above is *NOT* legal advice. From harald.fragner at idg.se Sun Sep 13 21:02:16 1998 From: harald.fragner at idg.se (harald.fragner at idg.se) Date: Mon, 14 Sep 1998 12:02:16 +0800 Subject: Hi! Message-ID: Do I know you? Harald ------------------ Harald Fragner IT-avdelningen, IDG Tel: 08-453 60 10 Fax: 08-453 60 05 Email: harald.fragner at idg.se From nobody at replay.com Sun Sep 13 21:06:29 1998 From: nobody at replay.com (Anonymous) Date: Mon, 14 Sep 1998 12:06:29 +0800 Subject: No Subject Message-ID: <199809141658.SAA03123@replay.com> I think a more appropriate question might be who we aren't. Believe me, you'll have an acute understanding of who we are soon enough. MUWAHAHAHAHA! Was that sinister enough? At 06:27 PM 9/13/98 -0700, Well now I am a Mommy! wrote: >hi, > >I see you added me as a friend..... just wondering who you are. :) > >Christy > >______________________________________________________ >Get Your Private, Free Email at http://www.hotmail.com > From rah at shipwright.com Sun Sep 13 21:12:15 1998 From: rah at shipwright.com (Robert Hettinga) Date: Mon, 14 Sep 1998 12:12:15 +0800 Subject: All Fall Down... Message-ID: --- begin forwarded text Delivered-To: ignition-point at majordomo.pobox.com X-Sender: believer at telepath.com Date: Mon, 14 Sep 1998 09:40:16 -0500 To: believer at telepath.com From: believer at telepath.com Subject: IP: Whitewater Probe Continues Mime-Version: 1.0 Sender: owner-ignition-point at majordomo.pobox.com Precedence: list Reply-To: believer at telepath.com Source: Washington Times http://www.WashTimes.com/news/news2.html#link Starr continues Whitewater investigation By Jerry Seper THE WASHINGTON TIMES Kenneth W. Starr's case for impeaching President Clinton is only the first public accounting in a massive ongoing investigation --contrary to White House claims that the Whitewater probe is dead. "All phases of the investigation are now nearing completion," the 445-page report says. The independent counsel "will soon make final decisions about what steps to take, if any, with respect to the other information it has gathered." While it was Mr. Starr's "strong desire" to complete the entire Whitewater inquiry before giving any information to Congress, the report said, it "became apparent" there was "substantial and credible information" of impeachable offenses and he was required under the law to refer the information to Congress as soon as possible. "It also became apparent that a delay of this referral until the evidence from all phases of the investigation had been evaluated would be unwise," the report said. Mr. Starr will soon make decisions on final reports to a three-judge panel of the U.S. Circuit Court of Appeals for the D.C. Circuit and possible indictments, the report added. Mr. Clinton's personal attorney, David E. Kendall, attacked the Monica Lewinsky report this week as a "hit-and-run smear campaign," saying it was nothing but an attempt to damage the president with "irrelevant and unnecessary graphic and salacious allegations." He asked, "Where's Whitewater?" But the report's introduction notes that Mr. Starr's four-year Whitewater probe, all but forgotten in the crush of sordid public revelations of Mr. Clinton's sexual dalliances with the former White House intern, continues to target a number of areas: Legal representation of a failed Arkansas thrift, Madison Guaranty Savings and Loan Association, and a real estate project, Castle Grande, by first lady Hillary Rodham Clinton and former Rose Law Firm partner Webster L. Hubbell, the ex-associate attorney general who resigned in disgrace. The firing of seven White House travel office employees to make room for Clinton cronies, and the role Mrs. Clinton may have played in the decision. The delivery to the White House of more than 1,000 secret FBI files on Reagan and Bush administration aides, and efforts to shield White House officials, including Mrs. Clinton, from a public accounting on how the files were obtained and used. The misuse of personnel records of Pentagon employee Linda R. Tripp, whose secret recordings of conversations with Miss Lewinsky began the grand jury investigation. Possible perjury and obstruction of justice concerning an incident involving former White House volunteer Kathleen E. Willey. Mrs. Willey said in August 1997 that Mr. Clinton made sexual advances in the Oval Office in November 1993. The Starr report to Congress said Miss Lewinsky told the president Newsweek was working on an article about Mrs. Willey. Mr. Clinton dismissed the accusations as "ludicrous, because he would never approach a small-breasted woman like Mrs. Willey." Later he asked Miss Lewinsky if she had heard about the Newsweek inquiry from Mrs. Tripp, to which she replied "yes." The former intern said Mr. Clinton asked if Mrs. Tripp could be trusted and then told her to persuade Mrs. Tripp to call White House Deputy Counsel Bruce R. Lindsey about the matter. Newsweek published the Willey story on Aug. 11, 1997. In his Jan. 17 deposition in the Paula Jones case, Mr. Clinton denied the Willey accusation. The Starr probe also is looking into accusations that efforts were made to silence Mrs. Willey. Among those drawing attention is Democratic fund-raiser Nathan Landow. Investigators want to know if he urged Mrs. Willey to deny she was groped by the president. Mrs. Willey has since testified before the Lewinsky grand jury as a cooperating witness. Mr. Landow testified before the grand jury, later telling reporters he took the Fifth Amendment. His daughter, former White House volunteer Harolyn Cardozo, who worked with Mrs. Willey, also testified. In "Travelgate" and "Filegate," papers filed earlier this month in federal court in Washington show the investigations "are continuing and in extremely sensitive stages." Deputy independent counsel Robert Bittman told the court the probes had reached to the "highest level of the federal government" and involved "issues of singular constitutional and historic importance." The Whitewater probe also is examining whether Mr. Hubbell hid his involvement and that of Mrs. Clinton with Castle Grande, a real estate project south of Little Rock, Ark. In September 1996, the Federal Deposit Insurance Corp. said Mrs. Clinton and Mr. Hubbell drafted legal papers that Madison used to deceive bank examiners and divert $300,000 to Mr. Hubbell's father-in-law, Seth Ward. The report said the papers "facilitated the payment of substantial commissions to Mr. Ward, who acted as a straw buyer" in Castle Grande. A straw buyer is one who owns property in name only, having never put up any money or assumed any risk. The FDIC said the Ward payments were in violation of federal regulations. The report did not accuse Mrs. Clinton or Mr. Hubbell of criminal wrongdoing, although it raised serious questions about their involvement in a deal that ultimately cost taxpayers $3.8 million when Castle Grande failed. Prosecutors, the report to Congress said, immediately recognized parallels between the job help provided to Miss Lewinsky by Washington lawyer Vernon E. Jordan Jr., a longtime Clinton friend, and "his earlier relationship" with Mr. Hubbell, sentenced in 1994 to prison for stealing $420,000 from his Rose Law Firm partners. By late 1997, Mr. Starr had evidence Mr. Jordan helped Mr. Hubbell obtain consulting contracts after he agreed to cooperate in the Whitewater probe. In 1994, Mr. Hubbell was paid $450,010 by 17 different persons or entities as a consultant and $91,750 in 1995, despite beginning a 28-month prison term in August of that year. He has yet to explain what work he did for the cash. Some of the payments came from MacAndrews & Forbes Holding Co. in New York after he was introduced to the firm's executives by Mr. Jordan, a director of Revlon Inc. The cosmetics firm, controlled by MacAndrews & Forbes, also offered a job to Miss Lewinsky based on Mr. Jordan's recommendations. With regard to Mrs. Tripp's personnel records, Mr. Starr has been investigating if they were illegally released in an effort to tarnish her reputation in the Lewinsky probe. Assistant Defense Secretary Kenneth Bacon approved the release to a reporter for the New Yorker magazine. The records show Mrs. Tripp was detained by police as a teen-ager 29 years ago and had not noted the arrest in her 1987 security clearance form. The arrest later was shown to have been a teen-age prank, in which she pleaded guilty to a reduced charge of loitering. Former White House Deputy Chief of Staff Harold Ickes was questioned about the documents by the grand jury. Mr. Bacon also testified in the case. In our Investigative Section, a history of the Whitewater investigation. Copyright � 1998 News World Communications, Inc. ----------------------- NOTE: In accordance with Title 17 U.S.C. section 107, this material is distributed without profit or payment to those who have expressed a prior interest in receiving this information for non-profit research and educational purposes only. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml ----------------------- ********************************************** To subscribe or unsubscribe, email: majordomo at majordomo.pobox.com with the message: (un)subscribe ignition-point email at address ********************************************** www.telepath.com/believer ********************************************** --- end forwarded text ----------------- Robert A. Hettinga Philodox Financial Technology Evangelism 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From jya at pipeline.com Sun Sep 13 21:15:48 1998 From: jya at pipeline.com (John Young) Date: Mon, 14 Sep 1998 12:15:48 +0800 Subject: Digital Wiretap Delayed Message-ID: <199809141717.NAA24367@camel14.mindspring.com> We offer John Markoff's report today on the FCC decision to delay implementation of the FBI's digital wiretap requirements under CALEA, along with the text of the decision: http://jya.com/calea-delay.htm (93K) The decision has a good review of the technical issues, and explains why telco appeals of the requirements justified the postponement. CTIA posted here a notice of this on Friday. From tcmay at got.net Sun Sep 13 21:16:19 1998 From: tcmay at got.net (Tim May) Date: Mon, 14 Sep 1998 12:16:19 +0800 Subject: Clinton--Why I am Chortling In-Reply-To: Message-ID: At 9:24 AM -0700 9/14/98, Lynne L. Harrison wrote: >I don't see a power imbalance here. If a young woman in her 20's >invitingly flashes her thong panties at a man, I don't see how she can be >portrayed as the victim. The only way that the issue of power arises is >that Monica was not overwhelmed by someone in power - she was attracted to >the power. I agree, in principle. But, then, I think _most_ so-called sexual harassment cases are based on an inappropriate use of state power to intervene in birds and the bees issues. Of course, the Lewinsky stuff surfaced as a result of a civil action filed by Paula Jones, claiming Clinton dropped his pants in front of her, invited her to do things to him, etc., etc., blah blah. Did Jones invite this? Was she attracted to power? Who knows? This is what the trial was presumably about. And Clinton lied about the Lewinsky matter, and probably has lied about a great many other matters. (IANAL, as a few of you are, but I assumed the Lewinsky stuff was coming in to support allegations of a pattern of such behaviors. If Jones alone had made the case, it might have been a "she said, he said" case, but when strikingly parallel behavior turns up with several other women....) And did Kathleen Willey invite Clinton to rub up against her and suggest an afternoon quickie in his office? She claimed on "60 Minutes" not to have invited his behavior. I'm as bothered as the next person that a taxpayer-funded prosecutor is asking questions about sex lives. However, this is what comes of having "sexual harassment" laws, with "if she said it happened, it _happened_" standards of proof. Like I said, I'm chortling. What goes around, come around. And I'm happy that lying sack of shit of a President may escape being removed from office. Having him around is a useful reminder, the next best thing to the useful policy of letting a corpse hang from the gallows for a couple of months. --Tim May (This space left blank pending determ. of acceptability to the gov't.) ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, ComSec 3DES: 831-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Licensed Ontologist | black markets, collapse of governments. From tcmay at got.net Sun Sep 13 21:38:36 1998 From: tcmay at got.net (Tim May) Date: Mon, 14 Sep 1998 12:38:36 +0800 Subject: "If a woman says it happened, it _happened_" In-Reply-To: Message-ID: ...unless of course that woman is not politically correct. At 8:24 AM -0700 9/14/98, X wrote: >What chance is there that the Paula Jones case was dismissed BECAUSE Wild >Bill lied under oath? > >Remember OJ? > You mean you think if Clinton had told the truth when he raised his hand and swore to tell the truth it might have made a difference? "Well, huh, like, I used to bring these young thangs in, invite them in to meet the Governor, and then give them a chance to look at General Lee as he stands up to attention. Ya know, this was why I ran for Governor, to get some of that government-approved nookie. And when I moved up to Washtington, whoooo-wheeeeeeee! Let's see, I "interviewed" Kathleen Willey for that intern job, the same day her husband offed himself, so, like, she wouldn't put out. But I told her my fly was alway open for her. And then there was that little intern with the beret...don't quite recollect her name. Mona, I think, and boy did she ever moan..." Think the truth might have made Paula Jones' tale of Clinton dropping trou on her just a little more plausible? Apparently most Americans now believe her, and they didn't before. The last 8 months has established a clear-cut pattern. But, as I said, having Clinton hanging around is good for the process of disgracing our government officials. Think of how many world leaders will burst into laughter, or disgust, when he offers them a cigar? And it will make it awfully tough for the next round of feministas screaming that some CEO must go because he had a fling with his secretary. And maybe Mitsubishi of America will cancel the multimillion dollar settlement reached with a bunch of women who claimed to have been offended by the sexist jokes of Mitsubishi's Japanese managers. If Clinton can get blowjobs from his underlings, and use government money to set up assignations and to run cover for him, where's the fun in zapping Japanese execs for making hooters jokes? Kind of reminds me of the disconnect between one batch of lesbos screaming that a male only college must be opened to all womyn while another batch of bald-headed dykes in Calfornia screams that Mills College must remain a wimmin-only haven for sistas and queers. Some of these baldies chained themselves to the gates...hey, why weren't they just left chained up? The shriveled corpses might have served as a reminder to others. --Tim May (This space left blank pending determ. of acceptability to the gov't.) ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, ComSec 3DES: 831-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Licensed Ontologist | black markets, collapse of governments. From nobody at replay.com Sun Sep 13 21:39:26 1998 From: nobody at replay.com (Anonymous) Date: Mon, 14 Sep 1998 12:39:26 +0800 Subject: No Subject Message-ID: <199809141729.TAA05465@replay.com> Why yes, yes you do. Don't you recognize the black robe, the scythe, the bony hand, the less-than-cheerful disposition? See if you can figure it out. And please hold still for a moment. Let me just wind up here with this thing.... At 06:43 PM 9/14/98 +0100, harald.fragner at idg.se wrote: >Do I know you? > >Harald > >------------------ >Harald Fragner >IT-avdelningen, IDG >Tel: 08-453 60 10 >Fax: 08-453 60 05 >Email: harald.fragner at idg.se > From mmotyka at lsil.com Sun Sep 13 21:48:09 1998 From: mmotyka at lsil.com (Michael Motyka) Date: Mon, 14 Sep 1998 12:48:09 +0800 Subject: 023026.htm In-Reply-To: <199809140625.CAA00774@demona.doldrums.dyn.ml.org> Message-ID: <35FD539C.75BD@lsil.com> > FBI, has cleared it for export because the system allows access to > specific documents for which an appropriate court order has been > issued. The company expects the product to be received warmly > overseas, since the U.S. government cannot decode information at > will. Pardon me if I'm a bit slow here but isn't this just a less space-efficient form of key escrow? Shouldn't you keep the pad secret and then trash it after use? And if a pad is distributed using a traditional encryption system isn't the security of the "OTP" then the same as the method used to send it? Don't you need secret agents handcuffed to briefcases to distribute real OTPs? Mike From mmotyka at lsil.com Sun Sep 13 21:54:34 1998 From: mmotyka at lsil.com (Michael Motyka) Date: Mon, 14 Sep 1998 12:54:34 +0800 Subject: In-Reply-To: <199809131855.UAA18056@replay.com> Message-ID: <35FD554C.7E00@lsil.com> Anonymous wrote: > > How about a line-of-sight (LOS) infrared network, a neighbor-net? > ... > They'd probably want to regulate the > traffic over a taut string, between paper cups. > I think we should add separate keys to drivers licenses that authorize one to purchase plumbing components, red meat, optical components, electronics devices, ammo, porno...just add it to a 2D barcode. It would not be any inconvenience at all. It looks like to get any significant distance you would want substantial power. Then a possible downfall would be "unsafe use of a laser." I think this is what was used some years back when people started playing around with laser eavesdropping devices. It makes no difference whether or not the power levels or use are actually dangerous: in the minds of most : #define LASER \ ( Spectre + evil_conspiracy + guys_in_labcoats + flash_fried ) Call lots of optics guys who would show how misalignment could cause stray reflections, eye specialists to talk about retinas etc...still a good idea for *local* neighborhood. Have you got any specific info on what is already commercially available? BTW - It would probably be easy to map one of these nets using an appropriate imaging device because there would be a number of sources of stray light. Turn on the right camera and the spiderweb shows up. I see a plane going overhead at night, a little upwind, dispersing a fine, *harmless* dust, storing away a few frames of data as the dust drifts across the landscape... You could easily cut a coax into the turf bewteen two houses. The hardest thing to track or shut down would be a distributed system that had some unpredictable bridges in it. Build a FrankenNet - sewn together from all sorts of obscure pieces. Mike From bill.stewart at pobox.com Sun Sep 13 22:54:12 1998 From: bill.stewart at pobox.com (bill.stewart at pobox.com) Date: Mon, 14 Sep 1998 13:54:12 +0800 Subject: [NYT] FCC Extends CALEA Deadline Message-ID: <3.0.5.32.19980914104107.0089f220@idiom.com> >From the New Yawk Times, probably Friday or Saturday: WIRETAP DELAYED � [New York Times, C14.] In a setback for the F.B.I., the Federal Communications Commission has given the telecommunications industry an additional 20 months to comply with a Federal law meant to bring law-enforcement surveillance into the digital age. But in extending the deadline the commission deferred action on some of the most disputed facets of the issue, which has pitted law-enforcement officials against telephone-equipment manufacturers, network-service providers and privacy-rights advocates. The Communications Assistance for Law Enforcement Act was intended to address complaints by the F.B.I. and local law-enforcement agencies that were rapidly losing their ability to conduct wiretaps and other forms of electronic surveillance in the face of modern digital and wireless communications networks. But industry groups had long warned that they would be unable to meet the approaching deadline for complying with the law by installing the software and hardware that would allow for court-authorized surveillance on modern networks. The F.C.C. extended the deadline to June 30, 2000. "This ruling is really a prelude to the privacy fight," said James X. Dempsey, a telecommunications expert. "For now the commission has given itself and the industry some breathing room. They've said, 'Don't rush into these additional surveillance areas.'" The decision came in response to a request for a deadline extension that was filed in March in a joint petition by AT&T Wireless Services, Lucent Technologies and Ericsson. From harald.fragner at idg.se Sun Sep 13 23:27:19 1998 From: harald.fragner at idg.se (harald.fragner at idg.se) Date: Mon, 14 Sep 1998 14:27:19 +0800 Subject: Message-ID: > Why yes, yes you do. Don't you recognize the black robe, the scythe, > the bony hand, the less-than-cheerful disposition? > > See if you can figure it out. And please hold still for a moment. Let > me just wind up here with this thing.... Ultima Online? ------------------ Harald Fragner IT-avdelningen, IDG Tel: 08-453 60 10 Fax: 08-453 60 05 Email: harald.fragner at idg.se From apf2 at apf2.com Sun Sep 13 23:34:50 1998 From: apf2 at apf2.com (Albert P. Franco, II) Date: Mon, 14 Sep 1998 14:34:50 +0800 Subject: IP: Impeachment Petition -- NOT! Message-ID: <3.0.3.32.19980915213638.006a471c@apf2.com> >Date: Mon, 14 Sep 1998 11:54:36 -0400 >From: Ray Arachelian >Organization: SunderNET >X-Mailer: Mozilla 4.03 [en] (WinNT; I) >To: "Vladimir Z. Nuri" >CC: cypherpunks at cyberpass.net >Subject: Re: IP: Impeachment Petition -- NOT! >Sender: owner-cypherpunks at cyberpass.net >Reply-To: Ray Arachelian >X-Loop: cypherpunks at cyberpass.net > >So much for this being a working thing: > >Anyone else get a bounce? > >Date: Mon, 14 Sep 1998 11:20:14 -0400 >From: System Administrator >To: sunder at sundernet.com >Subject: Undeliverable: Impeach Clinton Now! > > I sent mine to Vic Fazio (D-CA) about six hours ago and no bounce yet. Maybe it's your rep's system that's down. :) From CTIA_Daily_News at um2.unitymail.com Mon Sep 14 14:55:39 1998 From: CTIA_Daily_News at um2.unitymail.com (CTIA Daily News) Date: Mon, 14 Sep 1998 14:55:39 -0700 (PDT) Subject: CTIA Daily News from WOW-COM - September 14, 1998 Message-ID: <199809142145.QAA20445@mailstrom.revnet.com> ========================================== Welcome to today's edition of the CTIA Daily News from WOW-COM.� Please click on the icon / attachment for the most important news in wireless communications today. Your company just formed a partnership in a country you never heard of.� Are you worried about international roaming fraud?� You should be.� CTIA's Wireless Security '98 - It's Just Smart Business. Orlando, Florida � November 9 - 11, 1998 http://www.wow-com.com/professional� Team WOW-COM wowcom at ctia.org =========================================== -------------- next part -------------- A non-text attachment was scrubbed... Name: bin00017.bin Type: application/octet-stream Size: 9664 bytes Desc: "_CTIA_Daily_News_19980914a.htm" URL: From nobody at usbullionexchange.com Mon Sep 14 00:00:02 1998 From: nobody at usbullionexchange.com (Nobody) Date: Mon, 14 Sep 1998 15:00:02 +0800 Subject: Dallas Gold & Silver Exchange Registration Message-ID: <199809141958.OAA04229@usbullionexchange.com> this is your account information for the dallas gold and silver exchange please save this message and put it in a safe place. user name: cypherpunks password: 5t9vd7 expires: Wed Oct 14 14:58:25 1998 Thank you for requesting your 30 day free trial online metals spot trading from Dallas Gold and Silver. You may use your account as often as you wish for 30 days. You may want to activate your account by calling 1-800-527-5307 and registering for only per month. Your username is: cypherpunksYour temporary account password is: 5t9vd7 If you have any problems entering your password be sure to look for alpha-numerical similarities ie: the letter O and the number 0, the letter l and the number 1 etc.... Please try these combinations before contacting us for technical support. Thank You. From tcmay at got.net Mon Sep 14 00:57:08 1998 From: tcmay at got.net (Tim May) Date: Mon, 14 Sep 1998 15:57:08 +0800 Subject: Deadly Spice or Seventh Seal? In-Reply-To: Message-ID: At 1:08 PM -0700 9/14/98, harald.fragner at idg.se wrote: >> Why yes, yes you do. Don't you recognize the black robe, the scythe, >> the bony hand, the less-than-cheerful disposition? >> >> See if you can figure it out. And please hold still for a moment. Let >> me just wind up here with this thing.... > >Ultima Online? > No, but here are some other choices: #1: The long lost Power Ranger. #2: The latest member of the Spice Girls, "Deadly Spice." #3: The character played by your own countryman in a famouns Ingmar Bergman film. All the hints you'll get today. --Tim May (This space left blank pending determ. of acceptability to the gov't.) ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, ComSec 3DES: 831-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Licensed Ontologist | black markets, collapse of governments. From attila at hun.org Mon Sep 14 01:19:47 1998 From: attila at hun.org (attila) Date: Mon, 14 Sep 1998 16:19:47 +0800 Subject: Clinton--Why I am Chortling In-Reply-To: Message-ID: On Mon, 14 Sep 1998, Tim May wrote: > >[snip the whatever] > >Like I said, I'm chortling. What goes around, come around. > >And I'm happy that lying sack of shit of a President may escape being >removed from office. Having him around is a useful reminder, the next best >thing to the useful policy of letting a corpse hang from the gallows for a >couple of months. > >--Tim May > as much as I think Clinton is a scurrilous excuse for a human being, I could not agree with you more. besides, Al Bore is worse. let Clinton hang, pecker and all. __________________________________________________________________________ To be a ruler of men, you need at least 12 inches.... _________________________________________________________________ attila__ From webmaster at acm.org Mon Sep 14 01:35:21 1998 From: webmaster at acm.org (webmaster at acm.org) Date: Mon, 14 Sep 1998 16:35:21 +0800 Subject: ACM Account Verification Code Message-ID: <905808372.AA10188@acm.org> -----BEGIN PGP SIGNED MESSAGE----- Dear Joe Cypherpunks: Thank you for establishing an ACM account. To complete the process, you must return to Step 3 and verify your account. You will find your account verification code listed at the end of this message. The code is case sensitive, and does not contain any digits. Select the "Continue to Step 3" button from the "Create an Account" page at . Do not repeat Steps 1 and 2. (See note below.) Enter your username, password and verification code into the appropriate fields and activate the "Verify Account" button. Username: cypherpunks at toad.com Verification Code: AFGKE If you have any questions or comments please contact webmaster at acm.org. Sincerely, The ACM Webmaster Note: if you repeat steps 1 and 2, your old account is deleted and the verification code associated with it will not be valid. A new code is created and sent. You must use the new code to verify your account. =+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+= Just a reminder: if you have not subscribed to the Digital Library, you can still browse the Library and access bibliographic information. Your account username and password will act as your authentication. Visit the Digital Library at . Read about subscribing to the Library at =+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+= // This message was generated by ENS. The public key // // is available at http://www.acm.org/sys/ens.html // -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQB1AwUBNf2Hp840plPFvmzxAQHfOwL/Srm7AQXIiNoP10jllyU4rDxYslYvPwqm 7xRvRfNadT2fkW0DNfCJhdr2Gd40cSpUqKBAvn8uPIsKeuT6G2NX65tHe5crNpDx XSDva/VV9OZWSgnEHuUulabmjdv/Bhux =P/RE -----END PGP SIGNATURE----- From billp at nmol.com Mon Sep 14 01:53:35 1998 From: billp at nmol.com (bill payne) Date: Mon, 14 Sep 1998 16:53:35 +0800 Subject: emission test, Black and White Test of Cryptographic Algorithms, & settlement Message-ID: <35FD8CF1.4532@nmol.com> Monday 9/14/98 2:33 PM Don When I drove back from Pullman in about 9/96 I realized the valve seals were leaking in my VW Rabbit. Blue smoke coming out the exhaust pipe. Passing the low speed carbon monoxide test is the hardest. On 09/06/96 the emission test showed Standard Current Reading Result 1.20 2.88 FAIL You showed me your tool to change seals. But I needed to work on other projects. After spending about $400 to get the seals replaced, I got another test on 09/10/96 Standard Current Reading Result 1.20 1.31 FAIL In DESPERATION I used Berryman�s B-12, changed oil, etc and REMOVED THE AIR FILTER for the test on 09/11/96 Standard Current Reading Result 1.20 1.19 PASS Talk about squeaking by! If your vehicle continues to FAIL emissions test, your life will be made extremely disrupted by the VEHICLE POLLUTION MANAGEMENT DIVISION. The Rabbit had its 1998 emission test due in September 1998. I was totally prepared for failure. I ordered about $500 in parts from JC Whitney in preparation for a DISRUPTIVE engine rebuild. And, of course, I ordered for the fun of it the NAFTA [Mexico] exhaust headers. I could not wait to see the effect of exhaust headers on performance, so I installed them immediately. WOW! I estimate about a 20-30% performance improvement. Rpms up the ying-yang. Patty kept putting the 1998 emissions notice on my dinner plate. On Saturday I took a FAST ride to Oro Guay peak and hiked. I took a FAST return trip. I drove into EXPRESS EMISSION operated by Dung Nguyen. I wanted to see how badly my grey rabbit, R2, would fail. R2 is how the grey rabbit is denoted in my repair log. I couldn�t stand to personally watch R2 fail, so I went outside while it was tested. On my return the two operators were smiling both and had their thumbs pointed up! R2 PASSED!!!! Standard Current Reading Result 1.20 00.13 PASS !Viva NAFTA exhaust headers! ANOTHER disruption out of the way so that I can concentrate on completing the digital FX! My HUGE FEAR what that I would have to spend time getting R2 into shape to POSSIBLY PASS the emissions test. TRYING to get a car which failed the emissions test is a nightmare! Sandia colleague Ron Pate had to have a rebuilt engine installed in his bronco so that it would pass. Black and White Test of Cryptographic Algorithms, by William H. Payne advertised at http://www.aci.net/kalliste/ / and presented at http://zolatimes.com will hopefully AID in getting my other distraction settled. Then, too, of course, are the JUSTIFIABLY upset MUSLIMS who are reading my zolatimes article. Sandia president C. Paul Robinson observed at http://www.jya.com/its-us.htm wrote A quick walk around the globe: other emerging threat nations ... What is perhaps most frightening is the apparent increase in the flow of technology, hardware, and a "barter system" in dangerous materials. We must understand "What are their motives?" Simple, in one case. Settlement. WE WANT OUR MONEY! This is on Internet at http://www.jya.com/crypto.htm DoE: Pay Bill Payne Thought about you guys at the fun Metriguard Monday corporate lunch. The Acer scsi Scan Prisa I ordered just arrived by UPS. Now I can scan in my schematics. And bash the Great Satan EVEN HARDER. But let's all hope for settlement before matters get WORSE. Later bill From nobody at base.xs4all.nl Mon Sep 14 02:10:46 1998 From: nobody at base.xs4all.nl (Anonymous) Date: Mon, 14 Sep 1998 17:10:46 +0800 Subject: Is nym.alas.net down? Message-ID: <2f1b7f6c4bcb1557a6c4409be67a9c36@base.xs4all.nl> Is nym.alias.net down? I've sent a request twice using a different remailer chain each time yet it still doesn't reply. It's been about two days since I sent it in. I did however create a nym with dongco.hyperreal.art.pl. Is this service reliable? or will it disppear quickly? From tzeruch at ceddec.com Mon Sep 14 02:48:42 1998 From: tzeruch at ceddec.com (tzeruch at ceddec.com) Date: Mon, 14 Sep 1998 17:48:42 +0800 Subject: Clinton--Why I am Chortling In-Reply-To: Message-ID: <98Sep14.184802edt.43010@brickwall.ceddec.com> On Sun, 13 Sep 1998, Declan McCullagh wrote: > On Sat, 12 Sep 1998, Tim May wrote: > > > * What goes around, comes around. The Liberal puke Democrats who crucified > > Bob Packwood, Clarence Thomas, and any number of corporate people charged > > with "sexual harassment," are now reaping what they sowed. "If she says it > > happened, it happened," the mantra of the feminazi left, is now apparently > > forgotten by Patricia It's not our business" Ireland. > > There's also the idea popular in some gender feminist circles that the > imbalance of power in manager-employee relationships makes it impossible > for genuine consent to be given. Can there be any greater power imbalance > than the president of the United States and an intern? Where are the > feminist cries of outrage? I think they have abandon Aristotelian (or any other phylum of) Logic, replacing it with something called post structuralist thinking. Since it lacks a structure, it is hard to figure out how to explain it. Apparently it is a system where "Male Lesbians" exist. So because Clinton does what the GFs want, maybe he isn't really powerful at all (name anyone who is both powerful and submits to GFs, at least in contexts not included in the Starr report). No, it doesn't really make sense, but I don't think it is supposed to. > > * Lawmaking is paralzyed, frozen, stillborne. This I count as a Good Thing. > > Even better will be another 8-10 months of this nightly spectacle. No > > Health Care Reform, no Communications Decency Act II, no Tobacco Act, > > nothing. > > In general you might be right. But for "noncontroversial" measures like > CDA II, well, it'll be in one of the appropriations bills that will be > approved in the next three weeks. Do libraries now ban minors' access to MSNBC, CNN, ... The House of Representatives, and the Library of Congress? And things like NetNanny and SurfWatch? Clinton can still veto the omnibus appropriations bill or threaten to "shut down the government" (= shut down government spending instead of leaving it running while nothing else gets done). From rah at shipwright.com Mon Sep 14 03:06:09 1998 From: rah at shipwright.com (Robert Hettinga) Date: Mon, 14 Sep 1998 18:06:09 +0800 Subject: IP: A CLINTON DIRTY BOOK STORY Message-ID: --- begin forwarded text Delivered-To: ignition-point at majordomo.pobox.com Subject: IP: A CLINTON DIRTY BOOK STORY Date: Mon, 7 Sep 1998 14:04:32 -0400 (EDT) From: softwar at us.net (CharlesSmith) To: ignition-point at majordomo.pobox.com Sender: owner-ignition-point at majordomo.pobox.com Precedence: list Reply-To: softwar at us.net (CharlesSmith) In late 1994 the U.S. State Department denied Phil Karn his request to export a PC disk. Mr. Karn already had sold the book, APPLIED CRYPTOGRAPHY written by Bruce Schneier, without restriction. Mr. Karn also included a disk of text source code (in human readable format) that was also printed in the book. The book and the disk were freely sold, with no checks, in retail American bookstores. According to the Clinton administration, Karn's disk was a threat to national security. Newly released documents from the State Department, written in November 1994, shows the White House National Security Council (NSC) directly approved the decision to deny Karn's request while allowing the export of military encryption to China. The document, a letter written by Wendy Sherman, State Department Assistant Secretary of Legislative Affairs, to then Congresswoman Maria Cantwell (D WA) was provided to Bill Clements of the NSC for White House approval. In addition, the document includes a fax on Karn's export problem titled "TO: Pres. Clinton". Ordie Kittrie, the State Department Attorney for Political-Military Affairs, wrote "Attached is draft response to Rep. Cantwell ie Karn encryption disk... Please provide me with any comments by noon Friday, November 18." "The decision that controls should continue was based on several consideration," wrote Ms. Sherman. "The administration will continue to restrict export of sophisticated encryption devices, both to preserve our own foreign intelligence gathering capability and because of the concerns of our allies who fear that strong encryption technology would inhibit their law enforcement capabilities. One result of the interagency review of Mr. Karn's disk was a determination that the source code on it is of such a strategic level as to warrant continued State Department licensing." Of course, any criminal or terrorist could simply purchase the book and key the code in. A slightly richer criminal could even use an Optical Scanner (OCR) and convert the pages directly into readable source code in less time. Even a secret Commerce briefing document from a 1996 meeting with Janet Reno openly admits the futile nature of trying to restrict PC diskette or software export. "Lost in the debate," states the secret 1996 Commerce Department document. "But not irrelevant, is the fact that it is virtually impossible to enforce export control's against them when they can be exported by phone and modem or/in someone's pocket." At first the Clinton encryption policy seems absurd or simply driven by bureaucratic red tape. Alas, nothing is further from the truth. The policy was used as a means to extort donations for the DNC or by Clinton insiders bent on making big bucks. The Chinese Army was not interested in PC programs or diskettes their agents could buy openly in a retail bookstore. The PLA under the Clinton administration has been in the business of acquiring commercial applications of "Defense" technology. For example, in November 1994 Motorola employee and former Clinton White House NSC member Richard Barth began his successful request to sell encrypted radios and cellular phones to the Chinese Police. Motorola's Barth wrote to Theodore McNamara Assistant Secretary of State on November 23, 1994. "This is to request that your office initiate action to obtain a waiver from requirement for individual export license notifications to Congress for wireless mobile communications systems containing encryption for China. Such a waiver was issued by the President in September of this year for civilian satellite systems and encrypted products for use by American firms operating in China." According to Barth, a high-tech trade war had erupted between the U.S. and Britain. "European firms," wrote Barth. "Including Nokia, Ericsson, Alcatel and Siemens, have for a number of months been able to market and sell GSM cellular systems with A5-2 encryption in China as a result of a decision taken by the UK intelligence agency, GCHQ." By July 1995, the CEO of Motorola, Gary Tooker, wrote a personal note to Ron Brown, expressing his gratitude for Clinton's signature approving encryption exports. "I am writing to thank you," wrote Tooker to Brown. "And some key members of the Commerce Department for your assistance in obtaining the Presidential waiver for encryption export sales to China." The Motorola saga of Barth is not the only example of Bill Clinton's two-faced policy on high-tech exports. In fact, President Clinton personally authorized the transfer of an encrypted air traffic control system to the Chinese Air Force. It is this particular export which illustrates the difference between military encryption and civilian, such as Karn's disk of PC programs. The Chinese Air Force runs the civilian air control in their country. The U.S. built air traffic system is not only run by PLAAF officers but it is also plugged directly into their air defense. According to the recent GAO testimony on Clinton waivers "Waivers were also granted to permit the export of encryption equipment controlled on the Munitions List. One case involved a $4.3-million communications export to China's Air Force." Not only are Chinese fighters and missiles more effective thanks to Bill Clinton but China has also exported a modified version of the U.S. system to Iraq. The Chinese version, called "Tiger Song", includes U.S. and French made parts. The Tiger Song system allows Iraq to track and target U.S. fighters using a high speed, secure, fiber optic command network. All radars in Iraq, civilian and military, are now linked together into Tiger Song. Iraqi missiles and military radars are also now playing a giant shell game with U.S. air forces, using pre-built camouflaged sites wired with hidden fiber optic cables, scattered all over the country. Another military example of Clinton crypto export controls is the sales of Hughes, Motorola, and Loral satellites to the Chinese military. The satellites were sold complete with on-board secure telemetry systems hardened to absorb the intense radiation of space - something that can be directly applied to nuclear weapons. The satellites exported to China in question were so classified that whole sections of Federal law, the U.S. Munitions List, were deleted or waived by Bill Clinton. The claims made by Bernard Schwartz and Loral that they did not knowingly export military technology to China contradicts the official briefing documents given to Ron Brown in 1994. One Loral document obtained from the files of Ron Brown, labeled "for Secy. Brown", has a page titled "Commercial Applications Of DoD Technology". This document lists "Intelsat", "Cellular - Globalstar" and "Direct Broadcast Satellite" technology along with a variety of other products developed from "DoD" projects. Thus, Loral knowingly exported systems they developed for the U.S. military to China. Did Mr. Clinton consult with U.S. allies prior to allowing top DNC donors export rights to military gear? According to Motorola, the staunchest U.S. ally, Great Britain, was an economic adversary. Clearly, the strategic concerns of South Korea, Japan and the Philippines were never considered. Under Bill Clinton our allies from the Cold War were competitors in a economic war for money. Furthermore, in September 1998 FBI Director Freeh testified before the Senate Committee on Terrorism. As predicted, Freeh pushed the "Bin Ladden" terrorism button while requesting a ban on domestic PC encryption programs. The use of encryption by so called terrorist organizations is balanced by the use of the same technology by law abiding citizens to protect themselves from criminals. The fact that Bin Ladden is armed with encryption comes as no surprise since he was, after all, trained by the CIA to fight the Soviets in Afghanistan. Once a freedom fighter and now a terrorist. One similar historic example to Bin Ladden is "VULA". In the 1980s the South African National Congress (ANC) used encryption in a project called "VULA" to defeat the apartheid government. Vula included illegal exports from europe, Soviet training and home built software. Vula was successful and the ANC ultimately won their long war. Once a terrorist now a freedom fighter. These facts are not unknown to the Clinton administration. In November 1993 TOP Secret document prepared for President Clinton openly admitted the futility of any government-imposed ban. According to "IMPACTS OF TELECOMMUNICATIONS AND ENCRYPTION TECHNOLOGY ON LAW ENFORCEMENT AND INTELLIGENCE COLLECTION: ASSESSMENT, OPTIONS, AND RECOMMENDATIONS" a ban would "either (1) discourage criminals from using encryption because they realized that most products did not provide protection from wiretaps, or (2) encourage criminals to acquire strong encryption technology, whether commercial or home made." Obviously, the administration will not start banning books so the "home made" option will always apply. The FBI Director seems to have forgotten common sense along with the law. He certainly has remained silent while the Chinese Army purchased military encryption systems from his boss. Freeh, however, has also remained adamant that crack-pot export restrictions on printed text must remain. Mr. Freeh also overlooked one final historical example of a so called revolutionary type group using encryption and the FBI Director can thank his job for it. In April 1775 Paul Revere read a coded light signal from a Church tower and rode into history. The King's men did not intercept nor decode that message. The battle of Concord took place and the first shots of our own revolution were fired. ================================================================ source documents - http://www.softwar.net/karn.html Clinton NSC/State Crypto Book Disk Export http://www.softwar.net/loral.html LORAL Commercial Applications of DOD Tech http://www.softwar.net/inpact.html TOP SECRET "Impacts of Encryption" http://www.softwar.net/vula.html ANC Operation VULA - Freedom Fighers Use Crypto http://www.softwar.net/moto4.html 1995 MOTOROLA Tooker To Warren Christopher For Crypto To China http://www.softwar.net/tooker1.html July 1995 MOTOROLA Thank You For Encryption Export To Ron Brown http://www.softwar.net/tooker2.html Feb. 1995 MOTOROLA To Ron Brown - Human Rights and Crypto http://www.softwar.net/barth95.html March 1995 MOTOROLA - Encrypted Radios/Iridium For China http://www.softwar.net/barth94.html Richard Barth 1994 Secret Letters Email http://www.softwar.net/barth93.html Richard Barth 1993 Secret White House Email http://www.softwar.net/gao176.html GAO REPORT - ARMS FOR CHINA - CRYPTO FOR CHINA ================================================================ 1 if by land, 2 if by sea. Paul Revere - encryption 1775 Charles R. Smith SOFTWAR http://www.softwar.net softwar at softwar.net Pcyphered SIGNATURE: 4CE66EF8168673DBB980C519E94FB51027FA5FF001D1BB63298A4E5E28906370 1B9713F09BEEF599003431629914FB78B8704B2BB0DDB22DCA21DB900065CA07 5E32CB3CE742D7C6 ================================================================ SOFTWAR EMAIL NEWSLETTER 09/07/1998 *** to unsubscribe reply with "unsubscribe" as subject *** ================================================================ **COPYRIGHT NOTICE** In accordance with Title 17 U.S.C. Section 107, any copyrighted work in this message is distributed under fair use without profit or payment to those who have expressed a prior interest in receiving the included information for non-profit research and educational purposes only. http://www.law.cornell.edu/uscode/17/107.shtml ********************************************** To subscribe or unsubscribe, email: majordomo at majordomo.pobox.com with the message: (un)subscribe ignition-point email at address ********************************************** www.telepath.com/believer ********************************************** --- end forwarded text ----------------- Robert A. Hettinga Philodox Financial Technology Evangelism 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From tcmay at got.net Mon Sep 14 03:40:12 1998 From: tcmay at got.net (Tim May) Date: Mon, 14 Sep 1998 18:40:12 +0800 Subject: Clinton--Why I am Chortling In-Reply-To: Message-ID: At 3:49 PM -0700 9/14/98, tzeruch at ceddec.com wrote: > >Clinton can still veto the omnibus appropriations bill or threaten to >"shut down the government" (= shut down government spending instead of >leaving it running while nothing else gets done). Hey, don't rule this out. Clinton may welcome shutting down the government...after all, it was during the 1995 shutdown that Clinton got in touch with his horndog self. To wit, normal employees were all sent home, and the delivery girl role was played by Monica Lewinsky, who delivered some pie to Clinton one quiet evening. --Tim May (This space left blank pending determ. of acceptability to the gov't.) ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, ComSec 3DES: 831-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Licensed Ontologist | black markets, collapse of governments. From tcmay at got.net Mon Sep 14 03:46:08 1998 From: tcmay at got.net (Tim May) Date: Mon, 14 Sep 1998 18:46:08 +0800 Subject: Deadly Spice or Seventh Seal? In-Reply-To: Message-ID: At 1:48 PM -0700 9/14/98, Tim May wrote: >At 1:08 PM -0700 9/14/98, harald.fragner at idg.se wrote: >>> Why yes, yes you do. Don't you recognize the black robe, the scythe, >>> the bony hand, the less-than-cheerful disposition? >>> >>> See if you can figure it out. And please hold still for a moment. Let >>> me just wind up here with this thing.... >> >>Ultima Online? >> >No, but here are some other choices: > >#1: The long lost Power Ranger. > >#2: The latest member of the Spice Girls, "Deadly Spice." > >#3: The character played by your own countryman in a famouns Ingmar Bergman >film. > >All the hints you'll get today. Actually, I misspoke. The famous Swedish actor played the _knight_ who faced this character, not the character itself. (Hint: This actor also played the exorcist of Regan.) And the character itself made a guest appearance in one of Bill and Ted's Excellent Adventures. --Tim May (This space left blank pending determ. of acceptability to the gov't.) ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, ComSec 3DES: 831-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Licensed Ontologist | black markets, collapse of governments. From wombat at mcfeely.bsfs.org Mon Sep 14 03:50:41 1998 From: wombat at mcfeely.bsfs.org (Rabid Wombat) Date: Mon, 14 Sep 1998 18:50:41 +0800 Subject: In-Reply-To: Message-ID: bork bork bork On Mon, 14 Sep 1998 harald.fragner at idg.se wrote: > > Why yes, yes you do. Don't you recognize the black robe, the scythe, > > the bony hand, the less-than-cheerful disposition? > > > > See if you can figure it out. And please hold still for a moment. Let > > me just wind up here with this thing.... > > Ultima Online? > > > ------------------ > Harald Fragner > IT-avdelningen, IDG > Tel: 08-453 60 10 > Fax: 08-453 60 05 > Email: harald.fragner at idg.se > > From nobody at sind.hyperreal.art.pl Mon Sep 14 04:04:46 1998 From: nobody at sind.hyperreal.art.pl (HyperReal-Anon) Date: Mon, 14 Sep 1998 19:04:46 +0800 Subject: Larry Gilbert Message-ID: <7b77428acf328c029db809968e76c70d@anonymous> On Mon, 14 Sep 1998, sixdegrees wrote: > > Just a quick update from sixdegrees(tm). Unfortunately Larry > Gilbert (irving at pobox.com) asked not to be listed as your > contact with sixdegrees. > > We also wanted to make sure you were aware that you currently > have no other confirmed contacts, so it will be hard for you to > have a productive sixdegrees experience. As you probably know, > without any confirmed contacts, you won't get any results from our > networking searches. > > So, we just wanted to recommend that you head over to > http://www.sixdegrees.com , log-in, and go to MY CONTACTS > to list additional relationships. > > > ==================================================================== > PLEASE NOTE: All replies to this address are processed by a computer. > If you have any problems, questions or requests send an e-mail to > issues at sixdegrees.com and someone will get back to you as soon as > possible. > ==================================================================== Since you seem so intent on continuing to spam the Cypherpunks list like some AOL luser-wannabe, I have a better idea. Follow this procedure exactly to reach enlightenment: 1) Open the cases for all your computers. 2) Drop your pants. 3) Whip it out. In the case of a woman, just squat. 4) Spray all your machines. 5) If any machines are still working, pour large amounts of concentrated nitric acid solution on them. Inhale the resulting vapors. 6) Close the door, activate the halon system, sit down, and inhale deeply. 7) You will pass out. Within a few minutes, you will see the Grand Poobah himself. 8) If you do not have a halon system, inhale heavy gasses such as freon. We're glad to be of service to clueless AOLholes and clueless AOLhole-wannabes everywhere. Have a nice day. From nnburk at cobain.HDC.NET Mon Sep 14 04:36:11 1998 From: nnburk at cobain.HDC.NET (nnburk) Date: Mon, 14 Sep 1998 19:36:11 +0800 Subject: Predictions: Crime and Criminal Justice in the 21st Century Message-ID: <35FDD227.4C7D@yankton.com> Predictions: Crime and Criminal Justice in the 21st Century 1. The United States will experience a significant economic recession/crisis very close to the turn of the Century. 2. As the large pool of young people born in the early 1990s become teenagers and young adults, there will be a dramatic increase in violent crime around the year 2005-2010. 3. America will experience sporadic civil disorders/riots in many of its urban areas during the next 10-15 years -- much of it related to racial/ethnic problems. 4. Terrorist acts by "fringe"/special issue groups will increase at a significant rate -- becoming a major law enforcement and security problem. 5. As faith in the criminal justice system declines, there will be a rise in vigilante-based incidents where citizens take the enforcement of crime problems into their own hands. 6. Much of middle- and upper-class America will take a "retreatist" attitude and move into private high-security communities located in suburban or rural areas. Because of technological advances, many companies and corporations will also move out of the urban environments as well. 7. Due to many of the predictions listed above, much of law enforcement and security in the 21st Century will become privatized and contractual. Traditional law enforcement agencies will primarily serve urban and rural communities. 8. Law enforcement will evolve into two major and divergent roles: traditional law enforcement and a more specialized military tactical role to deal with the growing urban violance and terrorist incidents. 9. Significant violence and unrest will plague our nation's prisons. Major prison riots will become a regular occurrence. 10. With the decrease of the possibility of major global warfare, the United States military will take on an increased domestic "peace-keeping" role with America's law enforcement agencies. John Young wrote: > > Tim asks: > > >Freeh and Company continue to mumble about "meeting > >the legitmate needs of law enforcement." What can they > >be speaking of? > ... > >Obviously his side is contemplating domestic crypto restrictions. > > Threat of terrorism will be the impetus for applying national security > restrictions domestically, for relaxing cold war limitations on spying > on Americans, for dissolving barriers between law enforcement > and military/intelligence agencies. > > Technical means for access to encrypted data will probably > come first in communications, then to stored material. There > will be an agreement for increased CALEA wiretap funding, which > is what the two cellular and wired suits against the FBI intend, > (paralleling what the hardware and software industries want from > federal buyers of security products). > > This will provide the infrastructural regime for the gov to monitor > and store domestic traffic as NSA does for the global, using the > same technology (NSA may provide service to domestic > LEA as it now does for other gov customers for intel). > > Other access will come through hardware and software for > computers, paralleling technology developed for telecomm tapping, > tracking and monitoring. > > Most probably through overt/covert features of microprocessors > and OS's, as reported recently of Wintel and others, but also > probably with special chips for DSP and software for modular > design -- why build from scratch when these handy kits are > available. > > As noted here, the features will appear first as optional, in response > to demand from commerce, from parents, from responsible > institutions, to meet public calls for protection, for privacy, for > combating threats to the American people. > > Like wiretap law, use of the features for preventative snooping will > initially require a court order, as provided in several of the crypto > legislative proposals. > > Like the wiretap orders, gradually there will be no secret court refusals > for requests to use the technology in the national interest. > > A publicity campain will proclaims that citizens with nothing to hide > will have nothing to fear. Assurance of safety will be transparent, > no clicks on the line. In a digital world, home-office devices will send > lifestyle data to the device manufacturers over the always monitoring > transparental Net. > > Personal privacy will evaporate almost unnoticeably, as with the tv > remote control, cp/defcon/bar brag, telephone, fax and forever-lovers > pillowtalk. From attila at hun.org Mon Sep 14 04:45:59 1998 From: attila at hun.org (attila) Date: Mon, 14 Sep 1998 19:45:59 +0800 Subject: Clinton--Why I am Chortling (fwd) In-Reply-To: <3.0.5.32.19980914122452.0086a750@pop.mhv.net> Message-ID: ,,,...On Mon, 14 Sep 1998, Lynne L. Harrison wrote: > >I don't see a power imbalance here. If a young woman in her 20's >invitingly flashes her thong panties at a man, I don't see how she can be >portrayed as the victim. The only way that the issue of power arises is >that Monica was not overwhelmed by someone in power - she was attracted to >the power. > I suspect _you_ can handle the power imbalance. Monica is not exactly what I would call a collected, stable example of the female species. she was scrambled from her parents divorce, was anxious to be both liked and approved, and she told the high school teacher she had been babysitter for _and_ rolling (sounds like a Kennedy doesn't it) that she was in Washington earning her "knee pads" with Clinton. now, that's an unstable freak who is attracted to father figures (Electra complex, if you will) and absolute power over her. I dont think as a woman you can understand the fear a male boss feels; even if there is a genuine love interest, you crap in your own hat, it will be served up to you some day. or as it is sometimes stated: "...dont get your meat where you earn your bread...." it doesnt matter whether Monica hiked her dress, or Clinton dropped his trou (which is more likely given his track record) even if Monica was "a willing, consenting adult", any man in a position of power who takes advantage of a star-struck female 30 years his junior is guilty of an abuse of power (personal) and in this case using the position of "The President of the United States" as his instrument of power --end of story. to be a "consensual act", the woman certainly needs to not be an emotional disaster --and not be preyed upon by a raging psychopath who has no more common sense than a drunken fraternity brat who says: "Hi, my name is Bill Clinton, let's fuck!" >On another but connected note, explain why Monica saved that dress! I >found this little tidbit to be the "yuck" factor... > she's sick... simple as that. apparently she was not exactly monogamous; probably saved used prophylactics from the rest of them. > > note one of her last snivels to Clinton was that she wanted to do the "horizontal bop" --just once. the whole thing is sick. stupid Americans only vote with their wallet. the American bread and circus mentality does not care... if the economy had already fallen, they would howl Clinton out of office faster than a school principal accused by some mother who misunderstood her 5 year old. however, leave the scurrilous bag of camel dung in office; the government bogged down and consumed with its own evil is a government which is too preoccupied to maximize the damage they are doing to the country and the world. maybe they will leave us alone. like I said before: leave Clinton alone --Al Bore is worse; and, I'll even put up with the bitch over Tipper. __________________________________________________________________________ To be a ruler of men, you need at least 12 inches.... _________________________________________________________________ attila__ From paulmerrill at acm.org Mon Sep 14 04:47:17 1998 From: paulmerrill at acm.org (Paul H. Merrill) Date: Mon, 14 Sep 1998 19:47:17 +0800 Subject: Larry Gilbert In-Reply-To: <7b77428acf328c029db809968e76c70d@anonymous> Message-ID: <35FDE268.79F4FF46@acm.org> I love this to death. Some asshole sends crap data to sixdegrees including dredged up real email addresses, then when sixdegrees and the contacts given react in a totally appropriate manner other (?) assholes berate them for living. And this one even manages to toss in an anti-AOL rant where AOL plays no part. Such witticisms I haven't seen since my kids turned 7. PHM HyperReal-Anon wrote: > > On Mon, 14 Sep 1998, sixdegrees wrote: > > > > > Just a quick update from sixdegrees(tm). Unfortunately Larry > > Gilbert (irving at pobox.com) asked not to be listed as your > > contact with sixdegrees. > > > > We also wanted to make sure you were aware that you currently > > have no other confirmed contacts, so it will be hard for you to > > have a productive sixdegrees experience. As you probably know, > > without any confirmed contacts, you won't get any results from our > > networking searches. > > > > So, we just wanted to recommend that you head over to > > http://www.sixdegrees.com , log-in, and go to MY CONTACTS > > to list additional relationships. > > > > > > ==================================================================== > > PLEASE NOTE: All replies to this address are processed by a computer. > > If you have any problems, questions or requests send an e-mail to > > issues at sixdegrees.com and someone will get back to you as soon as > > possible. > > ==================================================================== > > Since you seem so intent on continuing to spam the Cypherpunks list like > some AOL luser-wannabe, I have a better idea. Follow this procedure > exactly to reach enlightenment: > > 1) Open the cases for all your computers. > 2) Drop your pants. > 3) Whip it out. In the case of a woman, just squat. > 4) Spray all your machines. > 5) If any machines are still working, pour large amounts of concentrated > nitric acid solution on them. Inhale the resulting vapors. > 6) Close the door, activate the halon system, sit down, and inhale deeply. > 7) You will pass out. Within a few minutes, you will see the Grand Poobah > himself. > 8) If you do not have a halon system, inhale heavy gasses such as freon. > > We're glad to be of service to clueless AOLholes and clueless > AOLhole-wannabes everywhere. Have a nice day. From attila at hun.org Mon Sep 14 04:50:28 1998 From: attila at hun.org (attila) Date: Mon, 14 Sep 1998 19:50:28 +0800 Subject: Clinton still doesnt get it Message-ID: 25 years of Clinton's raging pscyhopathic, oversexed behavior: Hillary has been a willing partner. nothing but control freaques and obscene power trippers. there is only amorality in that house --and power by any means. New York Times September 13, 1998 IN AMERICA/By BOB HERBERT Still Doesn't Get It David Maraniss, in his biography of Bill Clinton, "First in His Class," writes about an "intense relationship" that Mr. Clinton had with a young woman who had volunteered to work in his first campaign for public office. Mr. Clinton was running for Congress and the woman was a student at the University of Arkansas. A campaign aide, quoted in the book, said, "The staff tried to ignore it as long as it didn't interfere with the campaign." But it did interfere, because Mr. Clinton was also intensely involved with Hillary Rodham. Mr. Maraniss writes: "The tension at campaign headquarters increased considerably when Rodham arrived as people there tried to deal with the situation. Both women seemed on edge. The Arkansas girlfriend would ask people about Hillary: what she was like, and whether Clinton was going to marry her. When she was at headquarters, someone would sneak her out the back door if Rodham was spotted pulling into the driveway." It was all there more than two decades ago at the very beginning of Bill Clinton's political journey: the thoughtlessness, the recklessness, the wanton use of friends and associates to cover up his ugly behavior, the willingness to jeopardize the hopes and dreams of people who were working for him and trusted him, the betrayal of those closest to him. There is nothing new in Kenneth Starr's report, just confirmation in extreme and at times lurid detail of the type of person Mr. Clinton has always been. In 1992, when he was running for President and people across the nation were investing their time, money and even their careers in him, he rewarded them with the Gennifer Flowers scandal. He carried his psychodrama onto national television when he went on "60 Minutes" and, with Mrs. Clinton at his side, called Ms. Flowers a liar. He told Steve Kroft and 30 million viewers: "It was only when money came up, when the tabloid went down there offering people money to say that they had been involved with me, that she changed her story. There's a recession on, times are tough, and I think you can expect more and more of these stories as long as they're down there handing out money." In other words, it was the economy, stupid. But even as he was denying that he had had a sexual relationship with Gennifer Flowers, Mr. Clinton was going out of his way on "60 Minutes" to convey to the public that he had learned a lesson, that he had matured and that his irresponsible behavior would not be a problem if he were elected President. "I have absolutely leveled with the American people," he said. In fact, his comments were about as level as the Himalayas. We now know that he was willing to risk everything, his family, his Presidency, the welfare of the nation, on a dangerous fling with a White House intern. For him, it must have been great fun. He got to play so many people for fools. He got to chat on the phone with Congressmen while engaging in sex. He got to play hide and seek with the Secret Service. Very mature behavior. Now the Clinton psychodrama has much of the Government paralyzed and the Democratic Party in a state of panic. But Mr. Clinton still doesn't get it. On Thursday he met with the members of his Cabinet, who had been duped and lied to like so many others. He went into his emotional routine and said he was oh-so-sorry, etc. He begged for forgiveness. But he got upset when the Secretary of Health and Human Services, Donna Shalala, said that she was appalled by his behavior. Ms. Shalala complained that the President seemed to believe that pursuing his policies and programs was more important than providing moral leadership. A story in The Washington Post said Mr. Clinton responded sharply to Ms. Shalala, rebuking her. My understanding is that his response was critical but not harsh. Either way, it's clear that Mr. Clinton has not learned the requisite lessons. He lied to Ms. Shalala months ago and sent her out to lie to the public, and now he's criticizing her. The President is not sorry. He's apologizing because there's a gun at his head. He's not changing what he now describes as his sinful ways. He's trying to manipulate public opinion so he can survive to sin again. The psychodrama remains as long as he remains. There are no surprises here. With Bill Clinton, it was ever thus. From nobody at sind.hyperreal.art.pl Mon Sep 14 04:51:21 1998 From: nobody at sind.hyperreal.art.pl (HyperReal-Anon) Date: Mon, 14 Sep 1998 19:51:21 +0800 Subject: Hi! Message-ID: <1de8e2f402710b06525c5f67b59f70bb@anonymous> On Mon, 14 Sep 1998 harald.fragner at idg.se wrote: > > Do I know you? > > Harald > > ------------------ > Harald Fragner > IT-avdelningen, IDG > Tel: 08-453 60 10 > Fax: 08-453 60 05 > Email: harald.fragner at idg.se > > No, but we know you! You're a very evil man, Mr. Fragner, at least by the standards of the Hired Government Ninjas. Under our standards, everyone is evil...except government leaders. Expect black helicopters to be targetting your house in the next few days. Do not be surprised if unguided rockets are shot into it. If ninjas are coming through your windows at 2AM, just remember: We're from the government and we're here to help you. Just bend over and grip the towel rack. Your phone will be ringing off the hook in the middle of the night for the next two or three years. Oh, wait, maybe I'm looking into the future again. I really must stop doing that. That's the bad part about being involved with the Hired Government Ninjas. We mysteriously know how people will be harassed before it happens. Imagine that. Sincerely, Hired Government Ninjas, Inc. Remember, our motto is: "Do what we say, that's the way we kick it." From attila at hun.org Mon Sep 14 04:56:02 1998 From: attila at hun.org (attila) Date: Mon, 14 Sep 1998 19:56:02 +0800 Subject: a few facts on Presidential peccadillos (fwd) Message-ID: power trippers attract willing victims. enjoy... __________________________________________________________________________ 1. Which president smoked marijuana with a nude playgirl while he joked about being too wasted to "push the button" in case of nuclear attack? 2. Which president allegedly had affairs with both a winner AND a finalist in the Miss America pageant? 3. Which president had sex with one of his secretaries stretched out atop a desk in the oval office? 4. Which president allegedly had an affair (as well as children) with a slave who was his wife's half sister? 5. Which president called his mistress "Pookie"? 6. Which president married a woman who hadn't yet divorced her first husband, and was branded an "adulterer" during his re-election campaign? 7. Which future president wrote love letters to his neighbor's wife while he was engaged to someone else? 8. Which president had a torrid affair with the first lady's personal secretary? 9. Which president had sex with a young woman in a White House coat closet - at one point, while a secret service agent prevented the hysterical first lady from attacking them? 10. Which president had sex in a closet while telling his partner about the *other* president who did the same in a closet? (The one from Question 9)? 11. Which vice president was ticked off because he felt that HIS record of sexual conquests was much more "impressive" (i.e. numerous) than the President's? 12. Which future president, while a college student, enjoyed showing off his penis (which he named Jumbo)? ANSWERS 1. John F. Kennedy 2. Bill Clinton 3. Lyndon B. Johnson 4. Thomas Jefferson 5. Bill Clinton 6. Andrew Jackson 7. Lyndon B. Johnson 8. Franklin D. Roosevelt, John F. Kennedy 9. Warren G. Harding 10. John F. Kennedy 11. Lyndon B. Johnson 12. Lyndon B. Johnson From mmotyka at lsil.com Mon Sep 14 05:12:57 1998 From: mmotyka at lsil.com (Michael Motyka) Date: Mon, 14 Sep 1998 20:12:57 +0800 Subject: IP: A CLINTON DIRTY BOOK STORY In-Reply-To: Message-ID: <35FDBFDA.4CE5@lsil.com> > The claims made by Bernard Schwartz and Loral that they did not > knowingly export military technology to China contradicts the > official briefing documents given to Ron Brown in 1994. One > Loral document obtained from the files of Ron Brown, labeled > "for Secy. Brown", has a page titled "Commercial Applications Of > DoD Technology". This document lists "Intelsat", "Cellular - > Globalstar" and "Direct Broadcast Satellite" technology along > with a variety of other products developed from "DoD" projects. > Thus, Loral knowingly exported systems they developed for the > U.S. military to China. > I can think of several versions of this: a. simple money and politics - company wants big $ deal, contributes to right politicians. ( |$| > |USA| ) --> fast track for deal b. round 2 of crypto-AG - they want to listen to the Chinese so they had better be the equipment vendor. Who operates the satellites that the Chinese radios use? You might say that to meet US Intelligence needs the range of products available outside the US should be minimized and those that are shipped should come from companies that cooperate with the NSA. It makes some *small* amount of sense but certainly plays hell with what an entrepreneurial type might want to accomplish. Pretty unfair in that regard. Especially since they have no visible control over extraterritorial ventures anyway. Civilian interest and capability in crypto must piss these guys off beyond belief. Stupid Constitution! Mike From tcmay at got.net Mon Sep 14 05:15:41 1998 From: tcmay at got.net (Tim May) Date: Mon, 14 Sep 1998 20:15:41 +0800 Subject: Predictions: Crime and Criminal Justice in the 21st Century In-Reply-To: <35FDD227.4C7D@yankton.com> Message-ID: Good post. The war is about to be joined. At 7:34 PM -0700 9/14/98, nnburk wrote: >Predictions: Crime and Criminal Justice in the 21st Century > >1. The United States will experience a significant economic >recession/crisis very close to the turn of the Century. > Agreed. The chickens are coming home to roost. America will get what it deserves. I figure the Y2K problem will be the most significant trigger event. >2. As the large pool of young people born in the early 1990s >become teenagers and young adults, there will be a dramatic >increase in violent crime around the year 2005-2010. See "A Clockwork Orange" for details. Today's Ebonics kids will be tomorrow's Droogs. >3. America will experience sporadic civil disorders/riots in >many of its urban areas during the next 10-15 years -- much of it >related to racial/ethnic problems. The inner cities will burn. 10 million ethnics will wipe themselves out. White America (and Asian America, who are honorary whites, by the University of California's admissions standards) will cluck, but will watch the inner cities burn themselves out with only a "I told you so" attitude. Miami, Chicago, Washington, LA, New York, Atlanta, New Orleans, and a dozen other cities will be like Berlin after the war. > >4. Terrorist acts by "fringe"/special issue groups will >increase at a significant rate -- becoming a major law enforcement >and security problem. Freedom fighters, not terrorists. >5. As faith in the criminal justice system declines, there >will be a rise in vigilante-based incidents where citizens take >the enforcement of crime problems into their own hands. Local justice, not vigilantism. OJ and You Know Who hanged side by side. Several million welfare thieves given the choice of hard labor for 20 or so years, to repay the money they stole, or a bullet to the head. Their choice. >6. Much of middle- and upper-class America will take a >"retreatist" attitude and move into private high-security >communities located in suburban or rural areas. Because of >technological advances, many companies and corporations will also >move out of the urban environments as well. Yes, more and more of my wealthy friends are doing this. Most of them are moving to the country, where defenses are more naturally provided, and not necessarily moving to gate communities (which are actually quite indefensible when the welfare addicts and gangbangers start rioting and dancing.) >7. Due to many of the predictions listed above, much of law >enforcement and security in the 21st Century will become >privatized and contractual. Traditional law enforcement agencies >will primarily serve urban and rural communities. "Snow Crash." > >8. Law enforcement will evolve into two major and divergent >roles: traditional law enforcement and a more specialized >military tactical role to deal with the growing urban violance >and terrorist incidents. Has already happened. The National Police Force is already mobilized against religious groups which are deemed unacceptable, pace the Branch Davidians. >9. Significant violence and unrest will plague our nation's >prisons. Major prison riots will become a regular occurrence. Burn the prisons with the inmates locked inside. Then simply execute those who commit the most serious crimes. >10. With the decrease of the possibility of major global >warfare, the United States military will take on an increased >domestic "peace-keeping" role with America's law enforcement >agencies. Posse comitatus is already becoming a moot point. The Army will be patrolling the streets within a few years, probably coterminous with Y2K problems and the resulting martial law. Militias and freedom fighters will have to start hitting U.S. military installations. Many will die. Eventually the military will abandon the Washington elite and will join the freedom fighters. Ten million politicians and welfare thieves will be put up against the wall. --Tim May (This space left blank pending determ. of acceptability to the gov't.) ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, ComSec 3DES: 831-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Licensed Ontologist | black markets, collapse of governments. From guy at panix.com Mon Sep 14 05:17:32 1998 From: guy at panix.com (Information Security) Date: Mon, 14 Sep 1998 20:17:32 +0800 Subject: a few facts on Presidential peccadillos (fwd) Message-ID: <199809150119.VAA08631@panix7.panix.com> > From: attila > > power trippers attract willing victims. > > > ANSWERS > > 1. John F. Kennedy > 2. Bill Clinton > 3. Lyndon B. Johnson > 4. Thomas Jefferson > 5. Bill Clinton > 6. Andrew Jackson > 7. Lyndon B. Johnson > 8. Franklin D. Roosevelt, John F. Kennedy > 9. Warren G. Harding > 10. John F. Kennedy > 11. Lyndon B. Johnson > 12. Lyndon B. Johnson Clinton is normal? Cool! ---guy From tcmay at got.net Mon Sep 14 05:43:59 1998 From: tcmay at got.net (Tim May) Date: Mon, 14 Sep 1998 20:43:59 +0800 Subject: Harald to be hit with U.S. cruise missiles Message-ID: At 5:45 PM -0700 9/14/98, HyperReal-Anon wrote: >On Mon, 14 Sep 1998 harald.fragner at idg.se wrote: > >> >> Do I know you? >> >> Harald >No, but we know you! You're a very evil man, Mr. Fragner, at least by the >standards of the Hired Government Ninjas. Under our standards, everyone is >evil...except government leaders. > >Expect black helicopters to be targetting your house in the next few days. >Do not be surprised if unguided rockets are shot into it. If ninjas are >coming through your windows at 2AM, just remember: We're from the >government and we're here to help you. Just bend over and grip the towel >rack. This is reprehensibile! HyperReal-Anon is alerting a Confirmed Net Terrorist to a planned U.S. cruise missile attack on Harald. Harald's crimes are not important. What is important is that the U.S. Muffdiver William Jefferson Clinton has orded the Northern Fleet to strike Harald's home and hometown and to report that Harald was a known associate of both Asama bin Laden and Phillip Zimmermann, known freedom fighters. Harald will learn that Six Degrees is monitoring all thoughtcrimes. Besides, Harald apparently used Roundup in his garden, the same nerve gas precursor found at the Baby Milk and Marzipan Factory in Khartoum. This means that Harald was manufacturing nerve gas in his Swedish home. --Tim May (This space left blank pending determ. of acceptability to the gov't.) ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, ComSec 3DES: 831-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Licensed Ontologist | black markets, collapse of governments. From guy at panix.com Mon Sep 14 05:52:58 1998 From: guy at panix.com (Information Security) Date: Mon, 14 Sep 1998 20:52:58 +0800 Subject: Predictions: Crime and Criminal Justice in the 21st Century Message-ID: <199809150153.VAA08803@panix7.panix.com> > From: Tim "I have a LOT of gold in my house" May > > America will get what it deserves. > > The inner cities will burn. 10 million ethnics will wipe themselves out. > Miami, Chicago, Washington, LA, New York, Atlanta, New Orleans, and a dozen > other cities will be like Berlin after the war. > > See "A Clockwork Orange" for details. Today's Ebonics kids will be > tomorrow's Droogs. > > Burn the prisons with the inmates locked inside. > Then simply execute those who commit the most serious crimes. > > Militias and freedom fighters will have to start hitting U.S. military > installations. Many will die. Eventually the military will abandon the > Washington elite and will join the freedom fighters. > > Ten million politicians and welfare thieves will be put up against the wall. HAHAHAHAHAHAHAHAHAHAHAHAHAHAHAHA. Who woulda thunk Toto was the sane one on the cypherpunks list? ---guy Assuming Toto had his Soma supply. From awestrop at dimensional.com Mon Sep 14 06:14:51 1998 From: awestrop at dimensional.com (Alan Westrope) Date: Mon, 14 Sep 1998 21:14:51 +0800 Subject: FBI's valiant fight against Marxism Message-ID: -----BEGIN PGP SIGNED MESSAGE----- For comic relief, see http://www.nytimes.com/yr/mo/day/news/arts/groucho-fbi-file.html and http://www.thenation.com/issue/980928/0928WIEN.HTM regarding Hoover's investigation of a famed Marxist comic. (BTW, Obergruppenfuehrer Freeh's characterization of Declan as a "radical" reminded me of the mathematical quip by that obscure Marxist comic, Karl: "To be radical is to go to the root of the equation!") Cigar jokes are left as an exercise for the reader. __ Alan Westrope PGP http://www.dim.com/~awestrop public http://www.nyx.net/~awestrop key: also via keyservers & finger PGP RSA 0xB8359639: D6 89 74 03 77 C8 2D 43 7C CA 6D 57 29 25 69 23 -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCVAwUBNf3NP1RRFMq4NZY5AQGG3gP7BIr4/31xwhpX3Ye4je4z3J3ssQ4ekqJK Ac+dAs9Mg1okgCXEJvbxuZo32oyKpOlXkCFcnu/xeXUjDJUsVqjwPUHwcLxjHMt4 lvEiomwWfKRvn9ZGWIygDZmRroJ5ZyXQaXNQW5Ao7XUIePN44pT2Ny4nRE0PjsJi WlD2O5sYqWw= =ReUo -----END PGP SIGNATURE----- From nobody at replay.com Mon Sep 14 06:35:53 1998 From: nobody at replay.com (Anonymous) Date: Mon, 14 Sep 1998 21:35:53 +0800 Subject: Larry Gilbert, AOLers, and the Hyper-real flamer Message-ID: <199809150228.EAA19097@replay.com> On Mon, 14 Sep 1998, Paul H. Merrill wrote: > > I love this to death. Some asshole sends crap data to sixdegrees > including dredged up real email addresses, then when sixdegrees and the > contacts given react in a totally appropriate manner other (?) assholes > berate them for living. And this one even manages to toss in an > anti-AOL rant where AOL plays no part. > > Such witticisms I haven't seen since my kids turned 7. > > PHM I know of several people in addition to myself who have complained to Sixdegrees about this. I've personally given up sending complaints back to them, and I lost count at 5. Sixdegrees simply ignores them. I've sent them to their upstream sites, and they either ignore them or tell me that they've forwarded them to Sixdegrees. My complaints, at least, were very civil. One explained exactly what a mailing list was, for crying out loud. I can't speak for Hyper-real's (if he sent any) and the others. You may be able to use that defense if Sixdegrees didn't know, but they do. Sixdegrees could avoid these problems very easily by adding a domain verification so that somebody from Netcom can't specify some address at toad.com and have it work. They haven't. They haven't because they don't care. Saying that some sites have screwed up rDNS and mail domains isn't a valid excuse. They can insert exemptions for Hotmail, MSN, Juno, and other sites like that if they want. Oh, maybe they have a "phobia" of this, just like AOLers apparently have a "phobia" of even making an attempt to use English properly, so it's okay. I don't think the parallel between the AOL users spamming the list and organizations like Sixdegrees spamming the list is that uncalled for either. Maybe you find any drawing of parallels offensive, Paul, and maybe you'll denounce it as "propoganda" because I might use an example in this message, and maybe you just really like AOL and think its cluelessness and broken software is the best thing since sliced bread, but that doesn't change the fact that Sixdegrees and friends are doing the same thing AOL is and that it's abuse of the network. They fire a salvo, and somebody else fires one back at their expense. By this logic, I'd next expect to read a claim that since the AOLers are getting the Cypherpunks address from somewhere, we should welcome their requests for band stickers and things like "how u do that." After all, they're the victims, and are probably the kind of people who go to look up the word "gullible" when somebody tells them it isn't in the dictionary. It's a long-established tradition to flame people like this. Some flames are better than others. Maybe if the Hyper-real user insults them enough they'll finally add Cypherpunks to their block list. I've personally grown real sick of seeing bullshit passwords, welcome messages, new password messages, updates, and other junk on this list from sites which don't bother to verify domain names. I can give them that, but I start to get pissed when they refuse to block the address. For that reason I don't mind the person or persons who are flaming these idiots and in fact, like Mr. May, I cheer them on. Personally, I *WANT* them to pour nitric acid into their computers to destroy them, so they get the hell off the net. Maybe they're scared of block lists. After all, they're similar to kill files which we all know are lists of people who need killing and since murder is illegal and immoral kill files must be too. Paul, maybe you don't mind somebody pouring grass killer on your lawn if they were submitted your address over the phone and made an "honest" mistake and fell victim to a prank, but I mind if they do it to mine, particularly since all they have to do is perform cursory checks to realize it's suspect. Oops, I made an example using a different subject matter. We're in the "blatant propoganda" stage now, I suppose. Now, since you're all for niceness in the world, you can go jump on Tim since he's doing this too. From: Tim May To: Well now I am a Mommy! , cypherpunks at toad.com Subject: Re: sixdegrees At 6:27 PM -0700 9/13/98, Well now I am a Mommy! wrote: >hi, > >I see you added me as a friend..... just wondering who you are. :) > >Christy > Hi Christy, Got your name from the Stalker's R Us group. Please post more details about your personal fantasies. Send us nude pictures, too. You say you're a Mommy. Hope there are no stretch marks. Oh, and your children can join our group too. Got any photos? --Tim May And: From: Tim May Subject: Re: News for class At 5:58 AM -0700 8/30/98, sboyd wrote: >Please inform me how I can get the news each day by e-mail at >flashboyd at aol.com. This information will be used in my comm class. Hey, "flashboyd at aol.com," why are you asking _us_? According to AOL, "AOL _is_ the Internet." (Personally, I'm cheered by the news that a net.stalker is tracking down clueless AOLers and Webbers and eviscerating them.) --Tim May SignalMonger From jpenrod at sihope.com Mon Sep 14 07:12:05 1998 From: jpenrod at sihope.com (Jeff Penrod) Date: Mon, 14 Sep 1998 22:12:05 +0800 Subject: Joe Farah 9/14 Message-ID: <3.0.2.32.19980914230008.007fb830@mailhost.IntNet.net> Americans get what they deserve I love America. I love the spacious skies. I love the amber waves of grain, the purple mountains' majesties and the fruited plains. But what I love most about America is the God-breathed revolutionary spirit that led its founders to risk everything in a desperate fight for freedom and a noble effort to write the greatest Constitution the world has ever known. But something dreadful has happened to that spirit. It's gone. Oh, there's a small remnant of people who still have it, understand it and live by it. But, apparently, the vast majority of Americans are clueless about it. They have no sense of history. They have no connection with their revolutionary past. They have no idea of how blessed they are to live with the fleeting legacy of freedom they inherited from George Washington, Thomas Jefferson, James Madison and our other forefathers who staked their lives, their fortunes and their sacred honor in a quest for liberty. Americans have grown fat and lazy, content with their material blessings and ignorant of their far more important endowment of freedom. It's enough to make you sick. Oh, sure, Americans have lots of scapegoats for their ignorance. They've been deliberately dumbed down for 30 or more years by government schools determined to turn them into mindless robots. They have been the victims of media propaganda designed to deceive them and lead them astray. And for a generation or more they have been seduced by government plans to instill in them an ever-greater sense of dependency. But those are excuses. The truth is out there. It's more readily available to Americans who choose to seek it out than any other people in history. Americans are just too busy, blind or comfortable to bother searching for it. Most don't even comprehend the way they are being manipulated -- or just don't care. In other words, ultimately, they have no one to blame but themselves. As an example of what I'm talking about, take the latest polls conducted after the release of the Starr report. Most Americans say President Clinton is doing a good job and should not resign or be impeached. A CNN/Gallup poll released the day the report went public on the Internet placed the president's job approval rating at 62 percent, about where it was before the report was released. More than half, 58 percent, said Congress should vote to censure the president for behavior that has eroded the public's respect for his ethics and truthfulness -- a thoroughly meaningless gesture, a slap on the wrist with no consequences, the kind of punishment Bill Clinton awaits more eagerly than the next class of White House interns. Almost 60 percent of those polled said they thought Clinton was fit to be president. By what standard? That's the trouble. Americans have no standards -- no unchangeable yardsticks by which they measure right and wrong, truth from fiction. Now, I don't put much stock in public opinion surveys. They are often conducted by the same corporate media interests whose agenda is inextricably tied to bigger and more intrusive government. Nevertheless, these surveys are at least an indication that our nation is in grave trouble. What do they tell us? We've lost our moorings -- just as surely as Bill Clinton has. America is morally, politically, intellectually, spiritually adrift. There are no anchors aboard. No compasses. The USS America is at the mercy of the winds and currents, and most on board don't care. As long as the crew is serving them fine food and entertaining them, the passengers don't give a second thought to their fate or their ultimate destination. In a way, Americans are getting just what they deserve. Their choice of leaders reflects their own inadequacies and shortcomings -- their own cowardice. No wonder they look at Bill Clinton without judgment. To hold him accountable would mean holding themselves to a standard of accountability. They like looking up to see a leader who is every bit as dysfunctional, soulless and lost as themselves. It's comforting, in a perverse way. And psychic and material comfort is the only standard by which Americans today measure their lives, their liberty and their pursuit of happiness. It's not an easy observation or admission to make, my fellow Americans. But somebody has to say it. A daily radio broadcast adaptation of Joseph Farah's commentaries can be heard at http://www.ktkz.com/ From tcmay at got.net Mon Sep 14 07:12:47 1998 From: tcmay at got.net (Tim May) Date: Mon, 14 Sep 1998 22:12:47 +0800 Subject: Larry Gilbert, AOLers, and the Hyper-real flamer In-Reply-To: <199809150228.EAA19097@replay.com> Message-ID: At 7:28 PM -0700 9/14/98, Anonymous wrote: >Sixdegrees could avoid these problems very easily by adding a domain >verification so that somebody from Netcom can't specify some address at >toad.com and have it work. They haven't. They haven't because they don't >care. Saying that some sites have screwed up rDNS and mail domains isn't a >valid excuse. They can insert exemptions for Hotmail, MSN, Juno, and other >sites like that if they want. Oh, maybe they have a "phobia" of this, just >like AOLers apparently have a "phobia" of even making an attempt to use >English properly, so it's okay. This is why I have been responding to "sixdedegrees" contacts with threats, death threats, threats to put them on my spam list, promises to contact their children, and other such delightful things. They have become an Internet bomb, exploding in our midst. Respond to them in kind. --Tim May P.S., Anonymous goes on to write: >Now, since you're all for niceness in the world, you can go jump on Tim >since he's doing this too. > > From: Tim May > To: Well now I am a Mommy! , cypherpunks at toad.com > Subject: Re: sixdegrees ... That's right. I say death to Sixdegrees and death to those who spam us. Kill the fuckers dead. Let Frodo sort them out. Wiping out the corporate monstrosity that is "Sixdegrees" will be sweet. --Tim May (This space left blank pending determ. of acceptability to the gov't.) ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, ComSec 3DES: 831-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Licensed Ontologist | black markets, collapse of governments. From jya at pipeline.com Mon Sep 14 07:56:48 1998 From: jya at pipeline.com (John Young) Date: Mon, 14 Sep 1998 22:56:48 +0800 Subject: DoD on Crypto, Echelon, Secrets Message-ID: <199809150349.XAA28692@dewdrop2.mindspring.com> We attended Defense Secretary Cohen's talk today at the Council on Foreign Relations in New York City on "Security in a Grave World." While not included in the prepared text, Secretary Cohen remarked in the Q&A on terrorism and encryption policy that Americans will have to decide how much privacy they will be willing to give up for protection against terrorism, and cited the FBI's similar views on the threat of encryption use by terrorists. Afterwards I had an informative chat with Kenneth Bacon, Assistant Secretary of Defense for Public Affairs, to ask about interviewing Secretary Cohen on Echelon, the global electronic intercept and surveillance system operated by the National Security Agency. Mr. Bacon said the Department will not comment on such matters. I acknowledged that was the case heretofore, but with intense European interest in Echelon, I asked if would it be possible for Secretary Cohen to give a statement on the topic. I noted that Secretary Cohen in his talk today had listed international cooperation as a principal need of US defense policy, and that Echelon had raised considerable suspicion of US interception and surveillance prowess which could inhibit international trust and cooperation. I also asked Mr. Bacon if Secretary Cohen could discuss as well the possibility of further declassification of secret technology, as with the Skipjack encryption algorithm, to enhance US economic security and for protection against information espionage. Mr. Bacon said that others in the Department would be more appropriate to discuss such topics in detail then Secretary Cohen. I asked if anyone except the Secretary had authority to discuss Echelon and declassification of secret technology. Mr. Bacon would not answer that but suggested I send a letter proposing such topics for discussion and the Department will respond. From messiah at jps.net Mon Sep 14 08:52:55 1998 From: messiah at jps.net (TM) Date: Mon, 14 Sep 1998 23:52:55 +0800 Subject: Joe Farah 9/14 (Pppbbbttt) In-Reply-To: <3.0.2.32.19980914230008.007fb830@mailhost.IntNet.net> Message-ID: <199809150446.VAA18561@smtp1.jps.net> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 [ I know this'll never get read by Joe Farah, but what the hell. Gotta speak up, right? ] At 08:00 PM 9/14/1998 , Jeff Penrod wrote: >Americans get what they deserve > >I love America. > >I love the spacious skies. I love the amber waves of grain, the purple >mountains' majesties and the fruited plains. But what I love most about >America is the God-breathed revolutionary spirit that led its founders to >risk everything in a desperate fight for freedom and a noble effort to >write the greatest Constitution the world has ever known. Yeah right. The Constitution and the Revolution were perpetrated by two different groups. The Constitution had no revolution behind it. It was created because the Articles of Confederation provided no central government, and the republic was floundering. The rich were feeling threatened by uprisings (like Shay's Rebellion). Alexander Hamilton (conspicuously missing from your list of ppl who staked their lives), the *father of the Constitution*, favored a monarchy. >But something dreadful has happened to that spirit. It's gone. Oh, there's >a small remnant of people who still have it, understand it and live by it. >But, apparently, the vast majority of Americans are clueless about it. They >have no sense of history. They have no connection with their revolutionary >past. They have no idea of how blessed they are to live with the fleeting >legacy of freedom they inherited from George Washington, Thomas Jefferson, >James Madison and our other forefathers who staked their lives, their >fortunes and their sacred honor in a quest for liberty. Actually, the Framers of the Constitution made damn sure their fortunes were covered. Article VI clearly states... "All Debts contracted and Engagements entered into, before the Adoption of this Constitution, shall be as valid against the United States under this Constitution, as under the Confederation." A large majority of the Framers were owed money by the government under the Confederation. Also, Thomas Jefferson was in Paris when the Constitution was written. He was responsible for the Declaration of Independence (a beautiful piece of writing, BTW), but not the Constitution. >Americans have >grown fat and lazy, content with their material blessings and ignorant of >their far more important endowment of freedom. Americans have growns fat and lazy, content with their material blessings and ignorant of their exploitation by the captialist society in which they live. >It's enough to make you sick. Amen. >Oh, sure, Americans have lots of scapegoats for their ignorance. They've >been deliberately dumbed down for 30 or more years by government schools >determined to turn them into mindless robots. They have been the victims of >media propaganda designed to deceive them and lead them astray. And for a >generation or more they have been seduced by government plans to instill in >them an ever-greater sense of dependency. They've been preyed upon by monopolies, they've been exploited by management, and they've been fucked up the ass by big business. Meanwhile, the largest rift between rich and poor in modern industrialized countries steadily grows wider... 1% of the population controls 90% of the wealth, and my future has been leased by old rich white men. >But those are excuses. The truth is out there. It's more readily available >to Americans who choose to seek it out than any other people in history. >Americans are just too busy, blind or comfortable to bother searching for >it. Most don't even comprehend the way they are being manipulated -- or >just don't care. In other words, ultimately, they have no one to blame but >themselves. In other words, listen to you, because you have the Truth (c)(r)(tm). >As an example of what I'm talking about, take the latest polls conducted >after the release of the Starr report. Most Americans say President Clinton >is doing a good job and should not resign or be impeached. A CNN/Gallup >poll released the day the report went public on the Internet placed the >president's job approval rating at 62 percent, about where it was before >the report was released. More than half, 58 percent, said Congress should >vote to censure the president for behavior that has eroded the public's >respect for his ethics and truthfulness -- a thoroughly meaningless >gesture, a slap on the wrist with no consequences, the kind of punishment >Bill Clinton awaits more eagerly than the next class of White House interns. So... you would rather go against the people's sovereignty and impose your own personal political agenda on the public, simply because you don't think Americans are fit to rule themselves? Hah! Americans will run America, for good or bad. That's the way the Framers intended it. In fact, I think they'd be rather pleased to see how political and economic elites have monopolized this country. The Framers were never big on majority rule. >Almost 60 percent of those polled said they thought Clinton was fit to be >president. By what standard? That's the trouble. Americans have no >standards -- no unchangeable yardsticks by which they measure right and >wrong, truth from fiction. By *their* standard, by their own personal judgement. There's no moral yardstick, and God help us if there is in the future. Who makes the yardstick? Who sits down and says, "This is the moral standard in this country, abide by it or suffer the consequences"? >Now, I don't put much stock in public opinion surveys. They are often >conducted by the same corporate media interests whose agenda is >inextricably tied to bigger and more intrusive government. Nevertheless, >these surveys are at least an indication that our nation is in grave >trouble. These surveys are an indication that you are outnumbered. America no longer abides by your wishes... DANG. Cry me a river, Joe. >What do they tell us? People's rating of Pres. Clinton? Some people's rating of Pres. Clinton? >We've lost our moorings -- just as surely as Bill Clinton has. America is >morally, politically, intellectually, spiritually adrift. There are no >anchors aboard. No compasses. The USS America is at the mercy of the winds >and currents, and most on board don't care. As long as the crew is serving >them fine food and entertaining them, the passengers don't give a second >thought to their fate or their ultimate destination. Wow.. you manage to turn FORGIVENESS into a total lack of morals in this country. Bummer if everyone in America doesn't think the way you do. >In a way, Americans are getting just what they deserve. Their choice of >leaders reflects their own inadequacies and shortcomings -- their own >cowardice. Yeah... we should go back to REAL presidents... like Harding or Grant, two worthless sacks of shit voted in by an apathetic public. Or Jefferson, who was so morally upright he fathered a child or two with his maid. Or Coolidge, who was a puppet for 19th century monopolies. This country has been fraught with stupid leaders, from post-Revolutionary times to modern. >No wonder they look at Bill Clinton without judgment. To hold him >accountable would mean holding themselves to a standard of accountability. >They like looking up to see a leader who is every bit as dysfunctional, >soulless and lost as themselves. It's comforting, in a perverse way. Would you rather the lies be hidden? Would you rather the massive coverups... the back-office political wheelings and dealings? Would you rather the lies and deceit that has plagued humanity since history began be hidden from view so you can strut around like an over-inflated rooster and crow to the world "No corruption here! We're the leaders of the free world! Our fathers would be proud"? >And >psychic and material comfort is the only standard by which Americans today >measure their lives, their liberty and their pursuit of happiness. It's not >an easy observation or admission to make, my fellow Americans. But somebody >has to say it. As opposed to what... you think people in the past sat down and thought "Well, gee, how free am I this year as compared to last year?" Hell no! They sat down and thought "Goddamnit, I don't have nothin' ta eat and the corn done died! Damn lawyers!" For most people, it simply didn't matter who was in office - the laws didn't affect them in the least. >A daily radio broadcast adaptation of Joseph Farah's commentaries can be >heard at http://www.ktkz.com/ Yay. I simply hate it when ppl wax nostalgic about the Framers. They were a bunch of white guys all trying to cover their own asses, and in the process, they came up with a government which is stable because it pits self-interest against self-interest. I will admit that the government they created was really pretty cool, but people get so damn sloppy about the *motives* of the Framers it's disgusting! They weren't guardian angels carrying out the mandate of God, they were businessmen and lawyers - some of whom had some brilliant political theories. Also, the Framers were *not* (repeat, NOT) in favor of majority rule. Only 1/6th of the original government was elected by the ppl (the House of Representatives). In fact, if you read the minutes of the meetings, ppl pointed to the abuse of Quakers in PA by a majority. Right then. I feel better now. What do other ppl think about this? -----BEGIN PGP SIGNATURE----- Version: PGP Cyber-Knights Templar build 5.5.3ckt Comment: Key ID 0x14C4FDE6 iQA/AwUBNf3wdgdZfH4UxP3mEQKEdwCgiSmoYAycs5LUbU/LlePwdFE+2AIAn3xo Wr8GhbqMP1iwH6p50ewaFEYV =oDzS -----END PGP SIGNATURE----- -- TM(independent software) http://www.sinnerz.com/tmessiah PGP Key ID: 4096/1024/0x14C4FDE6 PGP Fingerprint: 1263 DBFD F2C4 77C6 87F2 A94A 0759 7C7E 14C4 FDE6 -export-a-crypto-system-sig -RSA-3-lines-PERL #!/bin/perl -sp0777i THIS IS REALLY COOL!!! PREMIUM CHANNELS........No Monthly Bill! EASY to assemble plans for only $7.00 ! We will send your plans as soon as we receive payment for your order! YOU WILL BE WATCHING PAY-PER-VIEW, HBO, SHOWTIME, THE MOVIE CHANNEL, Adult stations, and any other scrambled signal NEXT WEEK! You can EASILY assemble a cable descrambler in less than 30 minutes! You have probably seen many advertisments for similar plans.... ** BUT OURS are BETTER! *** We have compared it to all the others and have actually IMPROVED the quality and SIMPLIFIED the design !!! ** We even include PHOTOS! ** OUR PLANS ARE BETTER! We have NEW, EASY TO READ,EASY to assemble plans for only $7.00! We have seen them advertised for as much as $29.00 and you have to wait weeks to receive them! WHAT THE OTHERS SAY IS TRUE! Parts are available at "The TV HUT" or any electronics store. Trademark rights do not allow us to use a national electronics retail chains' name but there is one in your town! Call and ask them BEFORE you order! They are very familiar with these plans and will tell you that it....... DOES INDEED WORK! ASK THEM! You will need these easy to obtain parts : 270-235 mini box 271-1325 2.2k ohm resistor 278-212 chasis connectors RG59 coaxial cable, #12 copper wire, and a variable capacitor. All you need now is the EASY TO ASSEMBLE plans to show you how to assemble this money saving device in 30 MINUTES! It is LEGAL, providing of course you use these plans for educational purposes only. IT'S FUN! We're sure you'll enjoy this! Our FAMILIES sure do! * you need one descrambler for each TV. NO MORE MONTHLY BILLS! $ 7.00 for plans only Pay by check or money order payable to: C Vogl RR1 BOX 45 EFFORT, PA 18330 Please provide a self addressed stamped envelope (.64) So we can RUSH your order to you! This ad is being sent in compliance with Senate bill 1618, Title 3, section 301. http://www.senate.gov/~murkowski/commercialemail/S771index.html Further transmissions to you by the sender of this email may be stopped at no cost to you by sending a reply to this email address with the word "remove" in the subject line. If this E-mail offends anyone, we apologize ......and feel free to use the DEL key. "By deleting your unwanted EMail you waste one key stroke, yet by throwing away paper mail you waste a planet! SAVE OUR TREES and support internet EMail instead of traditional mail"! ^^ :) From emc at wire.insync.net Mon Sep 14 09:18:56 1998 From: emc at wire.insync.net (Eric Cordian) Date: Tue, 15 Sep 1998 00:18:56 +0800 Subject: The DES Analytic Crack Project Message-ID: <199809150520.AAA13045@wire.insync.net> As some of you may have noticed, a new attempt to crack the Data Encryption Standard has been started, with a descriptive FAQ located at the following URL http://www.cyberspace.org/~enoch/crakfaq.html A while back, after the first DES challenge was announced, a number of us made the observation that a known plaintext attack on DES, expressed as a system of a few thousand boolean variables with constraints in 3-conjunctive normal form, was not too far from the size and complexity of problems that could be directly solved by bleeding edge combinatorial algorithms, albeit with signficant CPU and memory consumption. We thought this would be an interesting result, and generated a number of problems of various numbers of DES rounds based on the DES Challenge data, and some not particularly optimized S-Box representations, and set about the task of solving them, smaller problems first. We wrote a lot of code, learned a lot about arbitrary systems of boolean variables, and after breaking 2-round and 4-round problems, the first almost instantly, and the second with very reasonable amounts of resources, set about the task of seeing if we could break the higher round problems, and immortalize ourselves by beating DESCHALL to the key. To our very great regret, we did not manage to do this, and once the $10k prize was claimed, we figured the game was over and returned to working on other things. We still thought DES was a problem of approximately the right size to demonstrate the existence of an analytical solution which would beat a well-tuned exhaustive search on a problem of practical interest. Since that time, DES has been broken twice more by exhaustive search, once by distributed.net, and again by a hardware DES cracking machine designed by Net legend John Gilmore and the EFF for a non-trivial amount of money. Remarkably, although most agree DES is dead for new applications, with Moore's Law and additional hardware crackers being possible today for much less than the cost of the prototype, it still seems to enjoy a reputation amongst the public as a cipher that takes 20,000 pentiums running for half a month or a hardware box with $100k of chips running for several days to break, neither of which seems to have thrown the Fear of God into its current users, most notably the Banking Industry. With other analytic attacks like differential and linear cryptanalysis being really practical only for reduced round DES, and all current high-profile cracks on production ciphers employing key trial, the press has latched onto keysize as a synonym for strength, and has made numerous statements which have reinforced this questionable paradigm in the minds of the public. We have therefore been taking another look at our idea of a combinatorial crack of DES, and decided that even with DES having been cracked three times by key trial, it is definitely a project worth doing. This time, rather than working frantically in an unsuccessful attempt to beat other teams on a public challenge, we wish to finish up our original efforts, and repeat the three cracks previously done, this time using our algorithms, and distribute working code continuously as the project progresses, to sponsors who have donated some money to defray our costs. This will offer people the opportunity to participate vicariously in a fun project which has the potential to be a genuine paradigm shift in the way the world thinks about codebreaking. Sometimes, promising areas of research are not followed because of knowlege of some well-known result which suggests that such exploration will be unfruitful. Years ago, for instance, suggestions that programs could be checked by software for proper behavior, and run without using protected memory regions, were usually met with snide comments about the "computer halting problem" and various adjunct results. Today, there are many variants of "safe execution" technology, from prove and carry schemes, to Java bytecode, with a sound theoretical basis behind them. None of these is a violation of the "computer halting problem" results, of course. Similarly, after a large burst of activity decades ago, which resulted in the notion of NP-Completeness, and various results in computational complexity theory, suggestions that an analytic solution exists for some large combinatorial problem of practical interest conjure up visions of exponential resource utilization, speaker cluenessless, and the lack of progress on NP=P. For this reason, we feel this project is definitely a Schnelling Point. If it works, even badly, people will begin to look at lots of problems in ways they would not have considered before, and much new code which improves upon what we have done will be created. This will be an irreversible change in the Order of Things. In the several days since we put up our FAQ, we have gotten quite a few comments, and some concerns. The comments have mostly been along the lines that it is an interesting, even intriguing project. The concerns are generally that we will experience an unexpected "combinatoric explosion" in the higher round problems, and that no one in their right mind would send money to a nym, because it might just vanish and be used by the nym to live in perpetual ecstasy in some place warm and tropical, without the possiblility of the nym being sued for fraud. We hope the close coupling between the sponsors and the project members will eliminate this latter concern, with weekly progress reports and working code being distributed to permit the sponsors to reproduce our results as they occur. If three people are willing to sponsor and give us the go-ahead to begin, without wanting their money back if other sponsors do not join, we can probably get through the minimal S-Box representations and their proof-of-correctness as well as some cleaned up code for the 2-round problem. Hopefully we will then have a reputation with these people which will encourage others to join in the effort. Clearly, we're after speculative capital, rather than widow and orphan money, and hope a few of the wealthy older retired (and perhaps even crusty) engineer types might find this a productive thing to support. After all, if you've just blown $220,000 on a DES Cracker, making it $220,500 and getting your very own Schnelling Point in return is probably a reasonable amount of fun for your money. I'll stop ranting now. :) -- Sponsor the DES Analytic Crack Project http://www.cyberspace.org/~enoch/crakfaq.html From mb2657b at enterprise.powerup.com.au Tue Sep 15 01:22:28 1998 From: mb2657b at enterprise.powerup.com.au (Scott Balson) Date: Tue, 15 Sep 1998 01:22:28 -0700 (PDT) Subject: Globalisation: Demise of the Australian nation Message-ID: <001301bde082$20436560$f81c64cb@QU.fox.uq.net.ai> New book: 'GLOBALISATION: DEMISE OF THE AUSTRALIAN NATION'. � This is Graham Strachan's follow-up to his controversial sellout success, 'Economic Rationalism: a Disaster for Australia'. (See articles at: http://www.gwb.com.au/gwb/news/economic) � We recommend it to those who are concerned about where Australia will be, and has been going under the Laboral factions (Labor and Coalition parties) for the last 20 PLUS years. � Globalisation is no longer a conspiracy theory: it is official Government (and Opposition) policy! The only secret now is just what 'globalisation' means.According to the power elites it involves 'trade liberalisation' and that's it. In fact it goes far beyond that, and includes political and social globalisation as well. This book explains how it is all being engineered behind a screen of lies and half truths by dishonest politicians, corrupt media, and treacherous elites in business, government bureaucracies, academia and the churches, with the aid of false economic and social theories. While it concentrates on economic deceit, this book goes on to uncover the complete globalisation programme. The real nature of Globalism might surprise you!At $15 plus $2.50 postage (with discounts on both book and postage for larger orders) every Australian must read this book. Ordering details at Graham's website: http://www.overflow.net.au/~bizbrief. � GWB � � Scott Balson Pauline Hanson's One Nation webmaster From stuffed at stuffed.net Tue Sep 15 02:05:46 1998 From: stuffed at stuffed.net (STUFFED NEWS DAILY) Date: Tue, 15 Sep 1998 02:05:46 -0700 (PDT) Subject: READ THE FULL EXPLICIT CONTENTS OF THE STARR REPORT TODAY/PLUS CLINTON'S REBUTTAL! Message-ID: <19980915071000.5544.qmail@eureka.abc-web.com> IN TODAY'S ISSUE: 30 NEW EXTRA HOT JPEGS! 5 NEW SIZZLING STORIES HOW TO PEEL A PORN STAR'S PANTIES THE STAR REPORT IN FULL VIRGIN PENIS POLISHING BEER BASHING BOOBS STUFFED SPINS MTV'S 98 VID AWARDS ORGASMATRON THE BEST OF EUREKA CAMP CLINTON FERTILITY FINGERS FINGERED CLOSING THE DEAL THE ART OF LUST ----> http://stuffed.net/98/9/15/ <---- Welcome to today's issue of Stuffed. To read it you should click on the URL above. If it is not made clickable by your email program you will need to use your mouse to highlight the URL, copy it and then paste it into your browser (then press Return). This email is never sent unsolicited. Stuffed is the supplement for the Eureka newsletter you subscribed to. Full instructions on unsubscribing are in every issue of Eureka! ----> http://stuffed.net/98/9/15/ <---- From bill.stewart at pobox.com Mon Sep 14 11:07:01 1998 From: bill.stewart at pobox.com (Bill Stewart) Date: Tue, 15 Sep 1998 02:07:01 +0800 Subject: U.S. House only has a T-1 In-Reply-To: Message-ID: <3.0.5.32.19980914115857.008a9820@idiom.com> At 11:55 AM 9/11/98 -0700, Martin Minow wrote: >>From Jim Burns: >>Is there any effort underway to mirror the report to various >>archives? This is going to kill the DC internet corridor >>otherwise. >> >What I heard on the radio this morning was that the house >will press CD's that will be distributed to mirror servers >(presumably the major Internet news providers.) Sigh. These folks don't understand the web technology (though I suppose sneakernetting CDs to Washington press corps may actually be the fastest way for some things, but the press corps and the press companies' webmasters aren't the same folks.) It'd be simpler for them to distribute the report, and similar high-popularity information in the future, using electronic distribution to the various press agencies and other high-volume web sites, as long as they coordinate it well. It might also make sense for them to have a "press-only" subnet for insiders and major caching proxy servers to get distributions from. >Now, the real interesting question: will the files be >PGP-signed? What? And make it hard to change them later? :-) Thanks! Bill Bill Stewart, bill.stewart at pobox.com PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639 From bill.stewart at pobox.com Mon Sep 14 11:13:53 1998 From: bill.stewart at pobox.com (Bill Stewart) Date: Tue, 15 Sep 1998 02:13:53 +0800 Subject: Fwd: WHITE HOUSE MULLS NEW INTERNET TAX PROPOSAL from edupage Message-ID: <3.0.5.32.19980915001432.008abb40@idiom.com> Forwarded from Dave Farber's List ----------------------------------- I think the something at the WH has pushed them off the edge. How much you want to bet that it gives a lot more information than just the item costs. It will be used to police obscenity laws and censorship laws before it is done. Dave Ira Magaziner, President Clinton's senior Internet advisor, has proposed a new plan for tracking and taxing goods sold over the Internet that would use electronic "resident cards" and private-sector escrow agents around the world. Consumers would obtain digital cash at banks that would allow merchants to identify which country the buyer is in, but would reveal no other personal information. Consumption taxes would then be calculated, collected, and placed with an escrow agent who would then funnel the money to the appropriate government. "Governments would get their money more quickly... they would get a higher compliance rate... and the system would be easier to police," says Mr. Magaziner. (Wall Street Journal 11 Sep 98) ================================== Thanks! Bill Bill Stewart, bill.stewart at pobox.com PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639 From tom at cat.ping.deThomasAdams Mon Sep 14 11:36:32 1998 From: tom at cat.ping.deThomasAdams (Thomas Adams) Date: Tue, 15 Sep 1998 02:36:32 +0800 Subject: Starr report zipped and prepared for offline reading somewhere? Message-ID: You are all writing about Clinton and Monica et al. Dunno what this does here but anyway, let me add to the noise: Is it possible to download the Starr report somewhere, zipped and prepared for offline reading? From CTIA_Daily_News at um2.unitymail.com Tue Sep 15 02:37:10 1998 From: CTIA_Daily_News at um2.unitymail.com (CTIA Daily News) Date: Tue, 15 Sep 1998 02:37:10 -0700 (PDT) Subject: CTIA Daily News from WOW-COM - September 14, 1998 Message-ID: <199809150937.CAA04662@toad.com> ========================================== Welcome to today's edition of the CTIA Daily News from WOW-COM. Please click on the icon / attachment for the most important news in wireless communications today. Your company just formed a partnership in a country you never heard of. Are you worried about international roaming fraud? You should be. CTIA's Wireless Security '98 - It's Just Smart Business. Orlando, Florida � November 9 - 11, 1998 http://www.wow-com.com/professional Team WOW-COM wowcom at ctia.org =========================================== -------------- next part -------------- A non-text attachment was scrubbed... Name: bin00016.bin Type: application/octet-stream Size: 9664 bytes Desc: "_CTIA_Daily_News_19980914a.htm" URL: From Richard.Bragg at ssa.co.uk Mon Sep 14 14:47:08 1998 From: Richard.Bragg at ssa.co.uk (Richard.Bragg at ssa.co.uk) Date: Tue, 15 Sep 1998 05:47:08 +0800 Subject: Joe Farah 9/14 (Pppbbbttt) Message-ID: <80256680.003A249A.00@seunt002e.ssa.co.uk> >>Almost 60 percent of those polled said they thought Clinton was fit to be >>president. By what standard? That's the trouble. Americans have no >>standards -- no unchangeable yardsticks by which they measure right and >>wrong, truth from fiction. >By *their* standard, by their own personal judgement. There's no moral >yardstick, and God help us if there is in the future. Who makes the >yardstick? Who sits down and says, "This is the moral standard in this >country, abide by it or suffer the consequences"? Sorry but there are absolutes and there is a moral yardstick. Whether this is accepted or not is beside the point. There has to be absolutes otherwise any action can be excused (or damned). The real cry should be "God help us to instigate Your yardstick". God doesn't change and neither does His measure. 1)Love the Lord, with all your heart, with all you soul with all your mind and all your strength 2)Love you neibour as yourself. Everything else hangs on these. From rah at shipwright.com Mon Sep 14 15:30:26 1998 From: rah at shipwright.com (Robert Hettinga) Date: Tue, 15 Sep 1998 06:30:26 +0800 Subject: IP: Critics Pick Apart Study on Internet and Depression Message-ID: --- begin forwarded text Delivered-To: ignition-point at majordomo.pobox.com X-Sender: believer at telepath.com Date: Mon, 14 Sep 1998 21:18:32 -0500 To: believer at telepath.com From: believer at telepath.com Subject: IP: Critics Pick Apart Study on Internet and Depression Mime-Version: 1.0 Sender: owner-ignition-point at majordomo.pobox.com Precedence: list Reply-To: believer at telepath.com Source: New York Times http://www.nytimes.com/library/tech/98/09/biztech/articles/14digicom.html September 14, 1998 TECHNOLOGY COLUMN Critics Pick Apart Study on Internet and Depression By DENISE CARUSO Robert Kraut, co-author of a new study linking depression with Internet use, sounded a bit depressed himself last week. "I thought I was finished with this," Kraut, a professor of social psychology and human-computer interaction at Carnegie Mellon University, said with a sigh. He was alluding to the flood of attention -- and criticism -- that his study, titled "Home Net," had received since it was published two weeks ago. Starting in 1995, "Home Net" researchers gave PCs and free Internet accounts to 169 people in 73 families in the Pittsburgh area. After monitoring their online behavior, in some cases for more than two years, the researchers concluded that spending time on the Internet was associated with statistically significant increases in depression and loneliness. Critics assert that the study has fatal flaws that neutralize its findings and that they are appalled at the authors' far-reaching conclusions about the impact the findings might have on Internet policy and technology development. Donna Hoffman, a Vanderbilt University professor and outspoken critic of Internet research design, was unequivocal about the "Home Net" study. "Speaking as an editor, if this had crossed my desk, I would have rejected it," said Ms. Hoffman, who edits the journal Marketing Science. "The mistakes are so bad that they render the results fairly close to meaningless." Among those mistakes, she said, were the absence of two standard safeguards: a control group and random selection of subjects. "With 'Home Net,' we don't know for sure what led to their results," Ms. Hoffman said of the lack of a control group, "because we don't know what happened to people who weren't using the Internet." In addition, the study recruited people from high schools and community service organizations, instead of selecting people randomly from a large area. Random selection is crucial to building a truly representative sample of a population -- in this case, residents of the United States. The study found that one hour a week online led to small but measurable increases in depression and loneliness and loss of friendships. While those measurements might well be statistically significant, critics assert that without a random sample, they are meaningless outside the group that was studied. "The assertions have no statistical relevance to any population of Internet users beyond those in the study population -- even in principle," declared Charles Brownstein, a former director at the National Science Foundation, now an executive director at the Corporation for National Research Initiatives in Reston, Va. Although research studies do not always have to use control groups or randomly chosen participants to be valid, Ms. Hoffman said, those safeguards become imperative "when you're doing a study that claims causal relationships and that these relationships hold in the larger population." The "Home Net" team clearly made such claims. For example, the news release stated that "Carnegie Mellon Study Reveals Negative Potential of Heavy Internet Use on Emotional Well Being," and even suggested that parents move PCs out of teen-agers' bedrooms and into shared family rooms. Kraut was quoted extensively in the release, with such statements as, "We were surprised to find that what is a social technology has such anti-social consequences." Also: "Our results have clear implications for further research on personal Internet use. As we understand the reasons for the declines in social involvement, there will be implications for social policies and for the design of Internet technology." Last week, Kraut wearily defended his study. "In 1995, we did start with a control group, but it was very hard to keep it, with little in the way of incentives for them to continue to fill out questionnaires," he said. "And we couldn't use a random sample because of the nature of the study's design -- we wanted to be able to include groups who already had social connections with each other so we could observe some shifting, if it was going to occur, between existing social relationships." And despite criticism of the researchers' methods, he said that the study was widely applicable. "We have changes big enough that they aren't likely to have occurred on the basis of chance," Kraut said. "There is something here to explain." But critics like Ms. Hoffman look askance at such results, given her experience debunking other Internet studies, including one from Neilsen Media Research in which she participated in 1996 and another in 1995 in which Marty Rimm, a graduate student in Carnegie Mellon's College of Engineering, published a study purporting to show that the Internet was overrun with pornography. The impact of Rimm's study, though based on false premises and quickly discredited, was profound. The resulting furor in the media and in Congress helped bring about the Communications Decency Act, which the Supreme Court ruled was a violation of the First Amendment. Critics fear that the "Home Net" study might end up having a similar effect. "It's easy to imagine the results of this study being used to influence policy decisions about Internet access, especially in controversial funding decisions for schools and libraries," Ms. Hoffman said. But in the end, Ms. Hoffman said, protecting the Internet itself is not the point. "We're trying to protect the standard of research," she said. "This isn't obscure ivory-tower stuff that never sees the light of day. It has an impact on people's lives. If we're going to the trouble to study the Internet, at least we should make sure we're doing it right." Copyright 1998 The New York Times Company ----------------------- NOTE: In accordance with Title 17 U.S.C. section 107, this material is distributed without profit or payment to those who have expressed a prior interest in receiving this information for non-profit research and educational purposes only. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml ----------------------- ********************************************** To subscribe or unsubscribe, email: majordomo at majordomo.pobox.com with the message: (un)subscribe ignition-point email at address ********************************************** www.telepath.com/believer ********************************************** --- end forwarded text ----------------- Robert A. Hettinga Philodox Financial Technology Evangelism 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From AIMSX at aol.com Mon Sep 14 16:16:32 1998 From: AIMSX at aol.com (AIMSX at aol.com) Date: Tue, 15 Sep 1998 07:16:32 +0800 Subject: Larry Gilbert, AOLers, and the Hyper-real flamer Message-ID: <33ec7cbb.35fe5849@aol.com> Obviously you have a very high opinion of yourself and a low opinion of people who use AOL. Contrary to popular belief, there are a few intelligent people on AOL, but it looks as if you are too egotistical to realize that. Have you ever thought to look at your own mistakes before you publicize everyone else's to the world? Are you just suffering from some sort of dillusion of grandeur - thinking you are better than everyone else. Things like this are what many wars were started over, I am so happy the internet (hopefully) won't start a war in the real world. From edsmith at IntNet.net Mon Sep 14 16:21:11 1998 From: edsmith at IntNet.net (Edwin E. Smith) Date: Tue, 15 Sep 1998 07:21:11 +0800 Subject: Joe Farah 9/14 (Pppbbbttt) In-Reply-To: <3.0.2.32.19980914230008.007fb830@mailhost.IntNet.net> Message-ID: <3.0.2.32.19980915080355.007f52a0@mailhost.IntNet.net> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Thank you for your comments. Now you can go back to reading Marx. Edwin -----BEGIN PGP SIGNATURE----- Version: PGP for Personal Privacy 5.0 Charset: noconv iQA/AwUBNf5XqkmNf6b56PAtEQKlXwCfQX0DbpcjXrXl9UkxAIASKkfoAd8AoKRm 2rlzasDKGgnw+GiE2Cy1HuC+ =iz6y -----END PGP SIGNATURE----- When freedom is outlawed.......Only outlaws will be free! If cryptography is outlawed, pomz pvumbxt xjmm ibwf dszquphsbqiz. Fun! Fast! Revealing! Try "The World's Smallest Political Quiz" at: http://www.self-gov.org/quiz.html IS AIDS A GOVERNMENT/DRUG COMPANY HOAX? http://www.virusmyth.com/aids/index.htm When you blame others, you give up your power to change. Dr. Robert Anthony Libertarian Party of Hillsborough County, FL http://home.tampabay.rr.com/lphc When a place gets crowded enough to require ID's, social collapse is not far away. It is time to go elsewhere. The best thing about space travel is that it made it possible to go elsewhere. Lazarus Long From sunder at brainlink.com Mon Sep 14 17:24:10 1998 From: sunder at brainlink.com (Sunder) Date: Tue, 15 Sep 1998 08:24:10 +0800 Subject: Larry Gilbert, AOLers, and the Hyper-real flamer In-Reply-To: <33ec7cbb.35fe5849@aol.com> Message-ID: <35FE67CA.F1CCCB14@brainlink.com> AIMSX at aol.com wrote: > > Obviously you have a very high opinion of yourself and a low opinion of people > who use AOL. Contrary to popular belief, there are a few intelligent people > on AOL, but it looks as if you are too egotistical to realize that. > > Have you ever thought to look at your own mistakes before you publicize > everyone else's to the world? Are you just suffering from some sort of > dillusion of grandeur - thinking you are better than everyone else. Things > like this are what many wars were started over, I am so happy the internet > (hopefully) won't start a war in the real world. Right. Considering the scum that have drifted on here from AOL, I'd say there's a distinct pattern. As an EX-AOL user I can attest to the fact that AOL is prime grade USRDA shit. At the time I got nothing but busy signals and crashes, when I logged back in, I was told I was already logged on and had to call the customer unsupport people to get credit for my hours used by a ghost connection. Further, in the last few weeks I had my account, I received hundreds of spams, the "You've Got Mail" soundbite caused me to twitch every time I heard it. Paying $20/month for shit service with a shit browser and shit connectivity isn't my idea of a good ISP. A few weeks after, I found a local ISP that gave me a shell account for $10/month and I got no busy signals and no bullshit software and no craploads of downloads of images ("artwork") or fifty ads popping in my face upon connecting. So yeah, maybe there are "smart" people on AOL, but they're clueless when it comes to ISP since they're using the worst of the worst. I don't speak for that "nobody" but I will speak for myself and will speak from PERSONAL experience. Aol is shit. Anyone who is stupid enough to put up with shit service is either masochistic or isn't aware they're getting shit service, no matter how intelligent they may otherwise be. besides, from the cluless fuckwads that have indeed drifted here, I'd sooner hug the hotmail users, even the single celled one who spews about Misty than see an AOL luser's email address in a post! If you're so smart, find a local ISP who will give you better service and costs less. Shit, if you insist on paying $20/month and $5 hour, tell you what, switch to a cheaper ISP and send me the extra $5/hour you are now wasting, I sure could use the money! Just my $0.02 worth of flames. -- =====================================Kaos=Keraunos=Kybernetos============== .+.^.+.| Sunder |Prying open my 3rd eye. So good to see |./|\. ..\|/..|sunder at sundernet.com|you once again. I thought you were |/\|/\ <--*-->| ------------------ |hiding, and you thought that I had run |\/|\/ ../|\..| "A toast to Odin, |away chasing the tail of dogma. I opened|.\|/. .+.v.+.|God of screwdrivers"|my eye and there we were.... |..... ======================= http://www.sundernet.com ========================== From jamesd at echeque.com Mon Sep 14 17:42:13 1998 From: jamesd at echeque.com (James A. Donald) Date: Tue, 15 Sep 1998 08:42:13 +0800 Subject: Clinton--Why I am Chortling In-Reply-To: Message-ID: <199809151339.GAA02542@proxy4.ba.best.com> -- At 12:24 PM 9/14/98 -0400, Lynne L. Harrison wrote: > I don't see a power imbalance here. If a young woman in > her 20's invitingly flashes her thong panties at a man, I > don't see how she can be portrayed as the victim. According to the law applied to normal people, Monica was the victim. Also according to the law applied to normal people, Clinton was required to spill his guts about all of his sex life, because some women sued him, whereas the women suing was completely protected against any questions concerning her sex life. These laws are flagrantly unjust, but the Democrats introduced them and applied them. Feminists supported and continue to support Clinton precisely because he supported and supports laws that he flagrantly broke. If these laws are to be repealed for politicians, they should be repealed for normal people as well. --digsig James A. Donald 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG Bx5t8xgN8K1uoUuifbh23snXHu5I2qNBvzwQk6pb 4qwHCwWse7ErTTfZyYyUUnpKfLU8yjt0ak2jmSKBA ----------------------------------------------------- We have the right to defend ourselves and our property, because of the kind of animals that we are. True law derives from this right, not from the arbitrary power of the omnipotent state. http://www.jim.com/jamesd/����� James A. Donald From tubc50u4 at auto.sixdegrees.com Mon Sep 14 17:57:40 1998 From: tubc50u4 at auto.sixdegrees.com (sixdegrees) Date: Tue, 15 Sep 1998 08:57:40 +0800 Subject: Harald Fragner Message-ID: <199809151350.GAA08886@toad.com> Just a quick update from sixdegrees(tm). Unfortunately Harald Fragner (harald at fragner.net) asked not to be listed as your contact with sixdegrees. We also wanted to make sure you were aware that you currently have no other confirmed contacts, so it will be hard for you to have a productive sixdegrees experience. As you probably know, without any confirmed contacts, you won't get any results from our networking searches. So, we just wanted to recommend that you head over to http://www.sixdegrees.com , log-in, and go to MY CONTACTS to list additional relationships. ==================================================================== PLEASE NOTE: All replies to this address are processed by a computer. If you have any problems, questions or requests send an e-mail to issues at sixdegrees.com and someone will get back to you as soon as possible. ==================================================================== E.DB.BRESP.3 From rah at shipwright.com Mon Sep 14 18:03:44 1998 From: rah at shipwright.com (Robert Hettinga) Date: Tue, 15 Sep 1998 09:03:44 +0800 Subject: IP: VP GORE'S CHINA SCANDAL Message-ID: --- begin forwarded text Delivered-To: ignition-point at majordomo.pobox.com Date: Tue, 15 Sep 1998 05:33:46 -0400 (EDT) To: ignition-point at majordomo.pobox.com From: softwar at us.net (CharlesSmith) Subject: IP: VP GORE'S CHINA SCANDAL Sender: owner-ignition-point at majordomo.pobox.com Precedence: list Reply-To: softwar at us.net (CharlesSmith) http://www.worldnetdaily.com According to Chinese General Sun Tzu "All war is based on deception." Tzu wrote those words over 2,000 years ago and his first rule of war still applies today. For example, a hidden November 1994 letter written by DNC donor Sanford Robertson to President Clinton that clearly details the sale of Commerce trade trips for campaign donations. Robertson was so bold as to include a telling "P.S." where he notes for Clinton that "Bob Rubin" turned out the "Silicon Valley" at a Robertson sponsored fundraiser that took in "$100,000" for California Senator Feinstein. Of course, neither Robertson nor current Treasury Secretary Rubin expected that letter to be revealed. In November 1995, Vice President Gore called Sanford Robertson from the White House and asked for a $100,000 donation. In January 1996 Robertson obliged and kicked in $80,000 soft and $20,000 in so-called "hard" donations to the Clinton/Gore campaign. The fact that Gore made the call from inside the White House is the least of his legal problems. In 1993 Clinton named Gore to head U.S. export policy for encryption technology in a TOP SECRET order written by National Security advisor Anthony Lake. A 1996 secret memo on a secret meeting of DCIA Deutch, FBI Director Freeh and Attorney General Janet Reno states "The Vice President chairs the senior group that set the Administration's encryption policy; since Februarcy 1994 it has been supported by a working group co-chaired by NSC, and OMB, composed of NSA, CIA, FBI, State, Commerce (BXA, NIST), and Justice." In 1995 Sanford Robertson also had a big financial interest in the U.S. computer security industry. Robertson's investment firm had hundreds of millions of dollars tied up in a Massachusetts based computer company named Security Dynamics Inc. (SDI). Thus, in 1995 Gore had direct control of policy that also affected Robertson financially. Security Dynamics was able to import computer security hardware manufactured in China. SDI secured Hong Kong electronics maker RJP Industries to produce electronic computer security cards for sale in America. The Chinese manufactured cards are sold to major defense contractors, medical institutions and the U.S. government. Hong Kong millionaire Raymond Hung also owns RJP. Hung manufactured the security cards in two factories leased directly from the China National Electronics Import/Export Company (CNEIEC), a business owned by the People's Liberation Army. Thus, the computer security cards imported and sold here in the U.S. were built on a Chinese Army assembly line. Hung also owned a U.S. based company called Quorum International that went bankrupt in 1996. The company left millions in bad debt in Arizona and California. Yet, Hung was able to donate over a million dollars to the Special Olympics, donate a temple to communist China, and have his photo taken with Arnold Schwarzenegger all only days before declaring bankruptcy. Hung is also reported to have set up dozens of shell "front companies" offshore. These companies allegedly sell cheap Chinese products imported by Hung who declares bankruptcy, citing Chinese taxes on the imports. Hung, of course, splits the "taxes" with the Chinese government, and returns to America to purchase hard assets such as real estate. Despite all this Hung remains un-investigated by the Clinton administration. Hung's close working relationship with China and the Clinton administration raises another question... Could there be a "secret" back door embedded in imported hardware or software, waiting like a TROJAN HORSE, brought safely inside the secure walls by a paying customer? Could a hidden SNIFFER be hunting down passwords, code keys and sensitive data? "Absolutely," stated Info-warfare expert Winn Schwartau. "I call it 'pro-active' defense - you'll find it referenced in my original book (Information Warfare)." "Chips are made of silicon," explained Schwartau. "If you buy hardware the only way to tell exactly how it works is with a destructive test. You tear the chip apart, layer by layer. This is not only difficult but expensive. Can it happen? Just look at the multitude of hardware and software products maintained outside of the United States. How many of them are 'proprietary' designs that have never been viewed inside the U.S.?" "It is possible," agreed Forrest Mimms, a leader in the U.S. electronics engineering and well-known author. Mimms is best known to electronics hobbyists worldwide for his series of books that populate Radio Shack. "I would not be surprised to find a back door put in by the Chinese government," stated Mimms. "Go to Wal-Mart and you'll find hundreds of commercial electronics products made by Chinese government factories. In fact, I would not be surprised to find a back door put in by an independent [rouge or criminal] operation." "Yes. It is always possible to slip a Trojan horse into cryptography products, both hardware and software," stated Bruce Schneier, President of Counterpane Systems and author of the best selling book on computer security APPLIED CRYPTOGRAPHY. "Unless the user takes the time to reverse-engineer the product - - much easier to do in software than in hardware - - he is essentially trusting that the manufacturer is behaving honestly," stated Schneier. "The NSA has been rumored to have convinced several cryptography hardware companies world-wide to install Trojan horses that effectively 'leak' secrets as the hardware is used." The Chinese Army, Sanford Robertson, Al Gore and Ron Brown shared an interest in computer security technology. California based RSA Inc. is the only U.S. company that has ever been able to secure any export deal on encryption with China. Documentation held by the Commerce Department and taken by former DNC fundraiser Ira Sockowitz shows that RSA was able to obtain a trade deal with the Chinese government through a Commerce sponsored trade conference to Beijing in October 1995. In fact, both the Chairman of RSA, Jim Bidzos, and Ron Brown met in October of 1995 with Madam Wu Yi, head of China's MOFTEC (Ministry of Foreign Trade and Economic Cooperation). Al Gore also had previous legal contact with RSA Inc. in 1994. According RSA CEO James Bidzos, in March 1994 Gore sent government lawyers to RSA in a failed effort to purchase patents on encryption technology held by his company. Curiously, the envoy Gore selected to send was John Huang's boss, Commerce Counsel Ginger Lew. Even more curious is the fact that Lew claimed to know nothing about encryption in her deposition for Judicial Watch. Her lack of computer security knowledge is puzzling because Lew also possessed a 1994 document detailing penetrations of U.S. government computers using "back-door" and "SNIFFER" programs installed by unknown hackers. The document was returned in response to a Freedom of Information Request. Ms. Lew currently works at the Small Business Administration and has refused my request for an interview. In February 1996, only days after Robertson had kicked in his $100,000 to the Clinton/Gore campaign, RSA announced the China encryption export deal. In April 1996, Robertson's Security Dynamics Inc. bought RSA for $296 million above the stock value. Robertson's investment firm was paid $2 million just to write the merger document. Thus, Robertson financially benefited from the same company that Gore had previously engaged in secret government negotiations. Robertson gained $2 million for a $100,000 investment in less than 90 days. How deeply involved was Robertson with party officials? Perhaps, the real question is which party? Democrat or Communist? In an April 1994 letter Robertson reminded Brown of scheduled money-raising events for the DNC and of his efforts for DNC candidates. "P.S." Robertson wrote to Brown. "It has been fund raising season out here for the Senate and we've had events at our home for Feinstein, Lieberman, and Cooper. I wish you were still head of the DNC for the December elections, but you are obviously doing a great job at Commerce." In the same letter Robertson also noted his influence in the Chinese communist party. In April 1994 Robertson informed Brown of his successful effort to hire the son of a major Chinese Communist leader. "We have recently hired Bo Feng the son of Feng Zhijun the vice chairman of the China Democratic League and a member of the Standing Committee of the National People's Congress." On August 18, 1998 this author filed suit in Federal Court against the Clinton administration for illegally withholding documents. The documents in question were discovered at the Commerce Department in response to a Freedom of Information Request on Loral CEO Bernard Schwartz and DNC donor Sanford Robertson. At first, the Commerce Department refused to release the "22" documents because they were being withheld by unspecified "other agencies" for "consultation". On May 18, 1998 the Commerce Department released one of the 22 documents. The single document returned was the bio of W. Bowman Cutter, Deputy Assistant to the President for Economic Policy, written by the White House. "Bo" Cutter, "Bob" Rubin, Al Gore and Ron Brown were all tasked to encryption export policy in the 1993 Top Secret order from Bill Clinton written by Tony Lake. Bo, Bob, Al and Ron were part of the encryption task force detailed in the 1996 CIA/FBI/DOJ meeting. "Bo" Cutter's boss, now Treasury Secretary "Bob" Rubin, raised the 1994 $100,000 from Sanford Robertson while working inside the White House - just like Al Gore in 1995. All of these fine gentlemen were also making secret export policy... including Sanford Robertson. In addition, according to the Commerce Department FOIA officer, the remaining 21 documents were being withheld by the White House. However, the White House is NOT an agency. My source on this legal "Catch-22" is the White House legal counsel for Vice President Al Gore. In response to a 1997 FOIA request Vice President Gore's Deputy Counsel Elizabeth Brown wrote "Please be advised that FOIA applies to only records maintained by 'agencies' with in the Executive Branch. The Office of the President and the Vice President ... are not 'agencies' for the purposes of this law. Therefore, your request must be denied." The Clinton administration caved instead of facing embarrassment in court. The remaining documents withheld by the White House have been released. Both Bernard Schwartz and Sanford Robertson were given the detailed dossiers of the Chinese leadership from President Jiang Zemin, and MOFTEC's Madam Wu Yi - down to the local communist mayor of Shanghi. The new documents include information on such communist officials as Hu Qili - Minister of Electronics Industry - a former radical Red Guard member of the Chinese Youth movement. According to the hidden documents, Qili argues "that military electronics are a key technology necessary for winning modern warfare." According to Sun Tzu, all war is based on deception. War, according to Von Clausewitz, is also merely an extension of politics. The war of Clinton deception continues to this day. The administration and its agencies are continuing to withhold documents from this author, the House National Security Committee, and the House Government Oversight Committee. The White House is engaged in a cover-up of illegal activities. Evidence hidden in a deliberate and planned scheme to conceal crimes by officials currently in power. ============================================================== source documents * = new - Robertson letters to Brown & Clinton http://www.softwar.net/rscot.html <--- text version http://www.softwar.net/rsco.html <--- jpeg version - SECRET 1993 order on encryption by Anthony Lake http://www.softwar.net/not4u2c.html - Secret 1996 DCIA Deutch/FBI Freeh /AG Reno meeting http://www.softwar.net/docciat.html <--- text version http://www.softwar.net/doccia.html <--- jpeg version - * Snips from the SEC - official RSA/SDI merger document RJP, China, MFN treaty & $2,000,000 payment to Robertson & Stephens for writing merger document. http://www.softwar.net/sdi.html - * Raymond Hung with Arnie, wife with $1,000,000 check, wife with Shriver, temple donated to PRC and article ref. http://www.softwar.net/quorum.html - Interview of RSA CEO James Bidzos http://www.softwar.net/bidzos.html - * Documents held by Ginger Lew on back-doors and sniffers http://www.softwar.net/lew.html - * Documents on encryption written by Al Gore & 1997 FOIA rejection by Gore's legal counsel http://www.softwar.net/al2000.html http://www.softwar.net/gore.html http://www.softwar.net/vp.html - * Ron at CHINA WORLD - Oct. 1995 JCCT meeting with Wu Yi http://www.softwar.net/ron.html - * White House Bio of "Bo" Cutter http://www.softwar.net/boknows.html - * snips from White House documents & SOFTWAR action, bios of Jiang Zemin, Wu Yi, Hu Qili, and Huang Ju (mayor of Shanghi) http://www.softwar.net/white.html ================================================================ 1 if by land, 2 if by sea. Paul Revere - encryption 1775 Charles R. Smith SOFTWAR http://www.softwar.net softwar at softwar.net Pcyphered SIGNATURE: 5A7061066259AAE7F805238B655FF97BB1EAE42FB1C6F167AFD9964D21E2BD4A BABA05AC8A30EFA7B576D199F6F01DEA3460074026CD09F27A36919487341214 57401400416BC39E ================================================================ SOFTWAR EMAIL NEWSLETTER 09/15/1998 *** to unsubscribe reply with "unsubscribe" as subject *** ================================================================ ********************************************** To subscribe or unsubscribe, email: majordomo at majordomo.pobox.com with the message: (un)subscribe ignition-point email at address ********************************************** www.telepath.com/believer ********************************************** --- end forwarded text ----------------- Robert A. Hettinga Philodox Financial Technology Evangelism 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From frissell at panix.com Mon Sep 14 18:36:02 1998 From: frissell at panix.com (Duncan Frissell) Date: Tue, 15 Sep 1998 09:36:02 +0800 Subject: Fwd: WHITE HOUSE MULLS NEW INTERNET TAX PROPOSAL from edupage In-Reply-To: <3.0.5.32.19980915001432.008abb40@idiom.com> Message-ID: <199809151435.KAA25939@mail1.panix.com> At 12:14 AM 9/15/98 -0700, Bill Stewart wrote: >Ira Magaziner, President Clinton's senior Internet advisor, has proposed a >new plan for tracking and taxing goods sold over the Internet that would use >electronic "resident cards" and private-sector escrow agents around the >world. Consumers would obtain digital cash at banks that would allow >merchants to identify which country the buyer is in, And I thought "Monica was having sex with Clinton but Clinton wasn't having sex with Monica" was the best the joke meisters at the White House could come up with. Does Ira say how the OECD countries were going to mandate a monopoly payment system? Seems to me the number of payment systems is rising towards infinity rather than falling towards unity. The Ottawa conference is going to be a laugh riot. DCF From brownrk1 at texaco.com Mon Sep 14 18:43:40 1998 From: brownrk1 at texaco.com (Brown, R Ken) Date: Tue, 15 Sep 1998 09:43:40 +0800 Subject: Predictions: Crime and Criminal Justice in the 21st Century Message-ID: <896C7C3540C3D111AB9F00805FA78CE2013F8418@MSX11002> > nnburk[SMTP:nnburk at cobain.HDC.NET] posted 10 predictions about life in the USA for the next 10 or 15 years. They are, of course, nothing but descriptions of what's been going on for the last 30-40 years. This isn't prediction, it's extrapolation! As so often the people will always win when playing "cheat the prophet". Whatever really happens next year the chances are it won't be exactly the same as what happened last year. Ken From jya at pipeline.com Mon Sep 14 18:55:31 1998 From: jya at pipeline.com (John Young) Date: Tue, 15 Sep 1998 09:55:31 +0800 Subject: Request to DoD for InfoSec Message-ID: <199809151446.KAA14702@camel7.mindspring.com> To: kbacon at pagate.pa.osd.mil From: jya at pipeline.com Date: Tues 15 September 1998, 09:51 AM Subject: Interview Request Kenneth H. Bacon Assistant Secretary of Defense for Public Affairs OASD (PA) 1400 Defense Pentagon Washington D.C. 20301-1400 Dear Mr. Bacon, Three points of Secretary Cohen's informative talk[*] at the Council on Foreign Relations last evening would benefit by amplification, and I ask your assistance in arranging an interview with the Secretary to focus on the Department's policy on information security technology. 1. The first concerns his view on the interdependency of military and economic affairs for assurance of national security. 1.1 What does he see as the prospect for further declassification of restricted defense technology for use by industry for protection of information against economic espionage, as exemplified in the declassification of the Skipjack encryption algorithm. 1.2 And what other services and/or technology the defense supply and intelligence agencies may provide non-governmental customers in competition with other nations where closer cooperation between such agencies and industry is more common. 2. The second concerns the need for international cooperation for US defense policy and how that is impacted by publicity and criticism of the Echelon electronic intercept program and other national technical means not customarily discussed in public by the Department. 2.1 What are Secretary Cohen's views of programs such as Echelon political and international trust issues and what he is his view of European calls for investigation of Echelon. 2.2 What are Secretary Cohen's views as a constructive response to charges that Echelon and other national technical means are offensive military and economic espionage against those from whom the US desires defense cooperation. 3. In the Q&A on the topic of terrorism and encryption, Secretary Cohen remarked that the American people will have to decide how much privacy they are willing to give up in order to be protected from terrorist threats. 3.1 What are the Secretary's views on how disputes on encryption policy could be resolved in light of his calls for closer connection between military and economic interests and for international cooperation for defense policy. Your office has always been exemplary in responding to requests for information. Thank you very much. Sincerely, John Young JYA/Urban Deadline 251 West 89th Street, Suite 6E New York, NY 10024 E-mail: jya at pipeline.com Tel: 212-873-8700 Fax: 212-799-4003 * See: http://jya.com/dod091498.htm From nobody at replay.com Mon Sep 14 18:59:32 1998 From: nobody at replay.com (Anonymous) Date: Tue, 15 Sep 1998 09:59:32 +0800 Subject: The DES Analytic Crack Project Message-ID: <199809151500.RAA31305@replay.com> Eric Michael Cordian, emc at wire.insync.net, writes: > The concerns are generally that > we will experience an unexpected "combinatoric explosion" in the > higher round problems Unexpected by you, perhaps, but expected by everyone else. The complexity of the expressions should increase exponentially with the number of rounds. Extrapolating from two and four round results to eight and sixteen is the wrong model. (You can artificially suppress this by introducing new variables for each round, but that doesn't change the underlying complexity of the problem.) Can't you come up with a back-of-the-envelope estimate for the number of terms in your sixteen round expression? Even without fully optimized S-box expressions this information would be useful. If it is greater than the number of atoms on Earth then it would be a strong hint that this approach won't work. If you really want to attract money you need some kind of numbers to show that the approach has a prayer of working. Show the size of the problem you will get, estimate how much improvement you'll get with your improved S-box representations, compare it with the problems tackled by available combinatorial algorithms. You should be able to do this with a few hours of work, at least to show that the basic concept is sound (or unsound). From emc at wire.insync.net Mon Sep 14 19:21:46 1998 From: emc at wire.insync.net (Eric Cordian) Date: Tue, 15 Sep 1998 10:21:46 +0800 Subject: The DES Analytic Crack Project Message-ID: <199809151523.KAA13785@wire.insync.net> As some of you may have noticed, a new attempt to crack the Data Encryption Standard has been started, with a descriptive FAQ located at the following URL http://www.cyberspace.org/~enoch/crakfaq.html A while back, after the first DES challenge was announced, a number of us made the observation that a known plaintext attack on DES, expressed as a system of a few thousand boolean variables with constraints in 3-conjunctive normal form, was not too far from the size and complexity of problems that could be directly solved by bleeding edge combinatorial algorithms, albeit with signficant CPU and memory consumption. We thought this would be an interesting result, and generated a number of problems of various numbers of DES rounds based on the DES Challenge data, and some not particularly optimized S-Box representations, and set about the task of solving them, smaller problems first. We wrote a lot of code, learned a lot about arbitrary systems of boolean variables, and after breaking 2-round and 4-round problems, the first almost instantly, and the second with very reasonable amounts of resources, set about the task of seeing if we could break the higher round problems, and immortalize ourselves by beating DESCHALL to the key. To our very great regret, we did not manage to do this, and once the $10k prize was claimed, we figured the game was over and returned to working on other things. We still thought DES was a problem of approximately the right size to demonstrate the existence of an analytical solution which would beat a well-tuned exhaustive search on a problem of practical interest. Since that time, DES has been broken twice more by exhaustive search, once by distributed.net, and again by a hardware DES cracking machine designed by Net legend John Gilmore and the EFF for a non-trivial amount of money. Remarkably, although most agree DES is dead for new applications, with Moore's Law and additional hardware crackers being possible today for much less than the cost of the prototype, it still seems to enjoy a reputation amongst the public as a cipher that takes 20,000 pentiums running for half a month or a hardware box with $100k of chips running for several days to break, neither of which seems to have thrown the Fear of God into its current users, most notably the Banking Industry. With other analytic attacks like differential and linear cryptanalysis being really practical only for reduced round DES, and all current high-profile cracks on production ciphers employing key trial, the press has latched onto keysize as a synonym for strength, and has made numerous statements which have reinforced this questionable paradigm in the minds of the public. We have therefore been taking another look at our idea of a combinatorial crack of DES, and decided that even with DES having been cracked three times by key trial, it is definitely a project worth doing. This time, rather than working frantically in an unsuccessful attempt to beat other teams on a public challenge, we wish to finish up our original efforts, and repeat the three cracks previously done, this time using our algorithms, and distribute working code continuously as the project progresses, to sponsors who have donated some money to defray our costs. This will offer people the opportunity to participate vicariously in a fun project which has the potential to be a genuine paradigm shift in the way the world thinks about codebreaking. Sometimes, promising areas of research are not followed because of knowlege of some well-known result which suggests that such exploration will be unfruitful. Years ago, for instance, suggestions that programs could be checked by software for proper behavior, and run without using protected memory regions, were usually met with snide comments about the "computer halting problem" and various adjunct results. Today, there are many variants of "safe execution" technology, from prove and carry schemes, to Java bytecode, with a sound theoretical basis behind them. None of these is a violation of the "computer halting problem" results, of course. Similarly, after a large burst of activity decades ago, which resulted in the notion of NP-Completeness, and various results in computational complexity theory, suggestions that an analytic solution exists for some large combinatorial problem of practical interest conjure up visions of exponential resource utilization, speaker cluenessless, and the lack of progress on NP=P. For this reason, we feel this project is definitely a Schnelling Point. If it works, even badly, people will begin to look at lots of problems in ways they would not have considered before, and much new code which improves upon what we have done will be created. This will be an irreversible change in the Order of Things. In the several days since we put up our FAQ, we have gotten quite a few comments, and some concerns. The comments have mostly been along the lines that it is an interesting, even intriguing project. The concerns are generally that we will experience an unexpected "combinatoric explosion" in the higher round problems, and that no one in their right mind would send money to a nym, because it might just vanish and be used by the nym to live in perpetual ecstasy in some place warm and tropical, without the possiblility of the nym being sued for fraud. While we hope the close coupling between the sponsors and the project members will eliminate this latter concern, with weekly progress reports and working code being distributed to permit the sponsors to reproduce our results as they occur. If three people are willing to sponsor and give us the go-ahead to begin, without wanting their money back if other sponsors do not join, we can probably get through the minimal S-Box representations and their proof-of-correctness as well as some cleaned up code for the 2-round problem. Hopefully we will then have a reputation with these people which will encourage others to join in the effort. Clearly, we're after speculative capital, rather than widow and orphan money, and hope a few of the wealthy older retired (and perhaps even crusty) engineer types might find this a productive thing to support. After all, if you've just blown $220,000 on a DES Cracker, making it $220,500 and getting your very own Schnelling Point in return is probably a reasonable amount of fun for your money. I'll stop ranting now. :) -- Sponsor the DES Analytic Crack Project http://www.cyberspace.org/~enoch/crakfaq.html From tleininger at moraine.tec.wi.us Mon Sep 14 19:23:39 1998 From: tleininger at moraine.tec.wi.us (Terry Leininger) Date: Tue, 15 Sep 1998 10:23:39 +0800 Subject: Zipped Starr Report Message-ID: <35FEA2F2.70758DE5@moraine.tec.wi.us> >You are all writing about Clinton and Monica et al. Dunno what this does here >but anyway, let me add to the noise: >Is it possible to download the Starr report somewhere, zipped and prepared for >offline reading? Try http://www.angelfire.com/wa/starreport/home.html Couldn't help it... From mmotyka at lsil.com Mon Sep 14 19:46:43 1998 From: mmotyka at lsil.com (Michael Motyka) Date: Tue, 15 Sep 1998 10:46:43 +0800 Subject: DoD on Crypto, Echelon, Secrets In-Reply-To: <199809150349.XAA28692@dewdrop2.mindspring.com> Message-ID: <35FE8B14.FBA@lsil.com> John Young wrote: > > We attended Defense Secretary Cohen's talk today at the Council on > Foreign Relations in New York City on "Security in a Grave World." > > While not included in the prepared text, Secretary Cohen remarked > in the Q&A on terrorism and encryption policy that Americans will > have to decide ?how much? privacy they will be willing to give up for > protection against terrorism... > zero From rah at shipwright.com Mon Sep 14 20:00:54 1998 From: rah at shipwright.com (Robert Hettinga) Date: Tue, 15 Sep 1998 11:00:54 +0800 Subject: IP: INS Offers Biometric System for Frequent Flyers Message-ID: --- begin forwarded text Delivered-To: ignition-point at majordomo.pobox.com X-Sender: believer at telepath.com Date: Tue, 15 Sep 1998 09:18:32 -0500 To: believer at telepath.com From: believer at telepath.com Subject: IP: INS Offers Biometric System for Frequent Flyers Mime-Version: 1.0 Sender: owner-ignition-point at majordomo.pobox.com Precedence: list Reply-To: believer at telepath.com Source: Wired http://www.wired.com/news/news/technology/story/15014.html US Takes Immigration in Hand by Theta Pavis 4:00am15.Sep.98.PDT It's been 44 years since Ellis Island closed shop, but immigration can still be a long, tiresome process. In an effort to speed the process for international travelers, the US Immigration and Naturalization Service is offering a biometric system for willing frequent flyers. So far, 71,000 people in six airports have signed up for the system, called INSPASS. It employs a biometric kiosk to scan and match the geometric dimensions of travelers' hands, verify their identities, and perform standard background checks. The INS plans to expand the program to four additional airports by the end of the year. "It creates a fast lane for people," said James Wayman, head of the federally funded National Biometric Test Center at San Jose State University. The kiosks were integrated by EDS, which has had a US$300 million contract with the INS for automation support and software development since 1994. This summer, the INS awarded a new, five-year information-technology contract worth $750 million to EDS and four other companies. Ann Cohen, an EDS vice president in the government services group, said the fact that so many people have signed up for the INSPASS system shows that biometrics are becoming more popular and could be commonplace in the future. "Were getting over that 'Big Brother' hurdle," Cohen said. As e-commerce develops and terrorism grows, biometrics increasingly are the "only sure way to get security." US and Canadian citizens flying overseas on business at least three times a year are eligible for the free INSPASS program. People from Bermuda and 26 other countries that have visa-waiver agreements with the United States are also eligible. The INSPASS kiosks, which look like ATM machines, were recently installed at the Los Angeles International Airport, where more than 1,000 people have enrolled in the program. Rico Cabrera, a spokesman with the INS Los Angeles regional office, said travelers like the fact that INSPASS can check their identity in 16 to 60 seconds, a process that can take up to three hours at some airports. The largest group of INSPASS users at LAX are US citizens, followed by Australians and New Zealanders. After filling out a one-page form and passing a background check, travelers can be issued a Port Pass card with their picture and a 12-number ID on it. A traveler inserts the card in the kiosk, which reads the ID number and links to a centralized database run by US Customs. A geometric hand template is called up from the database and transferred to the kiosk. After a green light flashes, the right hand is placed on a reflective surface -- the ID-3D Handkey, made by Recognition Systems. The HandKey uses a video camera to take a geometric image of the traveler's hand and fingers, and the data is converted using compression algorithms. If it matches the template of the hand stored in the database, the traveler is in. INSPASS kiosks are also in use at airports in Newark, Miami, Kennedy (New York), Pearson (Toronto), and Vancouver, British Columbia. The INS eventually plans to install them at most busy international airports around the country, including Washington, San Francisco, Seattle, and Honolulu. The department has geared the program toward business travelers, diplomats, airline personnel, and other "low-risk" visitors. Some argue that the INS hasn't done enough to market the program. Jeffrey Betts, WorldWide Solution Manager for IBM -- which has developed FastGate, a kiosk similar to INSPASS -- said people aren't enrolling fast enough in the INS system. International arrivals at airports across the globe are growing every year by 7 to 10 percent, Betts said, but border control resources are flat or declining. In 1996, some 65,000 people were enrolled in the INSPASS program, but the program has added just 6,000 new users since then. IBM, which has been running a small pilot program of FastGate in Bermuda for the past year, is building a system where people can swipe a credit card through a kiosk at the airport and connect with a database where the biometrics are stored. "Governments will have to find ways to do more with less or force travelers to queue like cattle," Betts said. While the government plans on marketing INSPASS more aggressively in the future, Schmidt said, INS is counting on word of mouth to get new people enrolled. "We don't really have the budget for a huge marketing campaign," she said. ----------------------- NOTE: In accordance with Title 17 U.S.C. section 107, this material is distributed without profit or payment to those who have expressed a prior interest in receiving this information for non-profit research and educational purposes only. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml ----------------------- ********************************************** To subscribe or unsubscribe, email: majordomo at majordomo.pobox.com with the message: (un)subscribe ignition-point email at address ********************************************** www.telepath.com/believer ********************************************** --- end forwarded text ----------------- Robert A. Hettinga Philodox Financial Technology Evangelism 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From tcmay at got.net Mon Sep 14 20:01:29 1998 From: tcmay at got.net (Tim May) Date: Tue, 15 Sep 1998 11:01:29 +0800 Subject: Zipped Starr Report In-Reply-To: <35FEA2F2.70758DE5@moraine.tec.wi.us> Message-ID: At 10:25 AM -0700 9/15/98, Terry Leininger wrote: >>You are all writing about Clinton and Monica et al. Dunno what this >does here >>but anyway, let me add to the noise: > >>Is it possible to download the Starr report somewhere, zipped and >prepared for >>offline reading? > Don't you mean _unzipped_? --Tim May (This space left blank pending determ. of acceptability to the gov't.) ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, ComSec 3DES: 831-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Licensed Ontologist | black markets, collapse of governments. From mmotyka at lsil.com Mon Sep 14 20:01:48 1998 From: mmotyka at lsil.com (Michael Motyka) Date: Tue, 15 Sep 1998 11:01:48 +0800 Subject: Joe Farah 9/14 (Pppbbbttt) In-Reply-To: <80256680.003A249A.00@seunt002e.ssa.co.uk> Message-ID: <35FE8E27.542C@lsil.com> Richard.Bragg at ssa.co.uk wrote: > > >>Almost 60 percent of those polled said they thought Clinton was fit to be > >>president. By what standard? That's the trouble. Americans have no > >>standards -- no unchangeable yardsticks by which they measure right and > >>wrong, truth from fiction. > > >By *their* standard, by their own personal judgement. There's no moral > >yardstick, and God help us if there is in the future. Who makes the > >yardstick? Who sits down and says, "This is the moral standard in this > >country, abide by it or suffer the consequences"? > > Sorry but there are absolutes and there is a moral yardstick. Whether this > is accepted or not is beside the point. > > There has to be absolutes otherwise any action can be excused (or damned). > The real cry should be > "God help us to instigate Your yardstick". God doesn't change and neither > does His measure. > > 1)Love the Lord, with all your heart, with all you soul with all your mind > and all your strength > 2)Love you neibour as yourself. > > Everything else hangs on these. > BULLSHIT BULLSHIT BULLSHIT Grow Up You're a customs inspector, what? From carolann at censored.org Mon Sep 14 20:18:05 1998 From: carolann at censored.org (Carol Anne Cypherpunk) Date: Tue, 15 Sep 1998 11:18:05 +0800 Subject: Zipped Starr Report In-Reply-To: <35FEA2F2.70758DE5@moraine.tec.wi.us> Message-ID: <3.0.2.32.19980915111604.0071bd08@pop.primenet.com> At 09:04 AM 9/15/98 -0700, Tim May wrote: > >At 10:25 AM -0700 9/15/98, Terry Leininger wrote: >>>Is it possible to download the Starr report somewhere, zipped and >>prepared for >>>offline reading? >> Hey! Wait'll I change out of my blue dress...till you unzipppp.. >Don't you mean _unzipped_? > > >--Tim May > >(This space left blank pending determ. of acceptability to the gov't.) >---------:---------:---------:---------:---------:---------:---------:---- >Timothy C. May | Crypto Anarchy: encryption, digital money, >ComSec 3DES: 831-728-0152 | anonymous networks, digital pseudonyms, zero >W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, >Licensed Ontologist | black markets, collapse of governments. > > > > Member Internet Society - Certified Mining Co. Guide - Webmistress *********************************************************************** Carol Anne Braddock (cab8) carolann at censored.org 206.165.50.96 My Homepage The Cyberdoc *********************************************************************** Will lobby Congress for Food & Expenses!!! -------------- next part -------------- A non-text attachment was scrubbed... Name: pgp00000.pgp Type: application/octet-stream Size: 231 bytes Desc: "PGP signature" URL: From CTIA_Daily_News at um2.unitymail.com Tue Sep 15 11:34:29 1998 From: CTIA_Daily_News at um2.unitymail.com (CTIA Daily News) Date: Tue, 15 Sep 1998 11:34:29 -0700 (PDT) Subject: CTIA Daily News from WOW-COM - September 15, 1998 Message-ID: <199809151820.NAA05679@mailstrom.revnet.com> ========================================== Welcome to today's edition of the CTIA Daily News from WOW-COM.� Please click on the icon / attachment for the most important news in wireless communications today. The Newest Most Comprehensive Tradeshow of Wireless Computing and Communications is Only a Month Away. Register TODAY! http://www.wirelessit.com/register.htm Team WOW-COM wowcom at ctia.org =========================================== -------------- next part -------------- A non-text attachment was scrubbed... Name: bin00018.bin Type: application/octet-stream Size: 10487 bytes Desc: "CTIA_Daily_News_19980915.htm" URL: From emc at wire.insync.net Mon Sep 14 20:52:19 1998 From: emc at wire.insync.net (Eric Cordian) Date: Tue, 15 Sep 1998 11:52:19 +0800 Subject: The DES Analytic Crack Project In-Reply-To: <199809151500.RAA31305@replay.com> Message-ID: <199809151652.LAA13965@wire.insync.net> Anonymous >> The concerns are generally that we will experience an unexpected >> "combinatoric explosion" in the higher round problems > Unexpected by you, perhaps, but expected by everyone else. The > complexity of the expressions should increase exponentially with the > number of rounds. Extrapolating from two and four round results to > eight and sixteen is the wrong model. (You can artificially suppress > this by introducing new variables for each round, but that doesn't > change the underlying complexity of the problem.) The size of the problem scales linearly with the number of rounds, and of course additional variables are introduced to make sure that terms in the CNF representation reference three or less variables. The number of such terms is clearly bounded by the cube of the number of variables, and practical experiments with a wide variety of problems illustrate that memory usage is generally limited to a small integer multiple of the original problem size. Intractability generally appears as a lack of locality, in that canonicalization of the problem requires the use of algebraic identities involving large numbers of terms, such identities becoming statistically more rare with increasing N. We anticipate that the set of such identities required to converge a DES problem will have a small N, and we will simply augment that set should the algorithm cease to make progress prior to finding a solution. We know there will be no memory explosion, and CPU should remain small enough for us to achieve our stated goal of less than a day on a $5k workstation. > Can't you come up with a back-of-the-envelope estimate for the number > of terms in your sixteen round expression? Even without fully > optimized S-box expressions this information would be useful. If it > is greater than the number of atoms on Earth then it would be a strong > hint that this approach won't work. Back when we were working on the original DES challenge, with naive S-Box optimization, the size of the input data sets were as follows. vars implications 3-CNF terms ---- ------------ ----------- 2-round 2015 4046 1959 4-round 4588 9192 4596 8-round 9852 19720 9860 16-round 20389 40794 20397 > If you really want to attract money you need some kind of numbers to > show that the approach has a prayer of working. Show the size of the > problem you will get, estimate how much improvement you'll get with > your improved S-box representations, compare it with the problems > tackled by available combinatorial algorithms. You should be able to > do this with a few hours of work, at least to show that the basic > concept is sound (or unsound). Our original input sets were generated by a very indirect method, involving an original implementation as switch networks, a conversion to NANDs, and ultimately, 3-conjunctive normal form, with some simple local optimization along the way. We are a lot better at setting up these problems now than we were the first time we tried, and anticipate that we can knock down the variable count by at least a factor of four by precomputing minimal S-Box representations. This will result in a combinatorial problem in 4000 to 5000 variables for full 16-round DES, and make this problem approximately equal in size to where the 4-round problem is now. We've run quite a few medium-sized problems through our combinatorial algorithms, including reduced-round DES, factoring the 32 bit product of two 16 bit primes written in terms of individual 2-intput logical functions, and various problems involving minimizing representations of boolean functions with respect to a specific cost criteria. So far, no huge surprises. Finding the global minimum cost representation of an S-Box in terms of selected other functions is actually a good-sized combinatorial problem in and of itself, and should serve to illustrate how our algorithms work prior to embarking upon the higher round DES cracks. We don't suggest that these algorithms magically solve every conceivable problem, merely that they seem to do a satisfactory job on a number of problems of practical interest. -- Sponsor the DES Analytic Crack Project http://www.cyberspace.org/~enoch/crakfaq.html From nobody at replay.com Mon Sep 14 21:03:37 1998 From: nobody at replay.com (Anonymous) Date: Tue, 15 Sep 1998 12:03:37 +0800 Subject: No Subject Message-ID: <199809151705.TAA07717@replay.com> Hi, There seems to be a problem posting anonymous messages to cypherpunks at ssz.com. I have posted several messages over the past week and *none* of them have showed up. I am posting this as a test message. I am sending it to the following addresses: cypherpunks at toad.com cypherpunks at ssz.com cypherpunks at algebra.com cypherpunks at cyberpass.net I will add the server name to the subject line for each post to test which messages are being delivered and which are not. I AM TOTOCUS!! From billp at nmol.com Mon Sep 14 21:05:15 1998 From: billp at nmol.com (bill payne) Date: Tue, 15 Sep 1998 12:05:15 +0800 Subject: CHRYSLER AWARD NOMINATION STATEMENT Message-ID: <35FE9AD7.1805@nmol.com> CHRYSLER AWARD NOMINATION STATEMENT American forefathers drafted the Constitution and laws of our country shortly after having suffered injustice. Fresh in their minds were strategies used by their oppressors. Writers of the Constitution and laws anticipated ways subvert our system. Therefore, our forefathers designed safeguards into our legal system to prevent future injustice. But these safeguards DON�T appear to be working today. Morales and Payne designed a strategy using the National Security Agency [NSA], Sandia National Laboratories, the US Federal Court System, and publication on Internet to illustrate how the US government system has deteriorated. Arthur Morales WAS a supervisor at Sandia Labs in 1991. Morales and Manuel Garcia organized a class action lawsuit on behalf of minority and women against Sandia. Sandia settled Morales� and Garcia�s lawsuit. Department of Energy acknowledged from Freedom of Information Act [FOIA] requests that as of December 31, 1995 Morales cost Sandia $567,137 in legal fees. Sandia retaliated against Morales. Morales sued Sandia in New Mexico District Court. Morales lost William Payne wrote a technical report describing �deficiencies� NSA�s cryptographic algorithms http://jya.com/da/whpda.htm. Sandia transferred Payne to break electronics locks for the Federal Bureau of Invesitgation [FBI]. Payne refused to do illegal work. http://www.jya.com/whp1.htm. Payne sued Sandia in Federal Court. Payne lost and court records were sealed. FBI agent Bernardo Perez led a class action lawsuit against the FBI for race discrimination against Hispanic FBI agents. http://www.usdoj.gov/osg/1995/w951482w.txt Perez won. Perez was assigned agent-in-charge of the FBI in Albuquerque for settlement. But Perez lost money. Morales and Payne learned that the FBI extorted an inexpensive from Perez by telling Perez that the FBI was GUARANTEED to win on appeal in Federal Circuit. With Perez� and others knowledge of circuit courts, Morales and Payne appealed their respective cases pro se to the Tenth Circuit. In Payne�s case Sandia failed to submit its Brief of the Appellees on time. Then falsified its certificate of service when Payne filed to remand. In Morales� case Sandia submitted a deficient Brief of the Appellees which was returned, missed the filing date, and failed to serve Morales with its late brief. Payne and Morales both won at the Tenth Circuit. But judges awarded the wins to Sandia. All attempts by Morales and Payne to get copies of the docket for their respective Tenth Circuit cases failed. Therefore, Morales and Payne hatched a plan to get the dockets and expose government misconduct. Payne previously made FOIA requests to NSA for copies of messages and translations given to Iraq during the Iraq/Iran war, copies of Libyan messages intercepted by NSA, and NSA cryptographic algorithms Payne thought contained deficiencies. Morales and Payne sued NSA pro se for the documents. Lawsuit progress was broadcast on Internet through e-mail and http://www.aci.net/kalliste/speccoll.htm http://jya.com/whpfiles.htm And Payne wrote Black and White Test of Cryptographic Algorithms criticizing the US government�s crypto contest. http://zolatimes.com. Morales and Payne FINALLY got copies of dockets from their respective cases from the Tenth Circuit using Internet as a an innovative tool. 9/15/98 10:39 AM John Young J Orlin Grabbe Zola and OTHERS 495 words counted by MS Word. Please e-mail any editing improvements to John Young. I will meet Morales for lunch. Then phone John Young. Thanks in advance. bill From nobody at replay.com Mon Sep 14 21:05:15 1998 From: nobody at replay.com (Anonymous) Date: Tue, 15 Sep 1998 12:05:15 +0800 Subject: No Subject Message-ID: <199809151706.TAA07769@replay.com> Hi, There seems to be a problem posting anonymous messages to cypherpunks at ssz.com. I have posted several messages over the past week and *none* of them have showed up. I am posting this as a test message. I am sending it to the following addresses: cypherpunks at toad.com cypherpunks at ssz.com cypherpunks at algebra.com cypherpunks at cyberpass.net I will add the server name to the subject line for each post to test which messages are being delivered and which are not. I AM TOTOCUS!! From nobody at replay.com Mon Sep 14 21:06:04 1998 From: nobody at replay.com (Anonymous) Date: Tue, 15 Sep 1998 12:06:04 +0800 Subject: No Subject Message-ID: <199809151707.TAA07821@replay.com> Hi, There seems to be a problem posting anonymous messages to cypherpunks at ssz.com. I have posted several messages over the past week and *none* of them have showed up. I am posting this as a test message. I am sending it to the following addresses: cypherpunks at toad.com cypherpunks at ssz.com cypherpunks at algebra.com cypherpunks at cyberpass.net I will add the server name to the subject line for each post to test which messages are being delivered and which are not. I AM TOTOCUS!! From rah at shipwright.com Mon Sep 14 21:12:16 1998 From: rah at shipwright.com (Robert Hettinga) Date: Tue, 15 Sep 1998 12:12:16 +0800 Subject: Mersienne crack busted... Message-ID: Somebody evidently installed the Mersienne(sp?) prime search client on 2000+ AT&T machines. The local talk station news has a report that they have just been apprehended and will be prosecuted for it. Interesting times, indeed... Cheers, Bob Hettinga ----------------- Robert A. Hettinga Philodox Financial Technology Evangelism 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From nobody at replay.com Mon Sep 14 21:12:32 1998 From: nobody at replay.com (Anonymous) Date: Tue, 15 Sep 1998 12:12:32 +0800 Subject: No Subject Message-ID: <199809151706.TAA07763@replay.com> Hi, There seems to be a problem posting anonymous messages to cypherpunks at ssz.com. I have posted several messages over the past week and *none* of them have showed up. I am posting this as a test message. I am sending it to the following addresses: cypherpunks at toad.com cypherpunks at ssz.com cypherpunks at algebra.com cypherpunks at cyberpass.net I will add the server name to the subject line for each post to test which messages are being delivered and which are not. I AM TOTOCUS!! From sunder at brainlink.com Mon Sep 14 21:25:33 1998 From: sunder at brainlink.com (Sunder) Date: Tue, 15 Sep 1998 12:25:33 +0800 Subject: Predictions: Crime and Criminal Justice in the 21st Century In-Reply-To: <35FDD227.4C7D@yankton.com> Message-ID: <35FEA26E.B168F6AA@brainlink.com> nnburk wrote: > > Predictions: Crime and Criminal Justice in the 21st Century > > 1. The United States will experience a significant economic > recession/crisis very close to the turn of the Century. I see this as well and agree with it. The recent stock market rocking back and forth is a sign that something sucks, and sucks badly. Y2K will of course make this into a bigger horror. > 2. As the large pool of young people born in the early 1990s > become teenagers and young adults, there will be a dramatic > increase in violent crime around the year 2005-2010. I don't necessarily see this. What do you base this on? Outside of where I live, there is an elementary school. Young kids these days are made to wear UNIFORMS and carry ID's and can only go to school with see through bags and must pass through metal detectors and/or be frisked. Further, one of the local newspapers (Times? Daily News? Post?) here in NYC had some story about how the city school security will be taken over by the police department, effectively turning schools into jails. IMHO, this won't turn out delinquents, this will turn out slaves who are used to being treated as slaves, are used to having no freedoms and don't expect them; they'll live without privacy and they'll like it. Those are your kids America: sheep! Mindless slaves rarely rebel; unless you take away their MTV and their Sony Playstations I doubt this. > 3. America will experience sporadic civil disorders/riots in > many of its urban areas during the next 10-15 years -- much of it > related to racial/ethnic problems. Doubt it. Unless they can't get food or money, or IF there are massive blackouts they will riot, but will do so to break into stores and loot. (Speaking based on LA riots and riots here in NYC about a decade or two ago when power failed.) > 4. Terrorist acts by "fringe"/special issue groups will > increase at a significant rate -- becoming a major law enforcement > and security problem. Okay, this is likely. > 5. As faith in the criminal justice system declines, there > will be a rise in vigilante-based incidents where citizens take > the enforcement of crime problems into their own hands. The rest of your prediction sounds like you've watched Robocop a few times too many and actually BELIEVED it! :) Care to back it up with reasons? > 6. Much of middle- and upper-class America will take a > "retreatist" attitude and move into private high-security > communities located in suburban or rural areas. Because of > technological advances, many companies and corporations will also > move out of the urban environments as well. > > 7. Due to many of the predictions listed above, much of law > enforcement and security in the 21st Century will become > privatized and contractual. Traditional law enforcement agencies > will primarily serve urban and rural communities. > > 8. Law enforcement will evolve into two major and divergent > roles: traditional law enforcement and a more specialized > military tactical role to deal with the growing urban violance > and terrorist incidents. > > 9. Significant violence and unrest will plague our nation's > prisons. Major prison riots will become a regular occurrence. > > 10. With the decrease of the possibility of major global > warfare, the United States military will take on an increased > domestic "peace-keeping" role with America's law enforcement > agencies. -- =====================================Kaos=Keraunos=Kybernetos============== .+.^.+.| Sunder |Prying open my 3rd eye. So good to see |./|\. ..\|/..|sunder at sundernet.com|you once again. I thought you were |/\|/\ <--*-->| ------------------ |hiding, and you thought that I had run |\/|\/ ../|\..| "A toast to Odin, |away chasing the tail of dogma. I opened|.\|/. .+.v.+.|God of screwdrivers"|my eye and there we were.... |..... ======================= http://www.sundernet.com ========================== From sunder at brainlink.com Mon Sep 14 21:41:03 1998 From: sunder at brainlink.com (Sunder) Date: Tue, 15 Sep 1998 12:41:03 +0800 Subject: Larry Gilbert, AOLers, and the Hyper-real flamer In-Reply-To: <199809150228.EAA19097@replay.com> Message-ID: <35FEA45C.4B167064@brainlink.com> Anonymous wrote: > I know of several people in addition to myself who have complained to > Sixdegrees about this. I've personally given up sending complaints back to > them, and I lost count at 5. Sixdegrees simply ignores them. I've sent > them to their upstream sites, and they either ignore them or tell me that > they've forwarded them to Sixdegrees. My complaints, at least, were very > civil. One explained exactly what a mailing list was, for crying out loud. > I can't speak for Hyper-real's (if he sent any) and the others. You may be > able to use that defense if Sixdegrees didn't know, but they do. Don't ignore the fact that 6degrees of spam, like most other organizations that pose as a free service do so to make money from ads. The more sheep view the ads of their true clients, the more money they make. They have no interest in cutting down the supply of viewers. If a mailing list gets spammed because of an asshole, so much the better since many of that list might go and check out the site, even if just to find contact info to complain to. -- =====================================Kaos=Keraunos=Kybernetos============== .+.^.+.| Sunder |Prying open my 3rd eye. So good to see |./|\. ..\|/..|sunder at sundernet.com|you once again. I thought you were |/\|/\ <--*-->| ------------------ |hiding, and you thought that I had run |\/|\/ ../|\..| "A toast to Odin, |away chasing the tail of dogma. I opened|.\|/. .+.v.+.|God of screwdrivers"|my eye and there we were.... |..... ======================= http://www.sundernet.com ========================== From jimg at mentat.com Mon Sep 14 21:43:42 1998 From: jimg at mentat.com (Jim Gillogly) Date: Tue, 15 Sep 1998 12:43:42 +0800 Subject: The DES Analytic Crack Project Message-ID: <199809151742.KAA12178@zendia.mentat.com> nobody said: > > Eric Michael Cordian, emc at wire.insync.net, writes: > > > The concerns are generally that > > we will experience an unexpected "combinatoric explosion" in the > > higher round problems > > Unexpected by you, perhaps, but expected by everyone else. The complexity > of the expressions should increase exponentially with the number of > rounds. Extrapolating from two and four round results to eight and > sixteen is the wrong model. ... > > Can't you come up with a back-of-the-envelope estimate for the number of > terms in your sixteen round expression? Even without fully optimized > S-box expressions this information would be useful. If it is greater than > the number of atoms on Earth then it would be a strong hint that this > approach won't work. In the early 1980's I started trying this approach. I did the back-of-the-envelope estimate and realized it was too big, but I thought it worth trying, since if there were a back door in DES it might manifest itself by a massive collapse in the complexity of these expressions. I didn't get far enough into it to decide one way or the other, since I didn't have a good tool for reducing the expressions to minimal form. Jim Gillogly From nobody at replay.com Mon Sep 14 21:45:33 1998 From: nobody at replay.com (Anonymous) Date: Tue, 15 Sep 1998 12:45:33 +0800 Subject: Harald Fragner Message-ID: <199809151737.TAA09935@replay.com> Of course I have issues! That felcher Harald Fragner led me to believe that through him, he would get me hooked up with Monica Lewinsky through this six degrees thing! I hear she really loves to party with the geek-set! That mother humper actually made me send him a check in exchange for her private info, after which he takes me out of his contact info! I tell you what, it's monkey spankers like Harald Fragner that make this six degrees service a real sham. These toe fungus kissers need to be taken out of six degrees! I'm going to contact my congressman and tell him to watch out for the likes of a camel snot taster like Harald Fragner, if that's even his real name. And I'm telling him to watch out for you guys too! You just watch it, you gerbil tubers! You cheese whiz fondlers! You purveyors of cottage cheese and farm animals! The government knows what you're up to! Sincerely, Joe Cypherpunk, dissatisfied customer at large At 09:49 AM 9/15/98 -0500, sixdegrees wrote: >Just a quick update from sixdegrees(tm). Unfortunately Harald >Fragner (harald at fragner.net) asked not to be listed as your >contact with sixdegrees. > >We also wanted to make sure you were aware that you currently >have no other confirmed contacts, so it will be hard for you to >have a productive sixdegrees experience. As you probably know, >without any confirmed contacts, you won't get any results from our >networking searches. > >So, we just wanted to recommend that you head over to >http://www.sixdegrees.com , log-in, and go to MY CONTACTS >to list additional relationships. > > >==================================================================== >PLEASE NOTE: All replies to this address are processed by a computer. >If you have any problems, questions or requests send an e-mail to >issues at sixdegrees.com and someone will get back to you as soon as >possible. >==================================================================== > > >E.DB.BRESP.3 > From mok-kong.shen at stud.uni-muenchen.de Mon Sep 14 21:47:35 1998 From: mok-kong.shen at stud.uni-muenchen.de (Mok-Kong Shen) Date: Tue, 15 Sep 1998 12:47:35 +0800 Subject: Mersienne crack busted... In-Reply-To: Message-ID: <35FEA81D.6B7CD5B2@stud.uni-muenchen.de> Robert Hettinga wrote: > > Somebody evidently installed the Mersienne(sp?) prime search client on > 2000+ AT&T machines. > > The local talk station news has a report that they have just been > apprehended and will be prosecuted for it. Mersenne. Perhaps the company should be grateful that someone has helped to spot a hole in security, since the hacker has apparently done no really serious damages except computing time. M. K. Shen From whgiii at invweb.net Mon Sep 14 22:42:29 1998 From: whgiii at invweb.net (William H. Geiger III) Date: Tue, 15 Sep 1998 13:42:29 +0800 Subject: Mersienne crack busted... In-Reply-To: Message-ID: <199809151842.OAA01048@domains.invweb.net> -----BEGIN PGP SIGNED MESSAGE----- In , on 09/15/98 at 01:11 PM, Robert Hettinga said: >Somebody evidently installed the Mersienne(sp?) prime search client on >2000+ AT&T machines. >The local talk station news has a report that they have just been >apprehended and will be prosecuted for it. >Interesting times, indeed... It was US West's computers: DENVER (AP) -- A 28-year-old computer expert is accused of hacking into the U S West computer system and diverting more than 2,500 machines that should have been helping answer phones to his effort to solve a 350-year-old math problem, according to documents filed in a federal court. Aaron Blosser also allegedly obtained the passwords to 15,000 U S West workstations and sent much of the coded material he found in them onto the Internet, according to an FBI search warrant served at his Lakewood, Colo., home last Wednesday. The warrant says Blosser, a contract computer consultant who worked for a vendor that was hired by Denver-based U S West, is under investigation for computer fraud. In a telephone interview with The Denver Post, Blosser said he has not been charged with any crime and said he made no money from his unauthorized use of U S West computers. He also failed in his mathematical quest: the search for a new prime number. ``I've worked on this (math) problem for a long time,'' said Blosser. ``When I started working at U S West, all that computational power was just too tempting for me.'' Blosser enlisted 2,585 computers to work at various times during the day and night and quickly ran up 10.63 years of computer processing time in his search for a new prime number. U S West spokesman David Beigie called the hacking ``unprecedented'' in company history. ``It would be virtually impossible to do it from the outside,'' he said. Blosser's alleged hacking was discovered when computers at U S West's facility in Phoenix, which normally respond in 3 to 5 seconds, took as long as five minutes to retrieve telephone numbers. The computers were so slow in mid-May that customer calls had to be rerouted to other states, and at one point the delays threatened to close down the Phoenix Service Delivery Center. On May 27, U S West's Intrusion Response Team found a software program on the system that ``captured U S West computers to work on a project unrelated to U S West Services,'' according to the search warrant. The anti-hacking team traced the software to a terminal at the company's Littleton offices, where they found Blosser, a self-described ``math geek.'' Blosser allegedly showed agents how he remotely installed software on computers throughout the U S West system and reprogrammed them to search for a new prime number. - -- - --------------------------------------------------------------- William H. Geiger III http://www.openpgp.net Geiger Consulting Cooking With Warp 4.0 Author of E-Secure - PGP Front End for MR/2 Ice PGP & MR/2 the only way for secure e-mail. OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html - --------------------------------------------------------------- Tag-O-Matic: Get OS/2 - the best Windows tip around! -----BEGIN PGP SIGNATURE----- Version: 2.6.3a-sha1 Charset: cp850 Comment: Registered_User_E-Secure_v1.1b1_ES000000 iQCVAwUBNf63Bo9Co1n+aLhhAQEkswP+N+DQE6WhuZtk1pCjUfo08BvAd4W38Anl nekwRyzeK2j3MsXx86UgN3/rj2O0BteRBGwV8PQlNududI7MNU2L/qtL+3ZBJKrI yLBqk3wvYBTn/VzoS/83kge0nVIAx2YTJCt+NSzE5O29oEabIPmruxCZH2Mj14pb eAOVYNJOPY4= =Vv1U -----END PGP SIGNATURE----- From ravage at EINSTEIN.ssz.com Mon Sep 14 22:50:57 1998 From: ravage at EINSTEIN.ssz.com (Jim Choate) Date: Tue, 15 Sep 1998 13:50:57 +0800 Subject: Anon traffic via SSZ Message-ID: <199809151913.OAA32743@einstein.ssz.com> Forwarded message: > Date: Tue, 15 Sep 1998 19:07:24 +0200 > From: Anonymous > > There seems to be a problem posting anonymous messages to cypherpunks at ssz.com. I have posted several messages over the past week and *none* of them have showed up. > > I am posting this as a test message. I am sending it to the following addresses: > > cypherpunks at toad.com > cypherpunks at ssz.com > cypherpunks at algebra.com > cypherpunks at cyberpass.net > > I will add the server name to the subject line for each post to test which messages are being delivered and which are not. > > I AM TOTOCUS!! Nothing on this end filters unless it comes from/to: cypherpunks-unedited at toad.com mosexpo.ru fw9.telekom.edu any.where.com I filter these because the dumbshit's at mosexpo.ru keep sending messages with munged headers that fill up postmaser's mailbox with delivery failure messages. I got tired of using the 'd' key. But even in this case, I only filter *after* I've forwarded the traffic to the other nodes. The only other quirk I'm aware of regarding anon posts are ones without subjects, in which case I get a notice that the Japanese node is dropping it because it doesn't have headers. This should come as no surprise as I've made mention several times on this issue. ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From jmessenger at 30337.com Tue Sep 15 14:07:43 1998 From: jmessenger at 30337.com (jmessenger at 30337.com) Date: Tue, 15 Sep 1998 14:07:43 -0700 (PDT) Subject: First Century Church Message-ID: Hello. Jim and I received your name from a list given to us by a friend who indicated that you may be interested in a unique Christian site in Jerusalem (the Holy Land): http://jcr.org The Jerusalem Christian Review is Jerusalem's leading Christian newspaper, and reports discoveries in the Holy Land which have direct implications on our understanding of the Bible. Their reports are well documented with pictures and the participation of world-famous Bible scholars in Jerusalem. Some of these discoveries include: - A First Century Jerusalem Tomb with an inscribed dedication to "Jesus, who Ascended", dating to before the New Testament was written! - A First Century Amulet found in the Holy Land which seem to depict come of the Miracles of Jesus! -- The recently found Palace of King David, including an exclusive interview with the Hebrew University archaeologist who discovered it. - A burial cave in Nazareth with the personal testimonials of the very first Christians of Galilee. - Answers to the Mystery of Calvary. Scholars Find Stunning Evidence of Jesus' Crucifixion at Golgotha! Although we are not personally connected to this ministry, we were so impressed with the impact of the information at this site that we felt it was our duty to help spread the word. It has helped us so much in our own walk with the Lord and with evangelism! We ask you to forward copies of this letter to all of your friends, so that they can be informed of the dynamic way God is reaching back through history and revealing Himself so dramatically to the world today! Take a look for yourself. Again, the WWW address in Jerusalem is: http://jcr.org Yours in His service, Jim and Barbara Randolph P. S.: We are attaching here part of a statement of mission taken from the web site of the Jerusalem Christian Review, which is exciting!! -------------------------------------------------------------- Special Request: PLEASE HELP SHARE THIS IMPORTANT EVIDENCE BY COPYING THIS MESSAGE AND SENDING IT TO YOUR FAMILY AND FRIENDS. THANK YOU. _______________________________ *********************************************** >From the Editor: >From the Past to the Present... The Jerusalem Christian Review , a newspaper with a mission. The very first Christians in the world were those who witnessed first hand the Ministry, Words and deeds of Jesus of Nazareth. They had a very unique opportunity - the opportunity to personally ask Him questions, interact with Him and see for themselves the culmination of His life on earth. While these first witnesses can no longer testify to the events of the past, their inscribed testimonials, some of which were buried for two-thousand years, are only today being discovered and deciphered in the Holy Land. In recent years, unprecedented archaeological study and biblical research has literally brought to life the very pages of the Bible. Scholars in the Holy Land have unearthed startling discoveries which reveal, in more clarity than ever in history, the world of the very first followers of Jesus. Today, one can physically walk in the footsteps of His disciples and first apostles, sit in the very places where they were judged, witness the spectacular nature of the cities they lived in and read the inscriptions they left behind. A cave found years ago by the renown French archaeologist, Charles Clarmont-Ganneau, near ancient Bethany, exposed a first century tomb which included three ossuaries (stone coffins) inscribed with the symbol of the cross and the Hebrew names of Lazarus, Martha and Mary (John 11:1,2). In a nearby tomb, a monogrammed dedication written only a few years after Jesus' crucifixion, also accompanied by a cross mark, was deciphered by Prof. J. Finegan of the Pacific School of Religion, Berkeley, to read: "Jesus Christ, the Redeemer." At the southern edge of the Kidron Valley, the "Valley of Judgement" in Jerusalem, the Hebrew University archaeologist, Prof. Eleazar L. Sukenik, discovered a first century ossuary with cross marks and a testimonial reading: "[To] Jesus, the Lord." (For more information, please see the Jerusalem Christian Review, Internet Edition, at http://jcr.org. Indeed, one cannot escape the inevitable conclusion that God is, today, using the Holy Land and the accelerated study of archaeology to substantiate the biblical narrative and to present a very modern message to today's world. The Jerusalem Christian Review, Jerusalem's leading Christian newspaper, invites you to join with us in prayer that, through the information contained in these pages, many might come to the realization that the Lord's Word is true. We invite you to take this opportunity to use the evidence being presented in this edition, and in future editions, to be good stewards of this message from the Holy Land - to tell your family and friends of these testimonials, which carry from the past a very modern message to the present and for the future. *********************************************** You can access the Jerusalem Christian Review in Jerusalem at: http://jcr.org We ask you to help share the Word by passing this email message to your family and friends. Thank you. This email message has bee sent by S.P.Fox at the request of the Randolfs who wish to say thanks to friends and loved ones without whose advise and expertise, this mailing would not be possible. I can be reached c/o 230 West Hall Avenue, PO Box 202 Slidell, LA 70460 This is a first time and one time mailing from me, but if you wish, you can be removed from my mailing list by sending an email with the word Remove in the subject to: no_no_thank at mailexcite.com From billp at nmol.com Mon Sep 14 23:11:21 1998 From: billp at nmol.com (bill payne) Date: Tue, 15 Sep 1998 14:11:21 +0800 Subject: CHRYSLER AWARD NOMINATION STATEMENT 9/15/98 12:30 PM Message-ID: <35FEB8CA.78C4@nmol.com> Tuesday 9/15/98 12:39 PM e-mail Ms Vikki Hardy Chrysler Award for Innovative Design c/o Bozell Advertising 1000 Town Center, 15th Floor Southfield, MI 48075-1241 248 262 8643 vhardy at detroit.bozell.com We are sending our submission by 1 e-mail 2 hardcopy 3 diskette with .htm and .txt files by priority certified mail. Best bill CHRYSLER AWARD NOMINATION STATEMENT 9/15/98 12:30 PM American forefathers drafted the Constitution and laws of our country shortly after having suffered injustice. Fresh in their minds were strategies used by their oppressors. Writers of the Constitution and laws anticipated ways to subvert our system. Therefore, our forefathers designed safeguards into our legal system to prevent future injustice. But these safeguards DON�T appear to be working today. Morales and Payne designed a strategy using the National Security Agency [NSA], Sandia National Laboratories, the US Federal Court System, and publication on Internet to illustrate how the US government has deteriorated. Arthur Morales WAS a supervisor at Sandia Labs in 1991. Morales and Manuel Garcia organized a class action lawsuit on behalf of Hispanics against Sandia. Sandia settled Morales� and Garcia�s lawsuit. Department of Energy acknowledged from Freedom of Information Act [FOIA] requests that as of December 31, 1995 Morales cost Sandia $567,137 in legal fees. Sandia retaliated against Morales. Morales sued Sandia in New Mexico District Court. Morales lost. William Payne wrote a technical report describing �deficiencies� NSA�s cryptographic algorithms http://jya.com/da/whpda.htm. Sandia transferred Payne to break electronics locks for the Federal Bureau of Invesitgation [FBI]. Payne refused to do illegal work. http://www.jya.com/whp1.htm. Payne sued Sandia in Federal Court. Payne lost and court records were sealed. FBI agent Bernardo Perez led a class action lawsuit against the FBI for race discrimination against Hispanic FBI agents. http://www.usdoj.gov/osg/1995/w951482w.txt Perez won. Perez was assigned agent-in-charge of the FBI in Albuquerque for settlement. But Perez lost money. Morales and Payne learned that the FBI extorted an inexpensive from Perez by telling Perez that the FBI was GUARANTEED to win on appeal in Federal Circuit. With Perez� and others knowledge of circuit courts, Morales and Payne appealed their respective cases pro se to the Tenth Circuit. In Payne�s case Sandia failed to submit its Brief of the Appellees on time. Then falsified its certificate of service when Payne filed to remand. In Morales� case Sandia submitted a deficient Brief of the Appellees which was returned but failed to serve Morales with its brief. Payne and Morales both won at the Tenth Circuit on technicalities. But judges awarded the wins to Sandia. All attempts by Morales and Payne to get copies of the docket for their respective Tenth Circuit cases failed. Therefore, Morales and Payne hatched a plan to get the dockets and expose government misconduct. Payne previously made FOIA requests to NSA for copies of messages and translations given to Iraq during the Iraq/Iran war, copies of Libyan messages intercepted by NSA, and NSA cryptographic algorithms Payne thought contained deficiencies. Morales and Payne sued NSA pro se for the documents. Lawsuit progress was broadcast on Internet through e-mail and http://www.aci.net/kalliste/speccoll.htm http://jya.com/whpfiles.htm And Payne wrote Black and White Test of Cryptographic Algorithms criticizing the US government�s crypto contest. http://zolatimes.com. Morales and Payne FINALLY got copies of dockets from their respective cases from the Tenth Circuit using Internet as an innovative tool. From nobody at replay.com Mon Sep 14 23:14:06 1998 From: nobody at replay.com (Anonymous) Date: Tue, 15 Sep 1998 14:14:06 +0800 Subject: No Subject Message-ID: <199809151914.VAA17736@replay.com> Nothing on this end filters unless it comes from/to: cypherpunks-unedited at toad.com mosexpo.ru fw9.telekom.edu any.where.com I filter these because the dumbshit's at mosexpo.ru keep sending messages with munged headers that fill up postmaser's mailbox with delivery failure messages. I got tired of using the 'd' key. But even in this case, I only filter *after* I've forwarded the traffic to the other nodes. The only other quirk I'm aware of regarding anon posts are ones without subjects, in which case I get a notice that the Japanese node is dropping it because it doesn't have headers. This should come as no surprise as I've made mention several times on this issue. ----- The post I made earlier went through without a problem, but as I mentioned in my original post I had made several anon posts through replay.com to cypherpunks at ssz.com and they never made it to the list. I also noticed that replay.com seems to be striping the subject from the posts as in my last post I *did* put a subject line on the message but it arrived to the list without one. In the messages I sent, a couple of them I used a chain of remailers but when they failed to appear I sent the remaining messages through replay.com only (using the https interface to send the messages). It may have just been a problem on replay's end but on all the posts I did get a conformation page that the messages had been accepted. Odd. I AM TOTOCUS!!! From rah at shipwright.com Tue Sep 15 00:20:33 1998 From: rah at shipwright.com (Robert Hettinga) Date: Tue, 15 Sep 1998 15:20:33 +0800 Subject: Crypto in a Cuban Crime... In-Reply-To: <19980915182955.12551.qmail@listbox.com> Message-ID: At 12:18 PM -0400 on 9/15/98, Charles Smith of Win Schwartau's FUDFactory wrote something mildly clueful: > BUSTED CUBAN SPIES USE CRYPTO > ----------------------------- > FBI officials are proud that they broke up a small ring of Cuban > spies in Florida. The Cuban espionage agents are accused of > using encryption to encode messages and protect information. > Expect Director Freeh to use this bust as one of a hand full > historical examples of "crypto" crimes in his next Congressional > testimony. According to his last testimony in August 1998, only > 17 crimes over the past 10 years have been made more difficult > for the FBI by encryption. > > What the FBI Director won't tell you is that the Cubans have > been sending enciphered messages to their U.N. mission in New > York over SHORT-WAVE RADIO for almost 30 years. The Morse code > signals are encrypted with a Cuban one-time-pad cipher and > transmitted from Havana on a nightly basis. The Cuban encrypted > transmissions are so regular - some HAM radio operators set > their clocks by it. ----------------- Robert A. Hettinga Philodox Financial Technology Evangelism 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From ravage at EINSTEIN.ssz.com Tue Sep 15 00:21:49 1998 From: ravage at EINSTEIN.ssz.com (Jim Choate) Date: Tue, 15 Sep 1998 15:21:49 +0800 Subject: Forwarded mail... Message-ID: <199809152046.PAA00429@einstein.ssz.com> Forwarded message: > Date: Tue, 15 Sep 1998 21:14:19 +0200 > From: Anonymous > The post I made earlier went through without a problem, but as I mentioned in my original post I had made several anon posts through replay.com to cypherpunks at ssz.com and they never made it to the list. > > I also noticed that replay.com seems to be striping the subject from the posts as in my last post I *did* put a subject line on the message but it arrived to the list without one. > > In the messages I sent, a couple of them I used a chain of remailers but when they failed to appear I sent the remaining messages through replay.com only (using the https interface to send the messages). > > It may have just been a problem on replay's end but on all the posts I did get a conformation page that the messages had been accepted. > > Odd. > > I AM TOTOCUS!!! > Sounds to me like you need to be talking to replay. ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From brianbr at together.net Tue Sep 15 00:28:24 1998 From: brianbr at together.net (Brian B. Riley) Date: Tue, 15 Sep 1998 15:28:24 +0800 Subject: radio net Message-ID: <199809152029.QAA03672@mx02.together.net> On 9/6/98 6:20 PM, Steve Schear (schear at lvcm.com) passed this wisdom: >> Spread spectrum would have more promise as many stations could be on the >>air at once on the same frequency thus making life quite confusing for >>the T-hunters. > >I investigated this application several years back and see two practical >approaches: one adapt a commercial SSB or Ham transciever to use frequency >hopping spread spectrum, or two build a pirate spread spectrum satellite >ground station. > >Until recently most SSB gear didn't have the RF characteristics to use FH. >Now there are a number of inexpensive sets which use direct frequency >synthesis (as opposed to the older, and much slower, phase-locked loop >approach) and can be driven at hundreds or even thousands of hops per >second. FH helps solve two problems: first it provides privacy, second it >can mitigate or eliminate fading (which is highly time-frequency >correlated). Also, the higher the hop rate, the higher the process gain, >jam resistance and the lower the probablity of intecept (all other things >being equal). > >It think it was Phil Karn (Qualcomm) who once mused that it would be rather >straightforward to masquarade a high process gain SS signal on a commercial >satellite transponder. To it's owners the SS signal would be almost >invisible, making itself known as only a very slight depression in the >transponder's gain. Effectively, this could offer an inexpensive covert >channel for tunneling packets and thwarting traffic analysis. > >After the Captain Midnight episode I discussed this possibility with a very >technically knowledgeable staffer at the FCC and was assured that discovery >of such signals were beyond (at that time) the ability of commercial and >national technical (e.g., Lacrosse) means. I would suppose the T-hunt aspects of a clandestine network would be obviated by piggybacking it into a commercial satellite transponder channels ... which brings to mind about how expensive one or two of those channeles might be. I remeber in the early days of ham packet radio we had several 'wormholes' where hams had obtained through their places of employemnt temporary use of unused satellite channels where we were given essentially RS232 access and we adapted the packet switches to an async backchannel in place of another synch RF path. They did make for some intersting network improvements. I guess it always comes down to how do you fund such things. Brian B. Riley --> http://members.macconnect.com/~brianbr For PGP Keys "Success always occurs in private, and failure in full view." -- from somewhere on the Net From Michael.Branch at Central.Sun.COM Tue Sep 15 01:22:14 1998 From: Michael.Branch at Central.Sun.COM (Michael Branch) Date: Tue, 15 Sep 1998 16:22:14 +0800 Subject: Larry Gilbert, AOLers, and the Hyper-real flamer Message-ID: <199809152110.PAA04927@breckenridge.Central.Sun.COM> this news group is a lot like the Jerry Springer show. Mike > From: AIMSX at aol.com > Date: Tue, 15 Sep 1998 08:06:33 EDT > To: nobody at replay.com, cypherpunks at toad.com > Mime-Version: 1.0 > Subject: Re: Larry Gilbert, AOLers, and the Hyper-real flamer > Content-transfer-encoding: 7bit > > Obviously you have a very high opinion of yourself and a low opinion of people > who use AOL. Contrary to popular belief, there are a few intelligent people > on AOL, but it looks as if you are too egotistical to realize that. > > Have you ever thought to look at your own mistakes before you publicize > everyone else's to the world? Are you just suffering from some sort of > dillusion of grandeur - thinking you are better than everyone else. Things > like this are what many wars were started over, I am so happy the internet > (hopefully) won't start a war in the real world. > ################################################################# # # # Michael Branch, UwD Customer Support Engr. # # (303) 464-4637 (UNIX witch doctor) # # Michael.Branch at central.sun.com Sun Microsystems, Inc. # # # # "I turn big problems into little problems." # # # ################################################################# From phirebearer at hotmail.com Tue Sep 15 01:22:24 1998 From: phirebearer at hotmail.com (Vivek Vaidya) Date: Tue, 15 Sep 1998 16:22:24 +0800 Subject: Democracy... Message-ID: <19980915210638.14549.qmail@hotmail.com> >>>Almost 60 percent of those polled said they thought Clinton was fit to be >>>president. By what standard? That's the trouble. Americans have no >>>standards -- no unchangeable yardsticks by which they measure right and >>>wrong, truth from fiction. > >>By *their* standard, by their own personal judgement. There's no moral >>yardstick, and God help us if there is in the future. Who makes the >>yardstick? Who sits down and says, "This is the moral standard in this >>country, abide by it or suffer the consequences"? > >Sorry but there are absolutes and there is a moral yardstick. Whether this > is accepted or not is beside the point. > >There has to be absolutes otherwise any action can be excused (or damned). > The real cry should be >"God help us to instigate Your yardstick". God doesn't change and neither >does His measure. > >1)Love the Lord, with all your heart, with all you soul with all your mind >and all your strength >2)Love you neibour as yourself. > >Everything else hangs on these. > Ever heard of seperation of church and state? Democracy? the rights of the individual? While you certainly have the right to practice your religion in what ever manner you so choose demanding that everyone else does, or that the president of the us of ais subject to you PERSONAL faith decisions is outragous Vivek Vaidya ______________________________________________________ Get Your Private, Free Email at http://www.hotmail.com From rah at shipwright.com Tue Sep 15 01:54:16 1998 From: rah at shipwright.com (Robert Hettinga) Date: Tue, 15 Sep 1998 16:54:16 +0800 Subject: IP: Working Photonic Lattice, A Dream For A Decade, Fabricated At Sandia Message-ID: --- begin forwarded text Delivered-To: ignition-point at majordomo.pobox.com X-Sender: believer at telepath.com Date: Tue, 15 Sep 1998 16:16:20 -0500 To: believer at telepath.com From: believer at telepath.com Subject: IP: Working Photonic Lattice, A Dream For A Decade, Fabricated At Sandia Mime-Version: 1.0 Sender: owner-ignition-point at majordomo.pobox.com Precedence: list Reply-To: believer at telepath.com Source: EurekAlert! http://www.eurekalert.org/releases/snl-wpladfad.html For Immediate Release: 15 September 1998 Contact: Neal Singer nsinger at sandia.gov (505) 845-7078 Sandia National Laboratories Working Photonic Lattice, A Dream For A Decade, Fabricated At Sandia: Lincoln Log-Like Structure To Improve Infrared And Optical Communications, Optical Computers ALBUQUERQUE, N.M. -- By interlocking tiny slivers of silicon into a lattice that, under a microscope, appears to be formed by toy Lincoln logs, scientists at the Department of Energy's Sandia National Laboratories believe they have solved a major technical problem: how to bend light easily and cheaply without leaking it, no matter how many twists or turns are needed for optical communications or (potentially) optical computers. The lattice, dubbed a photonic crystal (crystals have regularly repeating internal structures), now works in the infrared range (approximately 10-micron wavelengths). This achievement is of military and commercial interest because the technique can be used to enhance or better transmit infrared images. Sandia researchers Shawn Lin and Jim Fleming now are preparing a 1.5 micron crystal -- the region in which almost all the world?s optically transmitted information is passed. The improvement -- which bends far more light in far less space at considerably less cost than current commercial methods -- will make possible tinier, cheaper, more effective waveguides to combine or separate optical frequencies at the beginning or end of information transmissions. It will find wide application in data transmission and in more compact and efficient sensors. (See "Technique Perfected...." backgrounder that follows.) Pierre Villeneuve, a research scientist at the Massachusetts Institute of Technology (MIT), says, "With the structure [Sandia researcher] Shawn [Lin] is using now, he'll be able to hit the 1.5 micron mark within the next 12 months. This shows how 'key' this work is: He's using a technique that lends itself to hitting the mark." A venture capitalist requesting anonymity has approached the researchers to commercialize the process. The achievement, for which Sandia has applied for a patent, was reported in the July 16 issue of the journal Nature. The structure, in the regularity and spacing of its parts, is mirrorlike in not permitting light of a particular frequency, caught within the cavity of the structure, to escape. Instead, light must follow along any twists or turns designed into the log structure. By designing the distance between logs carefully, a chosen wavelength is reflected instead of passing out of the space, as longer or shorter wavelengths can. With introduction of an impurity like air or much thicker polysilicon "logs" to provide routes for preselected wavelengths introduced into the crystal, light travels along the impurity as it twists or bends. No matter how sharp the turns, light of frequency roughly in the middle of the band gap cannot escape. Funding for the project was provided by Sandia's Laboratory-Directed Research and Development office, which funds speculative, defense-related research, and by the DOE. A Photonic Band Gap What's "cool," in the eyes of some observers, is that Sandia researchers Lin and Fleming have created the equivalent of a photonic "band gap" that forbids certain frequencies of light from exiting the lattice. ("Band Gap" is a term usually applied to electrons, not photons, and signifies a range of energies in which electrons are absent because their presence would contradict quantum mechanical laws.) The nearly leak-proof lattices form a cage that trap and guide approximately 95 percent of the light sent within them, as compared with approximately 30 percent for conventional waveguides, and they take only one-tenth to one-fifth the space to bend the light. (The Sandia photonic lattice's turning radius is currently in the one-wavelength range, rather than the traditional waveguide bend of more than 10 wavelengths.) Standard, integrated-circuit manufacturing technology used to fabricate micromachines -- machines nearly too small to see -- at Sandia's Microelctronics Development Laboratory can create tens of thousands of waveguides from a single, 6-inch silicon wafer. This is a factor 10 to 100 times more dense than can be fabricated using more expensive gallium arsenide with current commercial technology. Potential uses: low-energy lasers, photonic computers, communications Because little light is lost in the three-dimensional mirroring that sends light back at itself, a new type of microlaser requiring little start-up energy is theoretically achievable. (Most conventional lasers require large jolts of energy to begin operating because so much light is lost in the lasing start-up process.) The achievement also brings nearer the day when computers that transmit information using photons rather than electrons become a practical reality. Currently, desktop computers use electrons to pass information, but as more circuits are included on new chips, they become more difficult to cool. Photons, the stuff of light, are faster and cooler than electrons. The problem is that no one has been able to bend useful frequencies of light around tight corners (as navigated by electrons through a million turns on a computer chip the size of a postage stamp) without incurring large losses in information; with previously used techniques, light leaks, and badly, the more tightly it is turned. One principle of optical communications is that differing frequencies of light are bent by different amounts. Waveguides first combine the frequencies of a number of information streams -- for example, telephone calls -- by bending them into the combined "white" light passing through an optical cable; then other waveguides separate the light into component frequencies by bending it at the end of its journey. Photonic Band Gap Crystals -- A History The idea of a "photonic band gap structure" was first advanced in 1987 by Eli Yablonovitch, now a professor at the University of California at Los Angeles. In 1990, he built the first photonic crystal, baseball-sized to channel microwaves useful in antennae applications. In the mid 1990s, scientists at Ames Laboratory in Iowa built crystals the size of ping pong balls, also for microwaves. The components were of a size that could be put together by hand, using straight metal pins (of the type that hold new shirts in place). The size reduction for current structures is a striking achievement that researchers have been attempting to achieve for a decade, says Del Owyoung, Sandia manager for the project. The difference in frequency is comparable to moving from masers to lasers, he said ? from microwaves to optical waves. According to Rama Biswa, a researcher at Ames Lab, "We had built the same structure [as Sandia has] ourselves, but more than 100 times larger, in the microwave frequency range. I think it is quite remarkable that Shawn Lin's group could do it at these wavelengths in the infrared and at this size." Villeneuve, who has theorized about uses for photonic crystals for much of the 1990s in a group led by MIT professor J. D. Joannopoulos, praised the Sandia group for "showing that what we're doing is valid," he says. "[People would say,] 'It's wonderful that you're coming out with all these great devices [that make use of photonic crystals], but your building block doesn't even exist!'" That is no longer the case. Sandia is a multiprogram DOE laboratory, operated by a subsidiary of Lockheed Martin Corp. With main facilities in Albuquerque, N.M., and Livermore, Calif., Sandia has major research and development responsibilities in national security, energy, and environmental technologies. ### BACKGROUND: Technique Perfected In Building Surface-Etched Micromachines Shawn Lin and Jim Fleming achieved the desired crystalline spacing using techniques perfected in building surface-etched micromachines, at which Sandia is a world leader. Gears that spin require spaces between parts; specifically, a silicon base is covered with an expendable coating in which a part can be etched, and then the expendable portion is removed by chemical and mechanical means, leaving the gear or axle unencumbered by surrounding material and thus able to spin freely [www.mdl.sandia.gov/micromachines]. Using a variant on the same technique, Fleming made an artificial crystal lattice. He took a silicon wafer, coated it with silicon dioxide, cut trenches into the silicon dioxide and then bathed the chip in polysilicon till it filled the trenches. Then he polished the surface until smooth and bathed the chip in another layer of silicon dioxide, into which he cut the same number of trenches as before, but so they lay across the trenches beneath them at right angles, and then filled these trenches with polysilicon. After repeating this process a number of time, Jim removed the silicon dioxide, using hydrofluoric acid, and got "micron layers of Lincoln logs, orthogonal to each other, and joined where they touch." Center to center, the polysilicon logs were 1.2 microns wide, 1.5 microns high, with a pitch of 4.8 microns -- child's play to achieve in the world of silicon micromachines. The proportions were identical to that specified by Ames Laboratory and Iowa State researchers as those necessary to make the photonic equivalent of an electronic band gap. Media Contact: Neal Singer nsinger at sandia.gov (505) 845-7078 Technical Contact : Shawn Lin slin at sandia.gov (505) 844-8097 Jim Fleming fleminjg at sandia.gov (505) 844-9158 Del Owyoung aowyoun at sandia.gov (505) 884-5481 ----------------------- NOTE: In accordance with Title 17 U.S.C. section 107, this material is distributed without profit or payment to those who have expressed a prior interest in receiving this information for non-profit research and educational purposes only. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml ----------------------- ********************************************** To subscribe or unsubscribe, email: majordomo at majordomo.pobox.com with the message: (un)subscribe ignition-point email at address ********************************************** www.telepath.com/believer ********************************************** --- end forwarded text ----------------- Robert A. Hettinga Philodox Financial Technology Evangelism 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From lharrison at dueprocess.com Tue Sep 15 02:11:36 1998 From: lharrison at dueprocess.com (Lynne L. Harrison) Date: Tue, 15 Sep 1998 17:11:36 +0800 Subject: Clinton--Why I am Chortling In-Reply-To: <3.0.5.32.19980914122452.0086a750@pop.mhv.net> Message-ID: <3.0.5.32.19980915181502.00838820@pop.mhv.net> At 06:21 AM 9/15/98 -0700, James A. Donald wrote: > > -- >At 12:24 PM 9/14/98 -0400, Lynne L. Harrison wrote: >> I don't see a power imbalance here. If a young woman in >> her 20's invitingly flashes her thong panties at a man, I >> don't see how she can be portrayed as the victim. > >According to the law applied to normal people, Monica was the >victim. What law? This was consensual sex. No law was broken. Judgment and morality, of course, are different issues. > Also according to the law applied to normal people, >Clinton was required to spill his guts about all of his sex >life, because some women sued him, whereas the women suing >was completely protected against any questions concerning her >sex life. Clinton, like anyone else, is required to tell the truth when being deposed or testifying in front of a Grand Jury, i.e., making any statement under oath. >These laws are flagrantly unjust, but the Democrats introduced >them and applied them. Feminists supported and continue to >support Clinton precisely because he supported and supports >laws that he flagrantly broke. If these laws are to be >repealed for politicians, they should be repealed for normal >people as well. I'm not in a position to comment because I'm not sure who the major players were at the time the legislation was enacted. Generally speaking, when the president belongs to Party A, the majority of the Legislature belongs to Party B. Regarding political parties, I am an NPA (no party affiliation) and can only vote in general elections. I made this choice because I do not wish to be "pigeon-holed" by a label imposed upon me as a result of belonging to a given political party. In the same vein, I am unable to speak for "feminists", "normal people", "politicians", etc. I speak only for myself. ;) /end of Monica-Bill thread *************************************************************************** Lynne L. Harrison, Esq. | "If we are all here, Poughkeepsie, New York | then we are not mailto:lharrison at dueprocess.com | all there." http://www.dueprocess.com | - old Zen saying ************************************************************************* DISCLAIMER: I am not your attorney; you are not my client. Accordingly, the above is *NOT* legal advice. From christopher.barkley at srcm.com Tue Sep 15 02:22:18 1998 From: christopher.barkley at srcm.com (Christopher Barkley) Date: Tue, 15 Sep 1998 17:22:18 +0800 Subject: Hello Message-ID: <35FEE6CF.6FC2ED7E@srcm.com> You listed me in Six Degrees as your fellow alum, but I'm afraid I can't place you. So, who are you? Cheers, Christopher From alan at clueserver.org Tue Sep 15 02:54:08 1998 From: alan at clueserver.org (Alan Olsen) Date: Tue, 15 Sep 1998 17:54:08 +0800 Subject: CNN - Investigators find "assassination" page on the Web - September 15, 1998 (fwd) Message-ID: http://www.cnn.com/TECH/computing/9809/15/internet.hit.list.ap/index.html I remember when this page was posted. It was INCREDIBLY obvious it was bogus. either the feds involved are incredibly clueless or they are just trying to make an example of anyone implementing anything close to an AP server. They are afraid. They are very afraid. alan at ctrl-alt-del.com | Note to AOL users: for a quick shortcut to reply Alan Olsen | to my mail, just hit the ctrl, alt and del keys. From AIMSX at aol.com Tue Sep 15 02:54:40 1998 From: AIMSX at aol.com (AIMSX at aol.com) Date: Tue, 15 Sep 1998 17:54:40 +0800 Subject: Larry Gilbert, AOLers, and the Hyper-real flamer Message-ID: Actually.. I am getting a SunOS Shell account this weekend. AOL has improved service somewhat, and it is now possible to use Netscape (or any other browser) along with it. I also have over 100 accounts on a local ISP - so trust me... it's not that big of a deal for me to get another ISP, I just like some of the keywords and a few other areas. As for your thought that it is a CHOICE for everyone... well, I am sorry to say it is not. My parent would rather use the [semi]- user-friendly software of AOL, which she is familiar with, than have a dialup access with browsers and other utilities in different areas she can't find as easily. (I know, it sounds stupid.) I was finally able to convince her to pay for a shell account, promising her I would teach her how to use it. As for me paying it... I just became old enough to work (finally) about a month ago, and I am only making minimum wage, and the hours are not good enough for me to be able to keep up my hobbies of paintball, computer upgrades, and Internet alone. Therefore... she pays for it, I wash dishes... So anyway... before I get too sidetracked, I am just saying... I am finally getting a shell account, and not all AOLers are stupid warez lovers that don't know cu from cd. I would also like to add - I wasn't even talking about AOL service (although I agree it is really crappy - but a tad better than it used to be) I was just talking about the insults to all AOL user's Intelligence. I am sure there are morons on other ISP's, they are just more visible on AOL. From XxGalxX at concentric.net Tue Sep 15 02:55:39 1998 From: XxGalxX at concentric.net (XxGaLxX) Date: Tue, 15 Sep 1998 17:55:39 +0800 Subject: Hello Message-ID: <199809152249.SAA01925@mcfeely.concentric.net> your worst nightmare =) ---------- > From: Christopher Barkley > To: cypherpunks at toad.com > Subject: Hello > Date: Tuesday, September 15, 1998 5:14 PM > > You listed me in Six Degrees as your fellow alum, but I'm afraid I can't > place you. So, who are you? > > Cheers, > Christopher From nobody at replay.com Tue Sep 15 03:03:19 1998 From: nobody at replay.com (Anonymous) Date: Tue, 15 Sep 1998 18:03:19 +0800 Subject: Hello Message-ID: <199809152257.AAA05018@replay.com> I found your name on a kiddy porn site. At first I was disgusted, and immediately called the FBI. But then I got kind of turned on by the whole idea, and decided that maybe we could get together and have hot sex, and you could wear a wig with pigtails, and it would be just like we were screwing children, just like I know you love to do. Then maybe we could switch roles. So anyway, let me know if you're interested. But also, expect the FBI to be calling on you in the near future, pervert! Tah tah lovey, Joe C. At 06:14 PM 9/15/98 -0400, Christopher Barkley wrote: >You listed me in Six Degrees as your fellow alum, but I'm afraid I can't >place you. So, who are you? > >Cheers, >Christopher > From edsmith at IntNet.net Tue Sep 15 03:25:50 1998 From: edsmith at IntNet.net (Edwin E. Smith) Date: Tue, 15 Sep 1998 18:25:50 +0800 Subject: Voices Message-ID: <3.0.2.32.19980915190932.007fb350@mailhost.IntNet.net> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 One of the things I like about the internet, especially email, is that my voice and the voices of others are leveled. My voice can reach a multitude of people at least intelligent enough to get on the internet. But better than that is my ability to receive the other voices is enhanced much more. I can hear what a lot of people hear without their voices being filtered by the likes of Dan Rather, Tom Brokay and the rest of the Liberal broadcast media. It fact is is mostly just limited to what I choose to listen to. I also get to talk back to people with whom I disagree. I listen to their responses and sometimes modify my thinking. I also get affirmation of what I do believe from people of a like mind. Occasionally I am surprised to find others who are different but also intelligent and very persuasive in their convictions. I revel in this controversy and learn much from it. I confess that sometimes I troll for flames to get the dialog going. If you have something to say, say it! Even the words of the clueless are sometimes enlightening. To all of you who are offended by what you read or have been attacked and shirk away I say, stick around, learn and grow. The words which come to you can not hurt you if you don't let them. If you are to timid to endure a few flames then woe be unto you if anyone comes at you with actual violence on his mind. Edwin E. Smith -----BEGIN PGP SIGNATURE----- Version: PGP for Personal Privacy 5.0 Charset: noconv iQA/AwUBNf7zq0mNf6b56PAtEQLR+wCfQ7iXzmj5Gz9gtO09/0ogVzrpfawAoJUP 8qZqYluPFxHRt+srCM3vgXNd =e9r4 -----END PGP SIGNATURE----- From mmotyka at lsil.com Tue Sep 15 03:40:44 1998 From: mmotyka at lsil.com (Michael Motyka) Date: Tue, 15 Sep 1998 18:40:44 +0800 Subject: Larry Gilbert, AOLers, and the Hyper-real flamer In-Reply-To: <199809152110.PAA04927@breckenridge.Central.Sun.COM> Message-ID: <35FEFB86.6E10@lsil.com> Michael Branch wrote: > > this news group is a lot like the Jerry Springer show. > > Mike > I went to a cypherpunks meeting in Mtn View last Saturday. I was hesitant because I expected a multimedia, in-your-face version of the list. Surprise!!! This crew is smart, experienced, rational and they are actually working. Even though the topic of the day, IPSEC and secure DNS, is not a technical area that I know or care to learn right now, I was impressed. Night and day : list and meeting. When a project comes along that interests me, I'm in. Regards, Mike ps - I wish I could offer legal expertise or lots of money *when* the Constitutional battle over domestic controls gets more direct. From ravage at EINSTEIN.ssz.com Tue Sep 15 03:51:41 1998 From: ravage at EINSTEIN.ssz.com (Jim Choate) Date: Tue, 15 Sep 1998 18:51:41 +0800 Subject: CNN - Investigators find "assassination" page on the Web - September 15, 1998 (fwd) Message-ID: <199809160016.TAA01658@einstein.ssz.com> Forwarded message: > Date: Wed, 16 Sep 1998 06:53:53 -0700 (PDT) > From: Alan Olsen > Subject: CNN - Investigators find "assassination" page on the Web - September 15, 1998 (fwd) > http://www.cnn.com/TECH/computing/9809/15/internet.hit.list.ap/index.html How come only the IRS is listed as related web sites?... ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From AIMSX at aol.com Tue Sep 15 03:52:54 1998 From: AIMSX at aol.com (AIMSX at aol.com) Date: Tue, 15 Sep 1998 18:52:54 +0800 Subject: Voices Message-ID: <63f52c6a.35fefb8e@aol.com> Preach on brother =) From mmotyka at lsil.com Tue Sep 15 03:53:18 1998 From: mmotyka at lsil.com (Michael Motyka) Date: Tue, 15 Sep 1998 18:53:18 +0800 Subject: Democracy... In-Reply-To: <19980915210638.14549.qmail@hotmail.com> Message-ID: <35FEFCC9.2027@lsil.com> Vivek Vaidya wrote: > Ever heard of seperation of church and state? Democracy? the rights of > the individual? While you certainly have the right to practice your > religion in what ever manner you so choose demanding that everyone > else > does, or that the president of the us of ais subject to you PERSONAL > faith decisions is outragous > > Vivek Vaidya > Just look around the world to see what happens when those two get together! From alan at clueserver.org Tue Sep 15 04:08:16 1998 From: alan at clueserver.org (Alan Olsen) Date: Tue, 15 Sep 1998 19:08:16 +0800 Subject: CNN - Investigators find "assassination" page on the Web - September 15, 1998 (fwd) In-Reply-To: <199809160016.TAA01658@einstein.ssz.com> Message-ID: On Tue, 15 Sep 1998, Jim Choate wrote: > > Forwarded message: > > > Date: Wed, 16 Sep 1998 06:53:53 -0700 (PDT) > > From: Alan Olsen > > Subject: CNN - Investigators find "assassination" page on the Web - September 15, 1998 (fwd) > > > http://www.cnn.com/TECH/computing/9809/15/internet.hit.list.ap/index.html > > How come only the IRS is listed as related web sites?... Becuase they got Jim to sign over the patents for AP. They want to use it for "collections". alan at ctrl-alt-del.com | Note to AOL users: for a quick shortcut to reply Alan Olsen | to my mail, just hit the ctrl, alt and del keys. From alan at clueserver.org Tue Sep 15 04:10:21 1998 From: alan at clueserver.org (Alan Olsen) Date: Tue, 15 Sep 1998 19:10:21 +0800 Subject: CNN - Investigators find "assassination" page on the Web - September 15, 1998 (fwd) In-Reply-To: <199809160016.TAA01658@einstein.ssz.com> Message-ID: On Tue, 15 Sep 1998, Jim Choate wrote: > > Forwarded message: > > > Date: Wed, 16 Sep 1998 06:53:53 -0700 (PDT) > > From: Alan Olsen > > Subject: CNN - Investigators find "assassination" page on the Web - September 15, 1998 (fwd) > > > http://www.cnn.com/TECH/computing/9809/15/internet.hit.list.ap/index.html BTW, the Oregonian (local Portland, OR paper has an expanded version of the article. If I can get time I will type it in. (It is in the 9/15/1998 morning edition on the last page of the Metro section.) alan at ctrl-alt-del.com | Note to AOL users: for a quick shortcut to reply Alan Olsen | to my mail, just hit the ctrl, alt and del keys. From edsmith at IntNet.net Tue Sep 15 04:11:19 1998 From: edsmith at IntNet.net (Edwin E. Smith) Date: Tue, 15 Sep 1998 19:11:19 +0800 Subject: Voices In-Reply-To: <63f52c6a.35fefb8e@aol.com> Message-ID: <3.0.2.32.19980915200546.007c4330@mailhost.IntNet.net> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 That reminds me of a line from All Creatures Great and Small, about a flatulent dog, "Speak on sweet lips! truer words were never spoken." Edwin At 07:43 PM 9/15/98 EDT, you wrote: >Preach on brother =) > -----BEGIN PGP SIGNATURE----- Version: PGP for Personal Privacy 5.0 Charset: noconv iQA/AwUBNf8A2UmNf6b56PAtEQLJLgCdHDNFfk6mZnpQi9UGtrlTUvGebMwAoN6u kvQiuoyegMpuIXHfUmqbFxQS =wEvm -----END PGP SIGNATURE----- From nobody at sind.hyperreal.art.pl Tue Sep 15 04:26:24 1998 From: nobody at sind.hyperreal.art.pl (HyperReal-Anon) Date: Tue, 15 Sep 1998 19:26:24 +0800 Subject: Hello Message-ID: On Tue, 15 Sep 1998, Christopher Barkley wrote: > > You listed me in Six Degrees as your fellow alum, but I'm afraid I can't > place you. So, who are you? > > Cheers, > Christopher Hi! I found you on a gay sex site. Boy, do you have a little one, dude. But I was thinking maybe we could get together and get some drinks and dinner, maybe take in a XXX movie, and then go at it with these five other guys I found. We can take films and give them to the web site owners at Six Degrees. They tell me they pay really good for it. They pay extra for S&M-bondage-anal films. We can split it and hired a few hundred male prostitutes and have the biggest orgy in history. I wanna like get your boss in on it too.....nothing like a master-slave relationship to make your heart skip a few beats. Purrrrrrrrrrrr. You guys must have a real good time in the office. Feel free to post this on the bulletin board and all. Since you mailed me I feel compelled to give a big steamy hunk like you all my special offers and anyBODY who works with you is probably just as much of a beefcake. Make sure you wear lots of black leather. I'll bring the whip. Ta ta, you big luscious hunk you! Love, Fudgepacker Supreme From bluesky17 at mailexcite.com Tue Sep 15 04:31:16 1998 From: bluesky17 at mailexcite.com (bluesky17 at mailexcite.com) Date: Tue, 15 Sep 1998 19:31:16 +0800 Subject: MASS EMAIL WORKS!! Message-ID: <199809160024.RAA14530@toad.com> THE GOOD NEWS! MASS E-MAIL MAY BE THE ANSWER! Everyday millions of people on the internet with an E-Mail address recieve a solicitation for a product. Many respond and purchase that product. When your ad is placed directly in front of tens of thousand of consumers, your chances of a successful marketing program is very good! THE BETTER NEWS! WE DO ALL THE WORK FOR YOU! We advise you on ad copy, suggest different stratagies, tell you what works and what doesn't and most important of all....send your ad for you! Our pricing (per page, no color, no porn, no AOL, multiple domains) 100K ads mailed....................................$99.00 500K " .............................$199.00 1million " ..............................$299.00 2million " ..............................$469.00 3million " ..............................$599.00 Each additional million............................$99.00 Additional pages add 20% per page OUR SPECIALTY IS TARGETED CONSUMERS Call us for more information! THE BEST NEWS! WE ANSWER OUR CALLS LIVE! Call us at (702) 257-8547 ext 143 (you must have this extention to do business with us and to receive the above pricing) Monday thru Friday 9:00 am to 3:00 pm Pacific Standard Time for more information. In the unlikely event we are unavailable, our trusty voice will take your message, page us, and we will return your call forthwith. NOTE: For those on the internet who do not want to recieve exciting messages such as this..... * To be removed from our mailing list, call us direct @ 702-257-8547 ext 143 for removal. Impolite requests take a little longer....... *We strive to comply with all state and federal laws and to send ads only to interested parties. *This ad is not intended for nor do we knowingly send to Washington State residents. We have over 75 million e-mail addresses, and to remove all Washington State addresses is difficult at best. *To be removed from our mailing list, CALL 702-257-8547 ext 12 and politely leave your e-mail address. Your e-mail address will be removed from our list and our affilate lists * OR CLICK_HERE_TO_GOTO_REMOVE-LIST.COM (http://remove-list.com) Remove-List is a free public service offering to help the general public get removed from commercial mailings lists and has not sent this message. If you want their help please add your name to their list and we you will not receive a commercial email from us or any other member bulk emailer. * Responding to the "return address" will NOT have your name removed. PRINT THIS AD FOR FUTURE CONSIDERATION!! From AIMSX at aol.com Tue Sep 15 04:31:28 1998 From: AIMSX at aol.com (AIMSX at aol.com) Date: Tue, 15 Sep 1998 19:31:28 +0800 Subject: Voices Message-ID: <65e46469.35ff051e@aol.com> I read that book From nnburk at cobain.hdc.net Tue Sep 15 04:40:50 1998 From: nnburk at cobain.hdc.net (nnburk) Date: Tue, 15 Sep 1998 19:40:50 +0800 Subject: Predictions: Crime and Criminal Justice in the 21st Century In-Reply-To: Message-ID: <35FF1A48.483A@yankton.com> Tim May wrote: > > Good post. The war is about to be joined. > Thank you. My only regret is that I do not have a source. The material was provided by a local LEA from an unnamed "seminar." > At 7:34 PM -0700 9/14/98, nnburk wrote: > >4. Terrorist acts by "fringe"/special issue groups will > >increase at a significant rate -- becoming a major law enforcement > >and security problem. > > Freedom fighters, not terrorists. > Yes. But I suppose like beauty, this is in the eye of the beholder. The victor writes the history books. > >10. With the decrease of the possibility of major global > >warfare, the United States military will take on an increased > >domestic "peace-keeping" role with America's law enforcement > >agencies. > > Posse comitatus is already becoming a moot point. The Army will be > patrolling the streets within a few years, probably coterminous with Y2K > problems and the resulting martial law. > I doubt we have long to wait. They know it's coming too. From nnburk at cobain.HDC.NET Tue Sep 15 04:42:04 1998 From: nnburk at cobain.HDC.NET (nnburk) Date: Tue, 15 Sep 1998 19:42:04 +0800 Subject: In-Reply-To: <199809151707.TAA07821@replay.com> Message-ID: <35FF1E19.7FF4@yankton.com> No shit. And not just cypherpunks at ssz.com. Wonder if it has something to do with our fiendly domestic surveillance post-Toto attachment. Anonymous wrote: > > Hi, > > There seems to be a problem posting anonymous messages to cypherpunks at ssz.com. I have posted several messages over the past week and *none* of them have showed > > I am posting this as a test message. I am sending it to the following addresses: > > cypherpunks at toad.com > cypherpunks at ssz.com > cypherpunks at algebra.com > cypherpunks at cyberpass.net > > I will add the server name to the subject line for each post to test which messages are being delivered and which are not. > > I AM TOTOCUS!! From edsmith at IntNet.net Tue Sep 15 04:43:57 1998 From: edsmith at IntNet.net (Edwin E. Smith) Date: Tue, 15 Sep 1998 19:43:57 +0800 Subject: Voices In-Reply-To: <65e46469.35ff051e@aol.com> Message-ID: <3.0.2.32.19980915203143.007c3af0@mailhost.IntNet.net> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Shit! Now you got me to wondering. Which book? At 08:23 PM 9/15/98 EDT, you wrote: >I read that book > -----BEGIN PGP SIGNATURE----- Version: PGP for Personal Privacy 5.0 Charset: noconv iQA/AwUBNf8G7kmNf6b56PAtEQIIPwCfT+a6I3Hab0FXtHOrqbtxaojAM3kAoMFd 9V1srpx4uXxeYmYMN2hEuE40 =fo/N -----END PGP SIGNATURE----- From nnburk at cobain.HDC.NET Tue Sep 15 04:48:58 1998 From: nnburk at cobain.HDC.NET (nnburk) Date: Tue, 15 Sep 1998 19:48:58 +0800 Subject: Predictions: Crime and Criminal Justice in the 21st Century In-Reply-To: <35FDD227.4C7D@yankton.com> Message-ID: <35FF2647.77F8@yankton.com> Sunder wrote: > > nnburk wrote: > > > > Predictions: Crime and Criminal Justice in the 21st Century > > ... > > 2. As the large pool of young people born in the early 1990s > > become teenagers and young adults, there will be a dramatic > > increase in violent crime around the year 2005-2010. > > I don't necessarily see this. What do you base this on? Um, actually, not _my_ predictions. Source was local LEA, obtained by them from some nameless seminar. (Sorry. Should have made that point clear earlier.) > > 5. As faith in the criminal justice system declines, there > > will be a rise in vigilante-based incidents where citizens take > > the enforcement of crime problems into their own hands. > > The rest of your prediction sounds like you've watched Robocop a few times too > many and actually BELIEVED it! :) Care to back it up with reasons? > See above. Actually, haven't seen Robocop! From 8kmc50f5 at auto.sixdegrees.com Tue Sep 15 05:00:23 1998 From: 8kmc50f5 at auto.sixdegrees.com (sixdegrees) Date: Tue, 15 Sep 1998 20:00:23 +0800 Subject: Christopher Barkley Message-ID: <199809160055.RAA14864@toad.com> Just a quick update from sixdegrees(tm). Unfortunately Christopher Barkley (barkley at cirr.com) asked not to be listed as your contact with sixdegrees. The good news is that since you have other confirmed contacts, you'll still be able to have a productive sixdegrees experience. But, if you want to continue to increase your networking power, you may want to head over to http://www.sixdegrees.com , log-in and go to MY CONTACTS and list additional contacts. ==================================================================== PLEASE NOTE: All replies to this address are processed by a computer. If you have any problems, questions or requests send an e-mail to issues at sixdegrees.com and someone will get back to you as soon as possible. ==================================================================== E.DB.BRESP.2 From christopher.barkley at srcm.com Tue Sep 15 05:00:58 1998 From: christopher.barkley at srcm.com (Christopher Barkley) Date: Tue, 15 Sep 1998 20:00:58 +0800 Subject: Regards Message-ID: <35FF0C5A.C1F80B6B@srcm.com> Apparently, I just spammed your list a couple of days ago; my apologies. Some zithead listed your email address in the Six Degrees networking service and starting asking people to be his contacts. One can only hope his fate is neither swift nor pretty. (I bear some of the blame; I should have recognized the email address since I have several friends on the list.) At any rate, my thanks to Tom Perry for his polite explanation of the situation. As for the REST of you who responded, you have my sympathies. With any luck, they'll get that thorazine prescription refilled soon. Cheerio, Christopher From johnscot at sylvania.sev.org Tue Sep 15 05:22:35 1998 From: johnscot at sylvania.sev.org (John Scott Porterfield) Date: Tue, 15 Sep 1998 20:22:35 +0800 Subject: Harald Fragner In-Reply-To: <199809151350.GAA08886@toad.com> Message-ID: <35FF10F0.B0B326C9@sylvania.sev.org> How do I get off this list!!! Bob From anon at zd.com Tue Sep 15 05:38:24 1998 From: anon at zd.com (anon at zd.com) Date: Tue, 15 Sep 1998 20:38:24 +0800 Subject: FWD: Clinton administration will ease grip on crypto exports Message-ID: <199809160128.VAA27836@u5.zdnet.com.> This message was forwarded to you from ZDNet (http://www.zdnet.com) by anon at zd.com. Comment from sender: The dance of the seven regs continues..... --------------------------------------------------------------------- This article is from ZDNN (http://www.zdnet.com/zdnn/). Visit this page on the Web at: http://www.zdnet.com/zdnn/stories/zdnn_smgraph_display/0,4436,2138029,00.html --------------------------------------------------------------------- [IMAGE] By Will Rodger, Inter at ctive Week Online September 15, 1998 5:39 PM PT The Clinton Administration is expected to relax export controls on data scrambling equipment Wednesday, preparing the ground for yet another round of debate over current encryption policy. According to Administration sources, the White House will loosen its grip on the technology in several areas central to the five-year argument over the issue. Among other things, the new policy will relax controls for sales to specific industries, including e-commerce, medicine and insurance The liberalization will fall far short of what Administration critics wanted. Even so, many crypto advocates expressed hope their position will continue to gain ground. "It's not as far along as my bill would go, but it's a significant improvement on our current policy," said Rep. Zoe Lofgren, D-Calif., a sponsor of encryption liberalization legislation in the House and one of several key Democrats briefed on the issue on the last two days. "It will still give us something to argue about next year." [TABLE NOT SHOWN] Electronic encryption, or the process of scrambling information so that only its intended recipient can read it, is widely believed to be the sine qua non of secure commerce and personal information on an insecure Internet. To date, however, Federal policy has required stringent licensing of encryption technology that uses digital codes, or "keys," longer than 40 bits in length. Law enforcement has insisted on that restriction so that the encoding technology cannot be used to thwart surveillance techniques used in investigations. Current exceptions will expand Under an exception granted in December 1996, however, the government has allowed exports of equipment whose keys are as long as 56 bits, or roughly 64,000 times more powerful than 40-bit products. That exception was granted companies that committed to develop technologies to give law enforcement "lawful access" to messages encrypted with their products through various back doors built into them. Notably free from those restrictions have been foreign financial institutions, which in most cases have been able to buy U.S.-made encryption software of unlimited strength since last year. That exception will be broadened under the new policy, sources said. Now, insurance companies, handlers of medical records and companies that use specialized transaction software to do business over the Internet will be able to buy American encryption software after a one-time review of their purchase plans by the U.S. Commerce Department. In addition, administration sources confirmed Tuesday evening, the government will no longer require prior approval of "key recovery" agents, who hold spare keys to encoded messages for law enforcement. Some 45 nations, including Russia, China, Venezuela and Mexico, will likely be ineligible for the relief control as long as the U.S. government believes they harbor money-laundering operations, however. Finally, administration sources said, any U.S. company will be able to export powerful encryption technology to its own subsidiaries as long as it does not share the technology with non-US companies. Playing catch-up As before, public interest groups said they believe the new policy does not go far enough. Since Vice President Al Gore promised relief for medical records, e-commerce and financial institutions some two years ago, critics said the policy is more a belated catch-up than anything truly new. "It's a divide and conquer strategy," said David Banisar, policy counsel with the Electronic Privacy Information Center. "This will help a few large users, but the average consumer is out in the cold." Wednesday's announcement is only the latest step in a years-long journey from complete control to liberalization. Though the FBI and others within the national security apparatus have insisted on tight controls, information technology companies and public interest groups have fought them bitterly, insisting a flood of foreign products will soon take over a world market which was once almost exclusively America's. As foreign producers have mounted - more than 500 foreign products are now stronger than what can usually be exported from the US - that pressure has increased. Technology marches on The steady march of computer technology, too, has rendered once-secure products obsolete; the Electronic Frontier Foundation, for instance, unveiled a computer last June which can crack messages encrypted with 56-bit keys in hours. Until recently, the FBI had claimed such messages could be cracked only in a matter of months, if not years. Dan Scheinman, vice president for legal and government affairs at Internet hardware producer Cisco Systems Inc., said the latest proposal wasn't his company had hoped for. Even so, "Anything that provides broader relief is a step in the right direction," he said. In the administration's defense Meanwhile, the administration has its defenders. Stewart Baker, former counsel to the super-secret, encryption-controlling National Security Agency and an attorney who negotiates export agreements for industry, called on critics to give the administration more credit. "I think this is a significant walking away from an emphasis on law-enforcement access," he said. "What this says is if there's a market for security, we ought to think about liberalizing. It's a big step and it foreshadows more." --------------------------------------------------------------------- Copyright (c) 1998 ZDNet. All rights reserved. Reproduction in whole or in part in any form or medium without express written permission of ZDNet is prohibited. ZDNet and the ZDNet logo are trademarks of Ziff-Davis Inc. From AIMSX at aol.com Tue Sep 15 05:53:16 1998 From: AIMSX at aol.com (AIMSX at aol.com) Date: Tue, 15 Sep 1998 20:53:16 +0800 Subject: Voices Message-ID: All Creatures Great and Small - that one... =) I also read an Aasimov a while back in fifth grade - unfortunately, I can't remember even the name... I need to pick some of his books up again... One book I can remember reading since 5th grade (and every summer thereafter) is "IT" by Stephen King - one of his few really good books. I have read it 8 times since. I greatly recommend it =) From ravage at EINSTEIN.ssz.com Tue Sep 15 06:04:45 1998 From: ravage at EINSTEIN.ssz.com (Jim Choate) Date: Tue, 15 Sep 1998 21:04:45 +0800 Subject: Voices (fwd) Message-ID: <199809160229.VAA02825@einstein.ssz.com> Forwarded message: > Date: Tue, 15 Sep 1998 21:46:59 EDT > To: edsmith at IntNet.net > Subject: Re: Voices > I also read an Aasimov a while back in fifth grade - unfortunately, I can't > remember even the name... I need to pick some of his books up again... > One book I can remember reading since 5th grade (and every summer thereafter) > is "IT" by Stephen King - one of his few really good books. I have read it 8 > times since. > I greatly recommend it =) Stephen King is no horror writer, he's a pussy wanna be. If you want a really good author then check out Poppy Z. Brite. Lost Souls (read this one first) Drawing Blood Exquisite Corpse (if you've ever wondered if you were the least bit homophobic, when you finish this one you'll know) You'll either read about 2-3 pages and quit in utter refulsion and disgust or else you'll be hooked. Sombody else to try is: Grave markings Michael A. Arnzen Ann Rice? Give me a break... ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From Jaeger at hempseed.com Tue Sep 15 06:35:34 1998 From: Jaeger at hempseed.com (Jaeger) Date: Tue, 15 Sep 1998 21:35:34 +0800 Subject: Democracy... In-Reply-To: <19980915210638.14549.qmail@hotmail.com> Message-ID: <35FF220A.F88B87F6@hempseed.com> hey, would you care to show us where "seperation of church and state" is to be found in the constitution/bill of rights? absolute right and wrong is not a religious belief (necessarily).. your religious beliefs do not affect the nature of reality. there are absolute truths by necessity... see, there is NO WAY that there could not be. Because if there were no absolute truths, then that would mean that NOTHING is absolute. That statement in itself is an absolute. now, as for absolute truths regarding the president, there may or may not be any as far as most people are concerned. people always seem to make an exception for people who agree with them... in order to be an effective president, however, one must uphold the very basis of this country, by upholding the law. Clinton perjured himself, obstructed justice, and tampered with witnesses in a grand jury investigation (which was incidentally being conducted by a man who was praised just months earlier as unbiased and very qualified for the job). The man is supposed to be the figurehead for our system of gov't. If he cannot follow the law, then he is not fit for the office. Jaeger > Ever heard of seperation of church and state? Democracy? the rights of > > the individual? While you certainly have the right to practice your > religion in what ever manner you so choose demanding that everyone > else > does, or that the president of the us of ais subject to you PERSONAL > faith decisions is outragous > > Vivek Vaidya > > ______________________________________________________ > Get Your Private, Free Email at http://www.hotmail.com From edsmith at IntNet.net Tue Sep 15 06:38:40 1998 From: edsmith at IntNet.net (Edwin E. Smith) Date: Tue, 15 Sep 1998 21:38:40 +0800 Subject: A definition of EVIL. Message-ID: <3.0.2.32.19980915223228.007ac4d0@mailhost.IntNet.net> A LIFE-AND-DEATH ISSUE To proceed we need at least a working definition. It is a reflection of the enormous mystery of the subject that we do not have a generally accepted definition of evil. Yet in our hearts I think we all have some understanding of its nature. For the moment I can do no better than to heed my son, who, with the characteristic vision of eight-year-olds, explained simply, "Why, Daddy, evil is 'live' spelled backward." Evil is in opposition to life. It is that which opposes the life force. It has, in short, to do with killing. Specifically, it has to do with murder-namely, unnecessary killing, killing that is not required for biological survival. from "People of the Lie" by M. Scott Peck, M.D. From ravage at EINSTEIN.ssz.com Tue Sep 15 06:57:23 1998 From: ravage at EINSTEIN.ssz.com (Jim Choate) Date: Tue, 15 Sep 1998 21:57:23 +0800 Subject: Democracy... (fwd) Message-ID: <199809160322.WAA03057@einstein.ssz.com> Forwarded message: > Date: Tue, 15 Sep 1998 21:27:23 -0500 > From: Jaeger > Subject: Re: Democracy... > hey, would you care to show us where "seperation of church and state" is > to be found in the constitution/bill of rights? absolute right and ARTICLE I. Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble, and to petition the Government for a redress of grievances. ARTICLE X. The powers not delegated to the United States by the Constitution, nor prohibited by it to the States, are reserved to the States respectively, or to the people. ---------------------------------------------------------------------------- The 1st prevents the government from regulating religion, even to the point of having the authority to define what a religion is. This includes smoking dope, raping little babies, whatever. It *IS NOT* an issue within the guidelines of the Constitution for the *federal* government, Period, end of story. Note that it does *not* prevent religions from participating in the government. They could regulate any commerce of those churches that cross state lines. The 10th says that unless the state you happen to live in regulates religion through a representative form of government via their own constitution then the practice and limits of religion are to be decided by the individual. Don't like it? Get a god damned amendment passed modifying or nullifying one or both of the above amendments. ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From die at pig.die.com Tue Sep 15 07:40:19 1998 From: die at pig.die.com (Dave Emery) Date: Tue, 15 Sep 1998 22:40:19 +0800 Subject: radio net In-Reply-To: <199809152029.QAA03672@mx02.together.net> Message-ID: <19980915234145.G26390@die.com> On Tue, Sep 15, 1998 at 04:29:06PM -0400, Brian B. Riley wrote: > On 9/6/98 6:20 PM, Steve Schear (schear at lvcm.com) passed this wisdom: > > >It think it was Phil Karn (Qualcomm) who once mused that it would be rather > >straightforward to masquarade a high process gain SS signal on a commercial > >satellite transponder. To it's owners the SS signal would be almost > >invisible, making itself known as only a very slight depression in the > >transponder's gain. Effectively, this could offer an inexpensive covert > >channel for tunneling packets and thwarting traffic analysis. > > > >After the Captain Midnight episode I discussed this possibility with a very > >technically knowledgeable staffer at the FCC and was assured that discovery > >of such signals were beyond (at that time) the ability of commercial and > >national technical (e.g., Lacrosse) means. > > I would suppose the T-hunt aspects of a clandestine network would be > obviated by piggybacking it into a commercial satellite transponder > channels ... which brings to mind about how expensive one or two of those > channeles might be. I remeber in the early days of ham packet radio we > had several 'wormholes' where hams had obtained through their places of > employemnt temporary use of unused satellite channels where we were given > essentially RS232 access and we adapted the packet switches to an async > backchannel in place of another synch RF path. They did make for some > intersting network improvements. I guess it always comes down to how do > you fund such things. At one time I had some involvement with a company renting satellite space, and the figure of around $1500 to $3000 a month for a voice channel capable of being used on small VSAT sized dishes was passed around. It depends on how much bandwidth and power the channel uses which in turn depends on how big the dishes are (G/T to be exact). Bigger dishes mean weaker signals on the satellite and lower charges. I could probably find out the formula used to price the service... I suspect that the cost of equipment and licensing and regulatory compliance of various sorts might make it unpleasant for loosely knit groups of private citizens - uplinks require competant installation and maintainence to keep them from causing interference to other users and various other problems such as RF radiation hazards under control. On the other hand, satellites are crawling with little signals transmitting streams of data or voice or music to groups of receivers scattered over wide geographic areas, so the econmics aren't prohibitive for people who have some real need... -- Dave Emery N1PRE, die at die.com DIE Consulting, Weston, Mass. PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2 5D 27 BD B0 24 88 C3 18 From tcmay at got.net Tue Sep 15 07:45:24 1998 From: tcmay at got.net (Tim May) Date: Tue, 15 Sep 1998 22:45:24 +0800 Subject: Democracy... In-Reply-To: <19980915210638.14549.qmail@hotmail.com> Message-ID: At 7:27 PM -0700 9/15/98, Jaeger wrote: >hey, would you care to show us where "seperation of church and state" is >to be found in the constitution/bill of rights? absolute right and Gee, check out the First Amendment to the U.S. Constitution. Also the first item in the Bill of Rights. "Congress shall make no law respecting the establishment of religion or prohibiting the free exercise thereof..." (from memory, so don't bother me with minor wording corrections.) By standard convention, this is also referred to as "separation of church and state." As with the clueless AOLers yakking about an "Assimov" story they read a couple of years ago in the 5th grade, you bozos need to get educated and spend a minute or two thinking before writing. --Tim May (This space left blank pending determ. of acceptability to the gov't.) ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, ComSec 3DES: 831-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Licensed Ontologist | black markets, collapse of governments. From Jaeger at hempseed.com Tue Sep 15 08:19:24 1998 From: Jaeger at hempseed.com (Jaeger) Date: Tue, 15 Sep 1998 23:19:24 +0800 Subject: Democracy... In-Reply-To: <19980915210638.14549.qmail@hotmail.com> Message-ID: <35FF39DF.3F322C4A@hempseed.com> well, the first amendment is what I expected to be used... unfortunately, the phrase "...wall of separation between church and state" is not taken from the first amendment. It is taken from a letter written by Thomas Jefferson... and the meaning is not that church shouldn't have an effect on the state. The state CAN support one religion over another. In context, the phrase simply explains that the government can't make laws that RESTRICT religious practice or doctrinal issues. The state CAN make laws that encourage the practice of any one particular religion, as long as the laws do not RESTRICT the PRACTICE of other religions. Making people uncomfortable isn't a constitutional reason to overturn a law. btw, notice the wording in the first amendment...it only restricts gov't restrictions on religion. Jaeger > Gee, check out the First Amendment to the U.S. Constitution. Also the > first > item in the Bill of Rights. "Congress shall make no law respecting the > > establishment of religion or prohibiting the free exercise thereof..." > > (from memory, so don't bother me with minor wording corrections.) > > By standard convention, this is also referred to as "separation of > church > and state." > > As with the clueless AOLers yakking about an "Assimov" story they read > a > couple of years ago in the 5th grade, you bozos need to get educated > and > spend a minute or two thinking before writing. > From bill.stewart at pobox.com Tue Sep 15 08:30:12 1998 From: bill.stewart at pobox.com (Bill Stewart) Date: Tue, 15 Sep 1998 23:30:12 +0800 Subject: Clinton--Why I am Chortling In-Reply-To: Message-ID: <3.0.5.32.19980915212954.008c0100@idiom.com> > > As for Monica-Clinton, what appears to be the case doesn't matter > > in some ideologies. > > Can meaningful consent be given with such a power imbalance? >I don't see a power imbalance here. If a young woman in her 20's >invitingly flashes her thong panties at a man, I don't see how she can be >portrayed as the victim. The only way that the issue of power arises is >that Monica was not overwhelmed by someone in power - she was attracted to >the power. Obviously you Just Don't Get It. :-) The argument tends to be along the lines that if power weren't so disparate, she wouldn't have to resort to sexual bribery to get what she wants, she could just take it, or trade for it as an equal. >On another but connected note, explain why Monica saved that dress! I >found this little tidbit to be the "yuck" factor... Because, not being totally stupid about Clinton, she thought it might be convenient to have some evidence around after the fact? Whether that's for emotional blackmail, or basic blackmail, or life insurance, or for convincing Hillary that Bill was hers now, or convincing some future publisher that she hadn't made it all up, or just because it seemed like it might turn out to be useful in the future, who knows. Lots of possibilities. Or maybe it was just a memento of a lovely evening :-) Or of a time when she had the President wrapped around her little finger. Thanks! Bill Bill Stewart, bill.stewart at pobox.com PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639 From tcmay at got.net Tue Sep 15 08:31:04 1998 From: tcmay at got.net (Tim May) Date: Tue, 15 Sep 1998 23:31:04 +0800 Subject: Predictions: Crime and Criminal Justice in the 21st Century In-Reply-To: <35FDD227.4C7D@yankton.com> Message-ID: At 10:22 AM -0700 9/15/98, Sunder wrote: >nnburk wrote: >> >> Predictions: Crime and Criminal Justice in the 21st Century >> >> 1. The United States will experience a significant economic >> recession/crisis very close to the turn of the Century. > >I see this as well and agree with it. The recent stock market rocking >back and >forth is a sign that something sucks, and sucks badly. Actually, I think much too much is being made of utterly _tiny_ percentage moves in the stock market. The "Big Crash" a couple of weeks ago was the "second largest point loss in the the history of the Dow Jones Industrial Average." Ah, but it was only #58 in terms of percentage. And so on. The "rocking back and forth" is well within historical standards. In fact, it's much less than we've seen at other times in the past 25 years. --Tim May (This space left blank pending determ. of acceptability to the gov't.) ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, ComSec 3DES: 831-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Licensed Ontologist | black markets, collapse of governments. From nobody at replay.com Tue Sep 15 08:33:31 1998 From: nobody at replay.com (Anonymous) Date: Tue, 15 Sep 1998 23:33:31 +0800 Subject: Larry Gilbert, AOLers, and the Hyper-real flamer Message-ID: <199809160426.GAA31537@replay.com> Some smart people do come from aol but then again they don't say stupid stuff. Aol will always be stereo typed until it is cleansed of morons. It is a stereotype based on truth. Famous AOL saying: me too! ---AIMSX at aol.com wrote: > > Obviously you have a very high opinion of yourself and a low opinion of people > who use AOL. Contrary to popular belief, there are a few intelligent people > on AOL, but it looks as if you are too egotistical to realize that. > > Have you ever thought to look at your own mistakes before you publicize > everyone else's to the world? Are you just suffering from some sort of > dillusion of grandeur - thinking you are better than everyone else. Things > like this are what many wars were started over, I am so happy the internet > (hopefully) won't start a war in the real world. > > == "The same thing we do every night Pinkey, try to take over the WORLD!" - The brain _________________________________________________________ DO YOU YAHOO!? Get your free @yahoo.com address at http://mail.yahoo.com From tcmay at got.net Tue Sep 15 08:46:03 1998 From: tcmay at got.net (Tim May) Date: Tue, 15 Sep 1998 23:46:03 +0800 Subject: Democracy... In-Reply-To: <19980915210638.14549.qmail@hotmail.com> Message-ID: At 9:09 PM -0700 9/15/98, Jaeger wrote: >well, the first amendment is what I expected to be used... >unfortunately, the phrase "...wall of separation between church and >state" is not taken from the first amendment. It is taken from a letter >written by Thomas Jefferson... and the meaning is not that church >shouldn't have an effect on the state. The state CAN support one >religion over another. Ah, it's the appearance of a new ranter arguing for some bizarre, idiosyncratic interpretation of the Bill of Rights and suchlike. Mr. Jaeger, meet Mr. Choate. Your notion that the state can support one religion over another so long as it does not "restrict" the other will surely be news to the many who have studied this issue for centuries. In particular, all those legal decisions which got Christian manger scenes removed from public buildings, and which got "Jesus Loves Sinners, Even Jews" removed from our coinage, will surely now have to be reversed. > The state CAN make laws that encourage the practice of any one >particular religion, as long as the laws do not RESTRICT the PRACTICE of >other religions. Bizarre. Try Ritalin. This has helped some list members cope. --Tim May (This space left blank pending determ. of acceptability to the gov't.) ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, ComSec 3DES: 831-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Licensed Ontologist | black markets, collapse of governments. From ravage at EINSTEIN.ssz.com Tue Sep 15 08:56:53 1998 From: ravage at EINSTEIN.ssz.com (Jim Choate) Date: Tue, 15 Sep 1998 23:56:53 +0800 Subject: Democracy... (fwd) Message-ID: <199809160522.AAA03680@einstein.ssz.com> Forwarded message: > Date: Tue, 15 Sep 1998 23:09:03 -0500 > From: Jaeger > Subject: Re: Democracy... > and the meaning is not that church > shouldn't have an effect on the state. Agreed. The state CAN support one > religion over another. If we are speaking of 'the state' as the 'federal government' then *no* it can't support any religion because it isn't authorized to address those issues under any venue, make no law means just that, make no law - whether for or against religion is irrelevant. This country is blind in respect to religion and the cornucopia of individual actions via the 9th & 10th. Now if you are speaking of 'the state' as the individual 50 states, regulated within the confines of their own 50 individual constitutions, as directed per the 10th then you are correct - provided the state constitution gives the state government the duty (governments don't have rights) to regulate religion, the fact is most don't. If there is no individual state regulation then the limitations of religion fall upon individual discretion. Whether the religion promoted going to heaven, smoking good ganja, or rapeing babies is irrelevant as to the ability of the state to engage in prior restraint - they can't. Since most local jurisdictions have laws against murder, rape, child molestation, etc. under their individual charters and representative system there is really no reason to a priori regulate such activities at any higher level than localy. It isn't the act that we should worry about, it's the consequences to others after the fact. If an act doesn't effect another person or their property directly then there is no legitimate reason to interfere with their actions. Constitutionaly the federal government should be blind to my actions as an individual unless I'm crossing a state line, work for the federal government, legal action, or have a treasury issue. > In context, the phrase simply explains that the > government can't make laws that RESTRICT religious practice or doctrinal > issues. Bullshit. There is NO way to reasonably accept this as a legitimate interpretation of the 1st & 10th. > The state CAN make laws that encourage the practice of any one > particular religion, as long as the laws do not RESTRICT the PRACTICE of > other religions. Making people uncomfortable isn't a constitutional > reason to overturn a law. No. Niether the spirit or the letter of the issue allows such sweeping generalizations. In fact it fails for the same reason that mass searches fail strict Constitutional interpretation, the Constitution directs that probable cause is required *IN EACH CASE* to be handled individualy, there is no stipulation where individual probable cause may be bypassed. Just because you do it to everyone, while you can't do it to anyone, legitimizes it. If you can't rape an individual you can't rape 10 people. The same applies to religion, the federal government can't make a law respecting a religion because it can't even define religion. Now if you can't support any religion you certainly can't support an individual religion. ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From edsmith at IntNet.net Tue Sep 15 09:27:01 1998 From: edsmith at IntNet.net (Edwin E. Smith) Date: Wed, 16 Sep 1998 00:27:01 +0800 Subject: Democracy... In-Reply-To: <35FF220A.F88B87F6@hempseed.com> Message-ID: <3.0.2.32.19980916012129.007f46c0@mailhost.IntNet.net> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 And while we are on the subject, nothing gets to me quite so easily as self-styled educated men who cannot spell or form a grammatically correct sentence. You attempt to flame those whose logic is faulty and come off looking like ignorant boobs. If you had done a little more reading in your past you would be able to recognize your own poor ability to communicate yet you rail on about the cluelessness of AOLers who haven't read the constitution. My question is how is it that you are able to read it? I have pity for those who are products of the public school system but they have an excuse. What excuse do computer programmers have? They are forced to think logically yet so often refuse to do so in matters of real life. They often fall back upon the constitutionality of a particular concept yet haven't tested it with the power of their own sense of truth and justice. Such is the substance of lawyers and politicians. I recently saw a posting about right v. wrong or good v. evil. These are subjective terms as any good semanticist knows. But what is real and what is unreal is a much more difficult thing to determine. It requires rigorous thinking without prejudice or belief getting in the way. As to law. The first of the Bill of Rights says: Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble, and to petition the Government for a redress of grievances. If you are going to quote something, do it fully and accurately. It isn't that hard and if you don't have a copy of the constitution laying around then either get one or keep your damn mouth shut until you know what you are talking about. No, the words "seperation of church and state" do not appear but then neither does "privacy", but it is damn well implied by the 4th amendment. Those self-righteous pricks who want bible reading in the schools and rail against those who recite the 1st amendment either lack understanding of the term "reading" or are being dishonest by insisting that disallowing teachers to read the bible to students is wrong and that the constitution needs to be amended. Anyone with any honesty would realize that the first amendment doesn't prohibit bible reading by students or even bible study in a historical context. It merely prohibits tax-paid teachers from "respecting an establishment of religion, or prohibiting the free exercise thereof;". If I see just one more bible-thumping zealot message about "would you care to show us where "seperation of church and state" is to be found in the constitution/bill of rights?" I will be tempted to take him out in the parking lot and pound sand into the parts which are unaccustomed to this substance. I am all for separation of school and state. Show me where in the constitution/bill of rights everyone is entitled to a theft/tax funded education. This would solve church and state in schools wouldn't it. If you don't like your kids getting a non-religious education from the godless state, you are free to pull them out and put them into a private school of your choice. But of course it isn't your kids you are worried about is it? It's all those other peoples kids that aren't getting the benefit of the word of the one true Christian god that you want to help isn't it! Hypocrisy is the Vaseline(tm) of political intercourse! Edwin E. Smith At 08:39 PM 9/15/98 -0700, you wrote: >At 7:27 PM -0700 9/15/98, Jaeger wrote: >>hey, would you care to show us where "seperation of church and state" is >>to be found in the constitution/bill of rights? absolute right and > >Gee, check out the First Amendment to the U.S. Constitution. Also the first >item in the Bill of Rights. "Congress shall make no law respecting the >establishment of religion or prohibiting the free exercise thereof..." >(from memory, so don't bother me with minor wording corrections.) > >By standard convention, this is also referred to as "separation of church >and state." > >As with the clueless AOLers yakking about an "Assimov" story they read a >couple of years ago in the 5th grade, you bozos need to get educated and >spend a minute or two thinking before writing. > > >--Tim May > -----BEGIN PGP SIGNATURE----- Version: PGP for Personal Privacy 5.0 Charset: noconv iQA/AwUBNf9K10mNf6b56PAtEQLRZwCeL9bBfYwsdjQ06iTNlSu/j1YGmn0AoMTy 2U/bC+Bpmp9BlqrRXNPv0eCS =cdUv -----END PGP SIGNATURE----- From nobody at replay.com Tue Sep 15 09:33:12 1998 From: nobody at replay.com (Anonymous) Date: Wed, 16 Sep 1998 00:33:12 +0800 Subject: Regards Message-ID: <199809160528.HAA02807@replay.com> Witty retort to the flames :) I like this one. ---Christopher Barkley wrote: > > Apparently, I just spammed your list a couple of days ago; my > apologies. Some zithead listed your email address in the Six Degrees > networking service and starting asking people to be his contacts. One > can only hope his fate is neither swift nor pretty. (I bear some of the > blame; I should have recognized the email address since I have several > friends on the list.) > > At any rate, my thanks to Tom Perry for his polite explanation of the > situation. > > As for the REST of you who responded, you have my sympathies. With any > luck, they'll get that thorazine prescription refilled soon. > > Cheerio, > Christopher > == "The same thing we do every night Pinkey, try to take over the WORLD!" - The brain _________________________________________________________ DO YOU YAHOO!? Get your free @yahoo.com address at http://mail.yahoo.com From nobody at replay.com Tue Sep 15 09:44:14 1998 From: nobody at replay.com (Anonymous) Date: Wed, 16 Sep 1998 00:44:14 +0800 Subject: Democracy... Message-ID: <199809160536.HAA03287@replay.com> Separation of church and state was established by jefferson not as a quote from the constitution but as a summary of the religious parts of it. It was written in a letter to baptists in massachusets. He also sent a copy of it to his postmaster general and attorney general for proofreading to make sure it was a legal summary and correct. You can find this info on the internet. ---Jaeger wrote: > > hey, would you care to show us where "seperation of church and state" is > to be found in the constitution/bill of rights? absolute right and > wrong is not a religious belief (necessarily).. your religious beliefs > do not affect the nature of reality. there are absolute truths by > necessity... see, there is NO WAY that there could not be. Because if > there were no absolute truths, then that would mean that NOTHING is > absolute. That statement in itself is an absolute. now, as for > absolute truths regarding the president, there may or may not be any as > far as most people are concerned. people always seem to make an > exception for people who agree with them... in order to be an effective > president, however, one must uphold the very basis of this country, by > upholding the law. Clinton perjured himself, obstructed justice, and > tampered with witnesses in a grand jury investigation (which was > incidentally being conducted by a man who was praised just months > earlier as unbiased and very qualified for the job). The man is > supposed to be the figurehead for our system of gov't. If he cannot > follow the law, then he is not fit for the office. > > Jaeger > > > Ever heard of seperation of church and state? Democracy? the rights of > > > > the individual? While you certainly have the right to practice your > > religion in what ever manner you so choose demanding that everyone > > else > > does, or that the president of the us of ais subject to you PERSONAL > > faith decisions is outragous > > > > Vivek Vaidya > > > > ______________________________________________________ > > Get Your Private, Free Email at http://www.hotmail.com > > > > == "The same thing we do every night Pinkey, try to take over the WORLD!" - The brain _________________________________________________________ DO YOU YAHOO!? Get your free @yahoo.com address at http://mail.yahoo.com From jeff206 at juno.com Wed Sep 16 00:44:54 1998 From: jeff206 at juno.com (jeff206 at juno.com) Date: Wed, 16 Sep 1998 00:44:54 -0700 (PDT) Subject: Titanic Message-ID: <199809160744.AAA18755@toad.com> Dear Titanic Enthusiast: Sometime over the last few months you had visited our Titanic site entitled "Enter The Titanic". Also, you signed our Guest Book, expressed an interest in purchasing Titanic merchandise and left us your email address. I hope you don't mind receiving this message. If you do not wish to receive these messages regarding Titanic or Titanic merchandise in the future, simply respond to this email with "NO MORE" written in the subject window. For those of you interested, the cost of two of our most popular items have been reduced by our suppliers due to large volumes sold from our site. Authentic reproduction buttons and the Titanic CD ROM. 1). Authentic Reproductions - The Waterbury Button Company produced the solid brass buttons which adorned the coats of both the officers and crew of the R.M.S. Titanic. They also reproduced the buttons to be used in the James Camron movie "TITANIC". They have once more produced these buttons for public collection. These buttons are pressed from the same molds used in 1912, solid brass and coated in 24K gold. At only $29.95 plus shipping and handling they make a great gift or collection piece. CLICK HERE for a detailed description or visit http://www.geocities.com/baja/8334/reproductions.htm 2). "TITANIC: A Voyage of Discovery" CD ROM - This CD ROM disk is loaded with the most information compiled on Titanic than any other source available. It's filled with photos, music, video, artifacts and stories taken from the actual account of survivors. It's a must have for any Titanic enthusiast. This fact filled CD ROM has been reduced for a short time to only $45.95 plus shipping and handling. CLICK HERE for more details or visit http://www.unidial.com/~bflowers/home.htm I hope you will visit these sites and add these great items to your Titanic collection. We pride ourselves in offering only the highest quality, authentic Titanic merchandise. Other products we offer are listed at our Titanic Merchandise page located at http://www.unidial.com/~bflowers/merchandise.htm Remember Titanic and those who lost their lives aboard her. May They Rest In Peace ! Bob Flowers, Jr. Webmaster Enter The Titanic From edsmith at IntNet.net Tue Sep 15 09:56:56 1998 From: edsmith at IntNet.net (Edwin E. Smith) Date: Wed, 16 Sep 1998 00:56:56 +0800 Subject: Democracy... In-Reply-To: <3.0.2.32.19980916003108.007cfbf0@mailhost.IntNet.net> Message-ID: <3.0.2.32.19980916015110.007b29a0@mailhost.IntNet.net> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 twit, v.t, twitted, twitting. address teasingly. I'm touched! You think I'm teasing you? Well, I'm NOT teasing you. You're an ASSHOLE! Yes I spelled it correctly so there wouldn't be any misunderstanding. You're a self-righteous prick who dumps on people just because they have a certain email address without any consideration for what they may be saying. Yes there are clueless people at AOL and there are clueless people at got.net and at intnet.net. So what? When you cut yourself off from people just because of their email address you do yourself a disservice but when you try to dissuade others because of your prejudice then you wrong us as well. I am quite able to evaluate the worthiness of someones words without your superior pronouncements. If you don't have anything of value to add to the discussion then shut-the-fuck-up! Edwin At 09:43 PM 9/15/98 -0700, you wrote: >At 9:31 PM -0700 9/15/98, Edwin E. Smith wrote: > >> >>Only a minute or two? How many minutes does it take to be able to >>correctly spell the name of somebody you are deprecating? >> > >The only _name_ mentioned in my post was "Assimov." This must be the >"correctly spell the name of...." example you are citing. > >This spelling was deliberate, based on the AOL guy citing his 5th grade >reading of it... > >As for you, you're still a twit. > -----BEGIN PGP SIGNATURE----- Version: PGP for Personal Privacy 5.0 Charset: noconv iQA/AwUBNf9RzUmNf6b56PAtEQJUywCg/d+IFyZeUWGvytpdxR85CuHS05YAoLyB bkSyv+E6WRZXewM0LEIS2jcZ =OdGi -----END PGP SIGNATURE----- From nobody at replay.com Tue Sep 15 10:00:05 1998 From: nobody at replay.com (Anonymous) Date: Wed, 16 Sep 1998 01:00:05 +0800 Subject: Larry Gilbert, AOLers, and the Hyper-real flamer Message-ID: <199809160556.HAA04756@replay.com> On Tue, 15 Sep 1998 AIMSX at aol.com wrote: > > Obviously you have a very high opinion of yourself and a low opinion of people > who use AOL. Contrary to popular belief, there are a few intelligent people > on AOL, but it looks as if you are too egotistical to realize that. You're right. We have very high opinions of ourselves. We have low opinions of people who use AOL because they're typically scum, spammers, or idiots. You even admit this by saying "there are a FEW intelligent people on AOL." They're also paying $20/month for a shitty service with a bad reputation. If you don't like the stereotype, get your fellow AOLers to get a clue and reverse it which will probably take years if it's possible at all, or if you're actually an intelligent AOLer, go get an ISP which isn't synonymous with manure. Personally, I'm figuring very, very few AOL users who publish actively to the Internet have a clue. The traffic on this list just over the last month backs that up. The reputation AOL has is deserved, and there is a definate pattern of stupidity from AOL. In the future quote so we know what you're talking about, and don't use the "flick off the Internet" quoting style, either. > Have you ever thought to look at your own mistakes before you publicize > everyone else's to the world? I'm not sending requests for band stickers to cryptography lists. I'm not sending messages to cryptography lists which read "how u do that" with no punctuation. I'm not asking members of cryptography lists to sign me up to receive the news by email every morning. I'm not replying to things while not quoting, or by using some quoting system which was designed by AOL for the purpose of pissing off non-AOLers. I'm not publishing web pages which are unreadable without the latest shovelware from Microsoft or Netscape, and which shoots the finger otherwise. I'm not saying "AOL is the Internet," and I'm not signing up with a service because they send me a free mirror or coaster or because I'm too lazy to learn to do anything other than point and click. > Are you just suffering from some sort of > dillusion of grandeur - thinking you are better than everyone else. Not everyone else, but infinitely better than the average kool d00d, AOLer, or webber, and infinitely better than the president who the "average" American elected. By the way, the sentence I quoted above is what is known as a question. In English, you use a question mark for those. > Things > like this are what many wars were started over, I am so happy the internet > (hopefully) won't start a war in the real world. I won't have anything to do with it, but I'm fully expecting for some new Unabomber to appear within the next few years. Instead of targeting technology centers like the Unabomber did, this guy will mail bombs to spammers, people who send "how u do that" to lists, etc. I, thankfully, am morally constrained enough to never do anything like that, but I would bet that there is somebody out there who isn't. >From what AOL users send to the Internet from their service, one can easily conclude that AOL is a haven for wannabes, lamers, and k00l D00dz \/\/h0 tiPE l1| Message-ID: On Tue, 15 Sep 1998, attila wrote: Well, I've been working for a couple of days and spent the weekend before that with The Report. I read all of it, including the footnotes, every damn one of them, and they're where all the good stuff is, btw. Given that weekend study, it's apparent to me, after reviewing several days of posts on this topic on this list, that most of you people can't or don't read or have the attention spans of gnats. The perjury case has some serious reasonable doubt problems, the abuse of power case is thin, thin, and the executive privilege stuff is there as sheer trade goods to give Congress something to throw out. In legal parlance, it wouldn't pass Rule 11. And I don't know who is giving you legal advice, but there's no sexual harrassment count in the thing. Read it, if you can. Peferably after your medication. Much of what you guys have had to say about this matter since Friday is hilarious, much of it pungent, some of it poingnant, and even some of it accurate. But mostly pretty ignorant and beneath your usual standard. One of you had the good sense to post the column i repost below, because that fellow seems to have gotten a pretty good handle on this squalid mess. But punks . . . well, punks . . . a few years ago when I first subscribed to this list, to lurk and learn, as I still mostly do, there were some hardasses you could depend on to come out of the woodwork when things got way out of space, and they'd say: Punks write code. And they were write. MacN > > New York Times > September 13, 1998 > IN AMERICA/By BOB HERBERT > Still Doesn't Get It > > David Maraniss, in his biography of Bill Clinton, "First in His Class," > writes about an "intense relationship" that Mr. Clinton had with a > young woman who had volunteered to work in his first campaign for > public office. Mr. Clinton was running for Congress and the woman was a > student at the University of Arkansas. > > A campaign aide, quoted in the book, said, "The staff tried to ignore it as > long as it didn't interfere with the campaign." But it did interfere, because > Mr. Clinton was also intensely involved with Hillary Rodham. > > Mr. Maraniss writes: "The tension at campaign headquarters increased > considerably when Rodham arrived as people there tried to deal with the > situation. Both women seemed on edge. The Arkansas girlfriend would ask > people about Hillary: what she was like, and whether Clinton was going to > marry her. When she was at headquarters, someone would sneak her out > the back door if Rodham was spotted pulling into the driveway." > > It was all there more than two decades ago at the very beginning of Bill > Clinton's political journey: the thoughtlessness, the recklessness, the > wanton use of friends and associates to cover up his ugly behavior, the > willingness to jeopardize the hopes and dreams of people who were > working for him and trusted him, the betrayal of those closest to him. > > There is nothing new in Kenneth Starr's report, just confirmation in > extreme and at times lurid detail of the type of person Mr. Clinton has > always been. > > In 1992, when he was running for President and people across the nation > were investing their time, money and even their careers in him, he > rewarded them with the Gennifer Flowers scandal. He carried his > psychodrama onto national television when he went on "60 Minutes" and, > with Mrs. Clinton at his side, called Ms. Flowers a liar. > > He told Steve Kroft and 30 million viewers: "It was only when money came > up, when the tabloid went down there offering people money to say that > they had been involved with me, that she changed her story. There's a > recession on, times are tough, and I think you can expect more and more > of these stories as long as they're down there handing out money." > > In other words, it was the economy, stupid. > > But even as he was denying that he had had a sexual relationship with > Gennifer Flowers, Mr. Clinton was going out of his way on "60 Minutes" to > convey to the public that he had learned a lesson, that he had matured > and that his irresponsible behavior would not be a problem if he were > elected President. > > "I have absolutely leveled with the American people," he said. > > In fact, his comments were about as level as the Himalayas. We now know > that he was willing to risk everything, his family, his Presidency, the > welfare of the nation, on a dangerous fling with a White House intern. For > him, it must have been great fun. He got to play so many people for fools. > He got to chat on the phone with Congressmen while engaging in sex. He > got to play hide and seek with the Secret Service. > > Very mature behavior. > > Now the Clinton psychodrama has much of the Government paralyzed > and the Democratic Party in a state of panic. But Mr. Clinton still doesn't > get it. On Thursday he met with the members of his Cabinet, who had > been duped and lied to like so many others. He went into his emotional > routine and said he was oh-so-sorry, etc. He begged for forgiveness. > > But he got upset when the Secretary of Health and Human Services, > Donna Shalala, said that she was appalled by his behavior. Ms. Shalala > complained that the President seemed to believe that pursuing his > policies and programs was more important than providing moral > leadership. > > A story in The Washington Post said Mr. Clinton responded sharply to Ms. > Shalala, rebuking her. My understanding is that his response was critical > but not harsh. Either way, it's clear that Mr. Clinton has not learned the > requisite lessons. He lied to Ms. Shalala months ago and sent her out to lie > to the public, and now he's criticizing her. The President is not sorry. He's > apologizing because there's a gun at his head. He's not changing what he > now describes as his sinful ways. He's trying to manipulate public opinion > so he can survive to sin again. The psychodrama remains as long as he > remains. > > There are no surprises here. With Bill Clinton, it was ever thus. > > > > From culasd at usa.net Wed Sep 16 01:32:54 1998 From: culasd at usa.net (culasd at usa.net) Date: Wed, 16 Sep 1998 01:32:54 -0700 (PDT) Subject: Stock is up 275%!! Message-ID: <199809160832.KAA23272@mail.myway.de> The stock is up 275% in less than 40 days. This Thursday, September 3, 1998 Omicron closed at $6.87 During this same time period the DOW has gone down over 1,700 points! Don't Miss This One! For more information: http://www.americanstockchannel.com/omicron The stock symbol is: OGPS _______________________ From nobody at sind.hyperreal.art.pl Tue Sep 15 10:52:07 1998 From: nobody at sind.hyperreal.art.pl (HyperReal-Anon) Date: Wed, 16 Sep 1998 01:52:07 +0800 Subject: Harald Fragner Message-ID: On Tue, 15 Sep 1998, John Scott Porterfield wrote: > > How do I get off this list!!! > > Bob > > You remove yourself from this list the same way you subscribed, but since that is such a stupid question and you are obviously a very intelligent man, I conclude that you meant something else. By running your badly punctuated sentence through the AOLhole-translator, we get either: "How do I get off?" or "How do I get off on this list?" To get off, you may consider seeing a sex therapist. They are more qualified to assist you in that area. To get off on this list is more difficult. We Cypherpunks aren't into that kind of thing. However, we understand that Christopher Barkley is in the market for a friend, so you may want to see if you can pair up. You've both spammed the list, so you already have something in common! In the mean time, please refrain from shooting jizz all over the list like you and the Sixdegrees lamers have been doing. Someone may slip and hurt themselves and it always leaves a sticky mess that's just hell on the carpet. Regards, Voices, Harald, Woof, moans, and whatever. From vznuri at netcom.com Tue Sep 15 10:57:06 1998 From: vznuri at netcom.com (Vladimir Z. Nuri) Date: Wed, 16 Sep 1998 01:57:06 +0800 Subject: SNET: (Fwd) Radio Show on CIA Message-ID: <199809160658.XAA22988@netcom13.netcom.com> From: "Steve Wingate" Subject: SNET: (Fwd) Radio Show on CIA Date: Mon, 14 Sep 1998 19:28:26 -0700 To: "CIA.DRUGS" , SNETNEWS , CTRL at LISTSERV.AOL.COM -> SNETNEWS Mailing List ------- Forwarded Message Follows ------- From: Expert53 at aol.com Date: Mon, 14 Sep 1998 14:44:04 EDT Subject: Radio Show on CIA THE EXPERT WITNESS RADIO SHOW WBAI New York City 99.5 FM Expert53 at aol.co 212-209-2800 (voice mail #2970) Host: Michael Levine, 25 Year veteran federal agent and author of NY Times bestseller "DEEP COVER" - (just optioned for movie) "THE BIG WHITE LIE" -The fact-based thriller (now in paperback), THE TRIANGLE OF DEATH, based on actual, never-before-revealed events from CIA's hunt for mind control drugs WEB SITES: http://www.radio4all.org/expert - Past radio shows may be downloaded free of charge; includes books, photos and opinion articles. http://www.universalprosthesis.com/news/expert.html - includes the ability to order tapes of the old shows, at cost, $8 per show. FIGHT BACK ANTI-DRUG PROGRAM: http://idt.net/~dorisaw TUESDAY EVENING, 7-8pm, Septeber 15, 1998, on WBAI, 99.5 FM in NYC, the Expert Witness Radio Show will feature a discussion with journalists Alexander Cockburn and Jeffrey St. Clair about their recent book "WHITEOUT"-a powerful and well documented analysis of CIA's manipulation of mainstream media to cover up massive "Three Stooges" ineptitude and criminality. The show will be rebroadcast a week later on the Roy Tuckan Show, KPFK, Los Angeles, CA, and then archived on the above listed web sites. -> Send "subscribe snetnews " to majordomo at world.std.com -> Posted by: "Steve Wingate" From vznuri at netcom.com Tue Sep 15 10:57:14 1998 From: vznuri at netcom.com (Vladimir Z. Nuri) Date: Wed, 16 Sep 1998 01:57:14 +0800 Subject: SNET: National ID Cards- world wide phenomenon Message-ID: <199809160658.XAA22977@netcom13.netcom.com> From: jeremy.compton at stonebow.otago.ac.nz (Jeremy Compton) Subject: SNET: National ID Cards- world wide phenomenon Date: Tue, 15 Sep 1998 14:03:47 +1200 To: snetnews at world.std.com -> SNETNEWS Mailing List http://www.privacy.org/pi/activities/i dcard/" National ID Cards Many countries are actively considering adopting national id cards for a variety of functions. These include the United States, United Kingdom and Canada. Over the past seven years, Privacy International has been at the forefront of opposing these proposals in a number of countries including Australia, New Zealand, the Phillippines, Thailand, the United Kingdom and the United States. These pages are an attempt to bring together materials based on PI members' experiences on opposing the proposals. While each jurisdictions may have local variations, the themes remain remarkably similar no matter where the proposals are heard. Our intention here is to discuss the evidence at an international level and to promote debate about the claims made about such card systems. Privacy International Materials Privacy International's ID Card FAQ. Frequently Asked Questions report on id cards. (7000 words) Campaigns of Opposition to ID Cards. A review and analysis of the successful campaign to kill the Australia Card in 1987. Personal views from around the world on ID cards. The UK Government ID Card Proposal The UK ID card proposal was quietly set aside in 1996. UK Home Office Green Paper "Identity Cards - A Consultation" Home Office press release on id cards, 24 January 1996. Central Computer and Telecommunications Agency report, Smart cards: Opportunities for public sector applications. Response of the Data Protection Registrar to the Government's proposals for Identity Cards. The Green Paper on Identity Cards: A response from the Centre for Computing and Social Responsibility by Simon Rogerson. "Identity Crisis: why ID cards are a solution looking for a problem" by Liz Parratt from Liberty. "IDENTITY CARDS: Data protection implications" by Chris Pounder, Data Protection News (UK). State of the Nation articles on national ID cards. Social, Legal and Professional Aspects of Computing ID Cards. "Britain Discussing National ID Card System", Newsbytes, 03/28/95. Other Reports and Materials "TOUCHING BIG BROTHER: How biometric technology will fuse flesh and machine" by Simon Davies. "Smart Cards: Big Brother's Little Helpers" by The Privacy Committee of New South Wales, Australia. Chip-Based ID: Promise and Peril by Rober Clarke, Australian National Univeristy. Human Identification in Information Systems: Management Challenges and Public Policy Issues by Roger Clarke. Identification, Anonymity and Pseudonymity in Consumer Transactions: A Vital Systems Design and Public Policy Issue by Roger Clarke. 1991 Hungarian Supreme Court decision stricking down use of ID numbers. Smart Card Magazine, The Birth of Smart Cards: 1980. Electronic Privacy Information Center's pages on current national ID card proposals in the United States. News Stories TORONTO STAR, February 9th, 1996; Lead Editorial: HARRIS SHOULD SCRAP UNIVERSAL ID CARD. `Smart cards' will soon be approved, says health policy committee by chairperson by TOM ARNOLD, The Edmonton Journal. Canadian Privacy boss raps ID cards, The Canadian Press, July 15, 1995. Privacy commissioner in the dark about ID cards: Wants controls put on access, The Vancouver Province, September 27, 1995. AsiaWeek, ID Cards Introduced in Philippines. Greece to Demand Religion on National ID Cards, 2 May 1993. Unisys press release on Spain national ID card project. Return to Privacy International's Home Page Last updated July 16, 1997. -> Send "subscribe snetnews " to majordomo at world.std.com -> Posted by: jeremy.compton at stonebow.otago.ac.nz (Jeremy Compton) From vznuri at netcom.com Tue Sep 15 10:57:30 1998 From: vznuri at netcom.com (Vladimir Z. Nuri) Date: Wed, 16 Sep 1998 01:57:30 +0800 Subject: IP: DNA-Powered Computers: Patent Received Message-ID: <199809160658.XAA23001@netcom13.netcom.com> From: believer at telepath.com Subject: IP: DNA-Powered Computers: Patent Received Date: Mon, 14 Sep 1998 10:31:49 -0500 To: believer at telepath.com Source: New York Times http://www.nytimes.com/yr/mo/day/news/financial/patents.html September 14, 1998 PATENTS Solve Computer Problems With DNA By TERESA RIORDAN Four years ago, Dr. Leonard Adleman raised the exciting possibility of DNA-powered supercomputers when he wrote in the journal Science that he had solved a computational problem essentially by stirring up some DNA in a test tube, using building blocks of DNA as computing symbols. The technique, in concept, involves the use of DNA -- strands of genetic code -- as a stand-in for computer software code. Adleman, a professor at the University of Southern California, set up his problem by synthesizing DNA in a certain sequence and then letting DNA molecules react in a test tube so they ultimately produce a molecule whose sequence is the answer to the problem. He used the chemical units of DNA rather than electronic 1s and 0s to solve a single, relatively simple problem: figuring out the shortest distance someone would have to travel to visit a number of different cities -- similar to a standard math problem referred to as the "traveling salesman tour problem." But last week Dr. Warren Smith and Dr. Allan Schweitzer, two scientists at the NEC Research Institute in Princeton, N.J., received what appears to be the first patent covering a DNA computing process that at least theoretically can solve not just a single problem but a broad array of problems, just as a conventional desktop computer might. The patent describes a way to concoct a vat of DNA molecules that have been manipulated by standard biotechnology techniques -- such as the cutting, splicing and growing of DNA strands -- to behave like miniature computers. All these molecular-size computers would operate in parallel, with each one exploring different possible computational paths to solve a problem, potentially speeding up computing time greatly. The patent details a way to use genetic material to construct a large number of what are called Turing machines, all running in parallel, with each exploring different possible computational paths. (A Turing machine is a theoretical construct, first proposed in 1937 by the British computer scientist Alan Turing, that provides the schematic outline upon which digital computers are based.) Despite the new patent, Smith does not sound optimistic these days about the patented technique. "Some of the DNA molecules do the right step," he said in an interview, describing the process. "But then some other fraction just dissolve and get flushed down the drain." This and other problems lead to an exponential buildup in errors during the calculations. In addition, the operations of this DNA computing so far are slow-going, taking hours. "This does appear to be the first patent to issue in this area," said David Waltz, an NEC vice president. "But will this be the basis of a new industry, and will everyone have to take out a license on it in the future? That's not so clear." Smith and Schweitzer received patent number 5,804,373. Patents are available by number for $3 from the Patent and Trademark Office, Washington, D.C. 20231. Copyright 1998 The New York Times Company ----------------------- NOTE: In accordance with Title 17 U.S.C. section 107, this material is distributed without profit or payment to those who have expressed a prior interest in receiving this information for non-profit research and educational purposes only. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml ----------------------- ********************************************** To subscribe or unsubscribe, email: majordomo at majordomo.pobox.com with the message: (un)subscribe ignition-point email at address ********************************************** www.telepath.com/believer ********************************************** From vznuri at netcom.com Tue Sep 15 11:14:46 1998 From: vznuri at netcom.com (Vladimir Z. Nuri) Date: Wed, 16 Sep 1998 02:14:46 +0800 Subject: SNET: [FP] FW: Want to Travel? Not W/O Your Biometric Passport Message-ID: <199809160716.AAA24468@netcom13.netcom.com> From: "ScanThisNews" (by way of jeremy.compton at stonebow.otago.ac.nz (Jeremy Compton)) Subject: SNET: [FP] FW: Want to Travel? Not W/O Your Biometric Passport Date: Wed, 16 Sep 1998 15:01:38 +1200 To: snetnews at world.std.com -> SNETNEWS Mailing List ====================================================================== SCAN THIS NEWS 9/15/98 [forwarded message] US Takes Immigration in Hand by Theta Pavis http://www.wired.com/news/news/technology/story/15014.html Sep 15, 1998 It's been 44 years since Ellis Island closed shop, but immigration can still be a long, tiresome process. In an effort to speed the process for international travelers, the US Immigration and Naturalization Service is offering a biometric system for willing frequent flyers. So far, 71,000 people in six airports have signed up for the system, called INSPASS. It employs a biometric kiosk to scan and match the geometric dimensions of travelers' hands, verify their identities, and perform standard background checks. The INS plans to expand the program to four additional airports by the end of the year. "It creates a fast lane for people," said James Wayman, head of the federally funded National Biometric Test Center at San Jose State University. The kiosks were integrated by EDS, which has had a US$300 million contract with the INS for automation support and software development since 1994. This summer, the INS awarded a new, five-year information-technology contract worth $750 million to EDS and four other companies. Ann Cohen, an EDS vice president in the government services group, said the fact that so many people have signed up for the INSPASS system shows that biometrics are becoming more popular and could be commonplace in the future. "Were getting over that 'Big Brother' hurdle," Cohen said. As e-commerce develops and terrorism grows, biometrics increasingly are the "only sure way to get security." US and Canadian citizens flying overseas on business at least three times a year are eligible for the free INSPASS program. People from Bermuda and 26 other countries that have visa-waiver agreements with the United States are also eligible. The INSPASS kiosks, which look like ATM machines, were recently installed at the Los Angeles International Airport, where more than 1,000 people have enrolled in the program. Rico Cabrera, a spokesman with the INS Los Angeles regional office, said travelers like the fact that INSPASS can check their identity in 16 to 60 seconds, a process that can take up to three hours at some airports. The largest group of INSPASS users at LAX are US citizens, followed by Australians and New Zealanders. After filling out a one-page form and passing a background check, travelers can be issued a Port Pass card with their picture and a 12-number ID on it. A traveler inserts the card in the kiosk, which reads the ID number and links to a centralized database run by US Customs. A geometric hand template is called up from the database and transferred to the kiosk. After a green light flashes, the right hand is placed on a reflective surface -- the ID-3D Handkey, made by Recognition Systems. The HandKey uses a video camera to take a geometric image of the traveler's hand and fingers, and the data is converted using compression algorithms. If it matches the template of the hand stored in the database, the traveler is in. INSPASS kiosks are also in use at airports in Newark, Miami, Kennedy (New York), Pearson (Toronto), and Vancouver, British Columbia. The INS eventually plans to install them at most busy international airports around the country, including Washington, San Francisco, Seattle, and Honolulu. The department has geared the programtoward business travelers, diplomats, airline personnel, and other "low-risk" visitors. Some argue that the INS hasn't done enough to market the program. Jeffrey Betts, WorldWide Solution Manager for IBM -- which has developed FastGate, a kiosk similar to INSPASS -- said people aren't enrolling fast enough in the INS system. International arrivals at airports across the globe are growing every year by 7 to 10 percent, Betts said, but border control resources are flat or declining. In 1996, some 65,000 people were enrolled in the INSPASS program, but the program has added just 6,000 new users since then. IBM, which has been running a small pilot program of FastGate in Bermuda for the past year, is building a system where people can swipe a credit card through a kiosk at the airport and connect with a database where the biometrics are stored. "Governments will have to find ways to do more with less or force travelers to queue like cattle," Betts said. While the government plans on marketing INSPASS more aggressively in the future, Schmidt said, INS is counting on word of mouth to get new people enrolled. "We don't really have the budget for a huge marketing campaign," she said. -----Original Message----- From: Patrick Poole [mailto:ppoole at fcref.org] Sent: Tuesday, September 15, 1998 5:09 PM Subject: Want to Travel? Not W/O Your Biometric Passport ======================================================================= Don't believe anything you read on the Net unless: 1) you can confirm it with another source, and/or 2) it is consistent with what you already know to be true. ======================================================================= Reply to: ======================================================================= To subscribe to the free Scan This News newsletter, send a message to and type "subscribe scan" in the BODY. Or, to be removed type "unsubscribe scan" in the message BODY. For additional instructions see www.efga.org/about/maillist.html ----------------------------------------------------------------------- "Scan This News" is Sponsored by S.C.A.N. Host of the "FIGHT THE FINGERPRINT!" web page: www.networkusa.org/fingerprint.shtml ======================================================================= -> Send "subscribe snetnews " to majordomo at world.std.com -> Posted by: "ScanThisNews" (by way of jeremy.compton at stonebow.otago.ac.nz (Jeremy Compton)) From vznuri at netcom.com Tue Sep 15 11:14:55 1998 From: vznuri at netcom.com (Vladimir Z. Nuri) Date: Wed, 16 Sep 1998 02:14:55 +0800 Subject: SNET: [FP] FW: Arkansas: Digital/Biometric Drivers License System Message-ID: <199809160716.AAA24458@netcom13.netcom.com> From: "ScanThisNews" (by way of jeremy.compton at stonebow.otago.ac.nz (Jeremy Compton)) Subject: SNET: [FP] FW: Arkansas: Digital/Biometric Drivers License System Date: Wed, 16 Sep 1998 15:01:36 +1200 To: snetnews at world.std.com -> SNETNEWS Mailing List [forwarded message] Source: PR Newswire http://www.prnewswire.com Viisage Technology, Inc. to Provide Statewide Digital Drivers License System In Arkansas LITTLETON, Mass., Sept. 14 /PRNewswire/ -- Viisage Technology, Inc. (Nasdaq: VISG), a leader in the emerging field of biometrics technology and in providing digital identification systems and solutions, has been awarded a $10.4 million contract by the State of Arkansas to provide a new digital drivers license system with 158 locations across the State. Mike Munns, Arkansas Administrator of Driver Services, said, "We conducted a comprehensive process to identify the best system value for Arkansas drivers while seeking to improve the quality of service in our offices and obtain the best technology available. Viisage not only met these requirements, they also demonstrated an understanding of our needs and a commitment to be a true partner in this important project." Tom Colatosti, Viisage Vice President and COO, said, "We are pleased about the opportunity to partner with the Arkansas Office of Driver Services to provide Arkansas drivers with leadership technology and the most secure licenses available. The Arkansas contract will be managed by the company's systems integration and identification card division that was established in May 1998 when the company reorganized to create separate systems integration and biometrics divisions. This contract increases the company's market share in the drivers license business and will contribute to the growth and profitability of the systems integration and identification card division." Bob Hughes, Viisage President and CEO, said, "The biometrics division will continue to raise capital and invest profits, as needed, to develop its unique facial recognition technology and products. These products will be sold through channels, including the company's systems integration division, for identification, verification, security and other biometric applications. Biometrics technology and, in particular, Viisage's facial recognition technology are receiving intense interest from many market segments. Viisage seeks to achieve long term growth and profitability by penetrating these new markets and developing products to meet market needs." With the Arkansas contract, Viisage systems provide more than 100 million digital identification cards under contracts for drivers license programs in Arizona, Florida, Illinois, Massachusetts, New Mexico, North Carolina, Ohio and Wisconsin, and for social services programs in Connecticut, Massachusetts and New York. Other Viisage projects include voter registration programs in Jamaica and the Philippines and programs with the Ohio Department of Corrections and the U.S. Department of Treasury's Immigration and Naturalization Service. Viisage also has the world's largest facial recognition database with projects in Massachusetts and Illinois. Viisage is a leading provider of digital identification systems and solutions intended to improve personal convenience and security, deter fraud and reduce identification program costs. The company combines its systems integration and software design capabilities with its proprietary software and hardware products to create custom solutions in a wide range of applications that can include national ID's, drivers licenses, law enforcement, voter registration, social services, access control and information, healthcare, financial services and retail. Viisage has also devoted significant resources to become a leader in the emerging field of biometrics with particular emphasis on patented facial recognition technology for real-time and large database identification and verification of individuals. Viisage can be found on the World Wide Web at http://www.viisage.com. This news release may contain forward-looking statements that involve risks and uncertainties. Forward-looking statements in this document and those made from time to time by the Company through its senior management are made pursuant to the safe harbor provisions of the Private Securities Litigation Reform Act of 1995. Forward-looking statements concerning future plans or results are necessarily only estimates and actual results could differ materially from expectations. Certain factors that could cause or contribute to such differences include, among other things, potential fluctuations in quarterly results, the size and timing of award and performance on contracts, dependence on large contracts and a limited number of customers, lengthy sales and implementation cycles, changes in management estimates incident to accounting for contracts, availability and cost of key components, market acceptance of new or enhanced products and services, proprietary technology and changing technology, competitive conditions, system performance, management of growth, dependence on key personnel and general economic and political conditions and other factors affecting spending by customers. SOURCE Viisage Technology, Inc. Web Site: http://www.viisage.com �1998 PR Newswire. ----------------------- NOTE: In accordance with Title 17 U.S.C. section 107, this material is distributed without profit or payment to those who have expressed a prior interest in receiving this information for non-profit research and educational purposes only. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml ----------------------- -----Original Message----- From: believer at telepath.com [mailto:believer at telepath.com] Sent: Tuesday, September 15, 1998 9:51 AM To: believer at telepath.com Subject: Arkansas: Digital/Biometric Drivers License System -> Send "subscribe snetnews " to majordomo at world.std.com -> Posted by: "ScanThisNews" (by way of jeremy.compton at stonebow.otago.ac.nz (Jeremy Compton)) From vznuri at netcom.com Tue Sep 15 11:14:57 1998 From: vznuri at netcom.com (Vladimir Z. Nuri) Date: Wed, 16 Sep 1998 02:14:57 +0800 Subject: IP: [Fwd: Newspapers that have called for President Clinton'sresignation.] Message-ID: <199809160716.AAA24479@netcom13.netcom.com> From: jlbtexas Subject: IP: [Fwd: Newspapers that have called for President Clinton'sresignation.] Date: Tue, 15 Sep 1998 19:22:09 -0500 To: Ignition Point This is a multi-part message in MIME format. --------------748814E7F8CA61AC43FE785D Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit --------------748814E7F8CA61AC43FE785D Content-Type: message/rfc822 Content-Transfer-Encoding: 7bit Content-Disposition: inline Return-Path: Received: from mail-gw1adm.rcsntx.swbell.net (mail-gw1adm.rcsntx.swbell.net [151.164.60.101]) by mail1.rcsntx.swbell.net (8.8.5/8.8.5) with ESMTP id TAA04511; Tue, 15 Sep 1998 19:23:25 -0500 (CDT) Received: from smokies.amnix.com (smokies.amnix.com [207.174.29.6]) by mail-gw1adm.rcsntx.swbell.net (8.8.5/8.8.5) with ESMTP id TAA08204; Tue, 15 Sep 1998 19:23:24 -0500 (CDT) Received: from x (ppp-15.dialup2.den.amnix.com [207.174.29.147]) by smokies.amnix.com (8.8.8/8.8.8) with SMTP id SAA06718; Tue, 15 Sep 1998 18:09:30 -0600 (MDT) (envelope-from spiker at amnix.com) Message-Id: <4.0.1.19980915180207.0115aa20 at amnix.com> X-Sender: spiker at amnix.com X-Mailer: QUALCOMM Windows Eudora Pro Version 4.0.1 Date: Tue, 15 Sep 1998 18:18:49 -0600 To: repub-d at u.washington.edu (New Republican Discussion List) From: spiker Subject: Newspapers that have called for President Clinton's resignation. Mime-Version: 1.0 Content-Type: multipart/alternative; types="text/plain,text/html"; boundary="=====================_41497386==_.ALT" --=====================_41497386==_.ALT Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable Newspapers that have called for President Clinton's resignation. AP Sept. 15=20 (AP) =97 Newspapers that have called for President Clinton's resignation. Some of those listed did so before the release of Kenneth Starr's report on Sept.= 11.=20 NATIONAL:=20 USA Today=20 ALABAMA:=20 The Dothan Eagle=20 The Mobile Register=20 Montgomery Advertiser=20 ARIZONA:=20 The Daily Dispatch of Douglas=20 CALIFORNIA:=20 San Jose Mercury News=20 COLORADO:=20 The Denver Post=20 CONNECTICUT:=20 The Day of New London=20 Norwich Bulletin=20 FLORIDA:=20 Tampa Tribune=20 GEORGIA:=20 The Atlanta Journal-Constitution=20 The Augusta Chronicle.=20 The Daily Citizen-News, Dalton=20 ILLINOIS:=20 Chicago Tribune=20 INDIANA:=20 The Indianapolis Star=20 The Reporter of Lebanon=20 Chronicle-Tribune of Marion=20 IOWA:=20 The Des Moines Register=20 LOUISIANA:=20 The Times-Picayune of New Orleans=20 MICHIGAN:=20 The Grand Rapids Press=20 MINNESOTA:=20 Post-Bulletin of Rochester=20 MISSISSIPPI:=20 Northeast Mississippi Daily Journal, Tupelo=20 NEBRASKA:=20 Lincoln Journal Star=20 NEVADA:=20 Reno Gazette-Journal=20 NEW MEXICO:=20 Albuquerque Journal=20 NEW YORK:=20 Sunday Freeman of Kingston=20 Utica Observer-Dispatch=20 NORTH CAROLINA:=20 The Herald-Sun of Durham=20 Winston-Salem Journal=20 OHIO:=20 The Repository, Canton=20 The Cincinnati Enquirer=20 The News-Messenger, Fremont=20 News Journal, Mansfield=20 News-Herald, Port Clinton=20 OKLAHOMA:=20 Tulsa World=20 OREGON:=20 Statesman Journal, Salem=20 PENNSYLVANIA:=20 The Sentinel, Carlisle=20 The Daily Intelligencer, Doylestown=20 Standard-Speaker, Hazleton=20 The Philadelphia Inquirer=20 The Pittsburgh Post-Gazette=20 Daily American, Somerset=20 SOUTH CAROLINA:=20 The State, Columbia=20 SOUTH DAKOTA:=20 Argus Leader, Sioux Falls=20 TENNESSEE:=20 The Knoxville News-Sentinel=20 The Commercial Appeal, Memphis=20 TEXAS:=20 The Facts of Brazoria County=20 San Antonio Express-News=20 Tyler Morning Telegraph=20 UTAH:=20 Standard-Examiner, Ogden=20 The Spectrum, St. George=20 The Salt Lake City Tribune=20 WASHINGTON:=20 The Seattle Times=20 WISCONSIN:=20 The Post-Crescent, Appleton=20 The Journal Times, Racine=20 --=====================_41497386==_.ALT Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable Newspapers that have called for President Clinton's resignation.

AP
Sept. 15

(AP) =97 Newspapers that have called for President Clinton's resignation. Some of those listed did so before the release of Kenneth Starr's report on Sept. 11.



NATIONAL:

USA Today



ALABAMA:

The Dothan Eagle

The Mobile Register

Montgomery Advertiser



ARIZONA:

The Daily Dispatch of Douglas



CALIFORNIA:

San Jose Mercury News



COLORADO:

The Denver Post



CONNECTICUT:

The Day of New London

Norwich Bulletin



FLORIDA:

Tampa Tribune



GEORGIA:

The Atlanta Journal-Constitution

The Augusta Chronicle.

The Daily Citizen-News, Dalton



ILLINOIS:

Chicago Tribune



INDIANA:

The Indianapolis Star

The Reporter of Lebanon

Chronicle-Tribune of Marion



IOWA:

The Des Moines Register



LOUISIANA:

The Times-Picayune of New Orleans



MICHIGAN:

The Grand Rapids Press



MINNESOTA:

Post-Bulletin of Rochester



MISSISSIPPI:

Northeast Mississippi Daily Journal, Tupelo



NEBRASKA:

Lincoln Journal Star



NEVADA:

Reno Gazette-Journal



NEW MEXICO:

Albuquerque Journal



NEW YORK:

Sunday Freeman of Kingston

Utica Observer-Dispatch



NORTH CAROLINA:

The Herald-Sun of Durham

Winston-Salem Journal



OHIO:

The Repository, Canton

The Cincinnati Enquirer

The News-Messenger, Fremont

News Journal, Mansfield

News-Herald, Port Clinton



OKLAHOMA:

Tulsa World



OREGON:

Statesman Journal, Salem



PENNSYLVANIA:

The Sentinel, Carlisle

The Daily Intelligencer, Doylestown

Standard-Speaker, Hazleton

The Philadelphia Inquirer

The Pittsburgh Post-Gazette

Daily American, Somerset



SOUTH CAROLINA:

The State, Columbia



SOUTH DAKOTA:

Argus Leader, Sioux Falls



TENNESSEE:

The Knoxville News-Sentinel

The Commercial Appeal, Memphis



TEXAS:

The Facts of Brazoria County

San Antonio Express-News

Tyler Morning Telegraph



UTAH:

Standard-Examiner, Ogden

The Spectrum, St. George

The Salt Lake City Tribune



WASHINGTON:

The Seattle Times



WISCONSIN:

The Post-Crescent, Appleton

The Journal Times, Racine

--=====================_41497386==_.ALT-- --------------748814E7F8CA61AC43FE785D-- ********************************************** To subscribe or unsubscribe, email: majordomo at majordomo.pobox.com with the message: (un)subscribe ignition-point email at address ********************************************** www.telepath.com/believer ********************************************** From stuffed at stuffed.net Wed Sep 16 02:16:11 1998 From: stuffed at stuffed.net (STUFFED NEWS DAILY) Date: Wed, 16 Sep 1998 02:16:11 -0700 (PDT) Subject: ----> http://stuffed.net/98/9/16/ <---- Message-ID: <19980916071000.15351.qmail@eureka.abc-web.com> Welcome to today's issue of Stuffed. To read it you should click on the URL above. If it is not made clickable by your email program you will need to use your mouse to highlight the URL, copy it and then paste it into your browser (then press Return). This email is never sent unsolicited. Stuffed is the supplement for the Eureka newsletter you subscribed to. Full instructions on unsubscribing are in every issue of Eureka! ----> http://stuffed.net/98/9/16/ <---- From phirebearer at hotmail.com Tue Sep 15 11:32:54 1998 From: phirebearer at hotmail.com (Vivek Vaidya) Date: Wed, 16 Sep 1998 02:32:54 +0800 Subject: Democracy... Message-ID: <19980916072612.3520.qmail@hotmail.com> >At Tuesday, you wrote: >>> 1)Love the Lord, with all your heart, with all you soul with all your >>> mind and all your strength >>> 2)Love you neibour as yourself. >>> >>> Everything else hangs on these. >>> >>Ever heard of seperation of church and state? Democracy? the rights >>of the individual? While you certainly have the right to practice >>your religion in what ever manner you so choose demanding that >>everyone else does, or that the president of the us of ais subject >>to you PERSONAL faith decisions is outragous > >I believe you are confusing church with religion. >Religion has nothing to do with Churches and the dogmas they follow. >Like Ethics have nothing to do with Law. > >The reference made is more related with ethics than with religion >(even if a reference to God is made) and certainly no related at all >with any Church. > >May I note also that crude atheism is more related with a Church >with its dogmas. They all create a fixed mind and the reduction >of human dignity that follows. > >To avoid equivokes: >Religion has nothing to do with 'faith' or 'Churches' >A man may be an atheist and be religious. It is a more intimate >characteristic than beliefs. >A prist may not be religious at all... as often happens. > >(The equivoke will happen to those who have no insight on the word >'religion'... only of its use and misuse.) > >And it will always surprise me to see words used in the inverse >sense of themselves, like the use of the word 'freedom' in its >inverse sense. > >May be because of this that todays Big-tyrants and small ones all >using words they do not understand and being elected or posting >angry replies in the name of what they insidiously destroy. > >I'm not condemning, only noting. >And this because it is simply a question of understanding. >After all... we all carry our private prisons with us. > >Regards, (yes, why not?) >Dutra de Lacerda. I agree with you completely when you state that religion, ethics, and law are distinct and different things. Unfortunately in the United States they have a strong tendency to become intertwined. The law as it stands is that impeachment is only to be used in cases of high crimes and misdemeanors. Now I have not read the entire Starr report nor do I have a sophisticated background in law nevertheless nothing Bill has done seems to qualify as worthy of impeachment under the law. However, the sexual acts and behaviour exhibited by him is deeply repugnant to many on ethical grounds and particularly repugnant to Christians specifically. I do not have any problem at all with those who are disgusted by the presidents behaviour on ethical or religious grounds, I personally find it repulsive. I do however feel, as I believe you are saying also, that the law is law. It should be executed in a fair and just manner and according to the letter ( which may or may not lead to impeachment ). The previous poster to which I replied seemed to be very clearly stating that his personal religious code of ethics took precedence over american legal codes, a viewpoint which I cannot agree with. All debate on the precice origin and validity of 'seperation of church and state' aside I cannot recall any part of the constitution which invokes divine justice. The impeachment issue is not one of ethics or religion, simply law and law alone. Vivek Vaidya ______________________________________________________ Get Your Private, Free Email at http://www.hotmail.com From mok-kong.shen at stud.uni-muenchen.de Tue Sep 15 11:38:36 1998 From: mok-kong.shen at stud.uni-muenchen.de (Mok-Kong Shen) Date: Wed, 16 Sep 1998 02:38:36 +0800 Subject: The DES Analytic Crack Project In-Reply-To: <199809151742.KAA12178@zendia.mentat.com> Message-ID: <35FF6B68.41B863BB@stud.uni-muenchen.de> Jim Gillogly wrote: > > In the early 1980's I started trying this approach. I did the > back-of-the-envelope estimate and realized it was too big, but > I thought it worth trying, since if there were a back door in > DES it might manifest itself by a massive collapse in the complexity > of these expressions. I didn't get far enough into it to decide one > way or the other, since I didn't have a good tool for reducing the > expressions to minimal form. As far as I know Boolean minimization has been one of the central themes of people doing circuit design from the beginning. I should be surprised if there are spectacular breakthroughs recently. M. K. Shen From simpsonngan at hotmail.com Tue Sep 15 12:58:42 1998 From: simpsonngan at hotmail.com (Chiu Ngan) Date: Wed, 16 Sep 1998 03:58:42 +0800 Subject: Fwd: I don't care if this is real or not! But forwarding is not hard for me if I help Message-ID: <19980916085139.13597.qmail@hotmail.com> >Received: from 136.148.1.253 by www.hotmail.com with HTTP; > Tue, 15 Sep 1998 05:55:15 PDT >X-Originating-IP: [136.148.1.253] >From: "Dodwell Leung" >To: alexccl at hotmail.com, z2181727 at student.unsw.edu.au, antonylam at hotmail.com, chonga at sbu.ac.uk, z2183890 at student.unsw.edu.au, lcy at qms.ndirect.co.uk, z2155343 at student.unsw.edu.au, bahrid at hotmail.com, daner at mail.mkv.mh.se, Evert.P.deVries at SI.shell.com, harold.tan at mailexcite.com, ivanyip at hotmail.com, catkoo at hotmail.com, jennyshek at hotmail.com, BKKsomporb at mail.nomura.com.hk, joe621 at netvigator.com, heyloe at hotmail.com, kmyk at hotmail.com, kenjess at apanet.com.au, lawhon at hotmail.com, lfan at mail.uoknor.edu, 95481624J at hkpucc.polyu.edu.hk, shukai at netvigator.com, z2188635 at student.unsw.edu.au, mattgow at hotmail.com, z2192026 at student.unsw.edu.au, z2174314 at student.unsw.edu.au, Steeve.Genot at wanadoo.fr, hsp996 at hotmail.com, physpot at asiaonline.net, pixie_tan at hotmail.com, pooi_lee_chow at hotmail.com, eeyatir at hotmail.com, saralee at chevalier.net, patelsu at sbu.ac.uk, beetch at pacific.net.sg, z2188232 at student.unsw.edu.au, simpsonngan at hotmail.com, yoon at pacific.net.sg, hamster.sol at lineone.net, stepcom at hkstar.com, ext3366 at yahoo.com, tinyau1 at netvigator.com, z2193851 at student.unsw.edu.au, huvl at sbu.ac.uk, z2193612 at student.unsw.edu.au, willmilk at hotmail.com, wswinnie at netvigator.com, brackeye at hkstar.com, takleung at wisdom.com.hk >Subject: I don't care if this is real or not! But forwarding is not hard for me if I help >Content-Type: text/plain >Date: Tue, 15 Sep 1998 05:55:15 PDT > > >>Received: from 202.184.46.2 by www.hotmail.com with HTTP; >> Tue, 15 Sep 1998 01:39:48 PDT >>X-Originating-IP: [202.184.46.2] >>From: "san san" >>To: alanling at usa.net, calviny at mol.net.my, chowpin at edb.gov.sg, >chan911 at pc.jaring.my, gary_wang at hotmail.com, junifer at pl.jaring.my, >karren at deakin.edu.au, klay at okstate.edu, lkhoong at pc.jaring.my, >mcch at hotmail.com, murphy_l at hotmail.com, simfong at pl.jaring.my, >stchai at pl.jaring.my, mote at hotmail.com, tlliew at tm.net.my, >wthong at pl.jaring.my, dodwellleung at hotmail.com >>Subject: Fwd: This is serious PLEEEEEEASE PLEASE DON'T DELETE!!!!! >>Content-Type: text/plain >>Date: Tue, 15 Sep 1998 01:39:48 PDT >> >> >>>Received: from 202.188.25.160 by www.hotmail.com with HTTP; >>> Mon, 14 Sep 1998 06:27:23 PDT >>>X-Originating-IP: [202.188.25.160] >>>From: "Lim Huey" >>>To: alexlimyk at hotmail.com, audrey.looi at mailexcite.com, >>kianwah19 at hotmail.com, enyen at hotmail.com, s9812221 at unitele.com.my, >>rckj at hotmail.com, seliness at hotmail.com, stanchow at tm.net.my, >>bhchua7 at hotmail.com, csheng at rocketmail.com, yoongyow at hotmail.com, >>ching20 at hotmail.com, lphoo at hotmail.com, ken_thong at rocketmail.com, >>twinsck at hotmail.com, poaysun at yahoo.com, mda97mk at sheffield.ac.uk, >>yongqiang13 at hotmail.com, sammy_lee_79 at hotmail.com, >>tungweileong at hotmail.com, lifesignx at yahoo.com, elim331 at yahoo.com, >>lwloh at hotmail.com, audrey.looi at mailcity.com, sokyee at pc.jaring.my, >>kah_kit at hotmail.com, siewgar at hotmail.com, chiane at mailcity.com, >>Vvpenguin at hotmail.com, pkleong at hotmail.com, phangf at hotmail.com, >>rolandhii at hotmail.com, stjdanzel at hotmail.com, leesiehui at hotmail.com, >>jeennwei at hotmail.com, chouyong at hotmail.com, ttc1979 at yahoo.com, >>guatyen at hotmail.com, chonkit at hotmail.com, thongyp at hotmail.com, >>soonfung at hotmail.com, tsueyyin at hotmail.com, feiyy at hotmail.com >>>Subject: Fwd: This is serious PLEEEEEEASE PLEASE DON'T DELETE!!!!! >>>Content-Type: text/plain >>>Date: Mon, 14 Sep 1998 06:27:23 PDT >>> >>> >>> >>> >>>>Date: Mon, 14 Sep 1998 04:25:43 -0700 (PDT) >>>>From: CHEW JUNN WENG >>>>Subject: This is serious PLEEEEEEASE PLEASE DON'T DELETE!!!!! >>>>To: lmoonc at hotmail.com, pvcheo at essex.ac.uk, cwnsim at essex.ac.uk, >>>> yoongyow at hotmail.com, lenelene at hotmail.com, gcping38 at mailcity.com, >>>> gthong at rocketmail.com, ching20 at hotmail.com, lcchuan at rocketmail.com, >>>> moon at tm.net.my, shaohuey at hotmail.com, janelsl at tm.net.my, >>>> csheng at rocketmail.com, hwooi at yahoo.com, dianacn at hotmail.com, >>>> stjdanzel at hotmail.com, effyjungle at hotmail.com, >bus_tard at hotmail.com, >>>> lphoo at hotmail.com, yakasaki at hotmail.com, colint79 at hotmail.com >>>>Cc: anniesia at hotmail.com, pearlng at hotmail.com, liangser at hotmail.com, >>>> choopar at hotmail.com >>>> >>>> >>>> >>>> >>>> >>>> >>>> >>>>Hello, my name is David "Darren" Bucklew. I live in >>>>Pittsburgh PA where I attend Bethel Park High School >>>>and participate in many sports. I have severe >>>>ostriopliosis of the liver. (My liver is extremely >>>>inflamed). >>>>Modern Science has yet to find a cure. Valley >>>>Childrens hospital >>>>> has agreed to donate 7 cents to the National >>>>Diesese Society for every name >>>> on this letter.Please send it around as much as you >>>>can. >>>>Thank you, >>>>Darren >>>> >>>>PS: For those of you who dont take 5 minutes to do >>>>this, what goes around comes around. You can help >>>>sick people, and it costs you nothing,yet you are too >>>>lazy to do it? You will get what you deserve. >>>> >>>>_________________________________________________________ >>>>DO YOU YAHOO!? >>>>Get your free @yahoo.com address at http://mail.yahoo.com >>>> >>>> >>> >>> >>>______________________________________________________ >>>Get Your Private, Free Email at http://www.hotmail.com >> >> >>______________________________________________________ >>Get Your Private, Free Email at http://www.hotmail.com > > >______________________________________________________ >Get Your Private, Free Email at http://www.hotmail.com ______________________________________________________ Get Your Private, Free Email at http://www.hotmail.com From Richard.Bragg at ssa.co.uk Tue Sep 15 13:18:05 1998 From: Richard.Bragg at ssa.co.uk (Richard.Bragg at ssa.co.uk) Date: Wed, 16 Sep 1998 04:18:05 +0800 Subject: Democracy... Message-ID: <80256681.0031C8CB.00@seunt002e.ssa.co.uk> mmotyka at lsil.com on 16/09/98 00:48:25 Please respond to mmotyka at lsil.com To: cypherpunks at toad.com cc: Subject: Re: Democracy... >Vivek Vaidya wrote: > Ever heard of seperation of church and state? Democracy? the rights of > the individual? While you certainly have the right to practice your > religion in what ever manner you so choose demanding that everyone > else > does, or that the president of the us of ais subject to you PERSONAL > faith decisions is outragous > > Vivek Vaidya > But whoever said I'm in the US? Where did I make any such demand? However, if you believe in something to be life changing and beneficial to both the idividual and society you'll want or be compelled to "pass it on". I can't and do not wish to force any one to any point of view, that's pointless. What I wanted to illustrate is that there are absolutes, to say there are no obsolutes is in itself an absolute and so is self defeating. We must have absolutes. These are often agreed on and applied through the legal systems but they are still there. Thus, when examining the behaviour of people in power we apply rules to encompass that power ie you can go so far and no further. When we are talking about national leaders in the west that do represent a wide range of views this can become more difficult but there still must be a yard stick agreed. PS If ol' Bill claims to be a Christian then he himself is setting the yard stick against we should measure him. From lharrison at dueprocess.com Tue Sep 15 13:53:22 1998 From: lharrison at dueprocess.com (Lynne L. Harrison) Date: Wed, 16 Sep 1998 04:53:22 +0800 Subject: LAST WORD: Re: Clinton--Why I am Chortling In-Reply-To: <3.0.5.32.19980914122452.0086a750@pop.mhv.net> Message-ID: <3.0.5.32.19980916055715.00910cf0@pop.mhv.net> At 09:29 PM 9/15/98 -0700, you wrote: > >Obviously you Just Don't Get It. :-) >The argument tends to be along the lines that if power weren't >so disparate, she wouldn't have to resort to sexual bribery to get >what she wants, she could just take it, or trade for it as an equal. > >Because, not being totally stupid about Clinton, she thought it might >be convenient to have some evidence around after the fact? >Whether that's for emotional blackmail, or basic blackmail, >or life insurance, or for convincing Hillary that Bill was hers now, >or convincing some future publisher that she hadn't made it all up, >or just because it seemed like it might turn out to be useful in the future, >who knows. Lots of possibilities. Or maybe it was just a memento >of a lovely evening :-) Or of a time when she had the President >wrapped around her little finger. Bill - I was pointing out that one (male or female) doesn't save such items of unwashed clothing unless there's a distorted reason for doing so. Like you, I can only speculate as to why, but it reflects a premeditation on her part - which supports my position that she's not a *victim*. A woman who comes on to her male employer and, when he accepts her "invitation", cannot turn around and allege: "Poor me. I was a victim. He is so powerful." I don't give a damn whether her employer was the President or the chief janitor. To contend otherwise is to suggest that *every* woman in an executive position, private or public, slept her way to get the position because of the initial imbalance of power. I do not accept this. Clinton has chased skirts for most of his adult life (as an article which was posted points out). As the "chaser", he's used his various positions of power to his advantage, and I agree wholeheartedly that there's an imbalance of power when he acted in this manner. So, my bottom (and final) line is: 1. Clinton has been a womanizer for most, if not all of his political life; 2. Monica was not a victim in _this_ scenario; 3. Clinton is guilty of perjury; 4. Clinton used his friends to publicly support his lie and publicly disgraced his daughter (Hillary's been through this before); 5. My tax money has been spent to publish a report that he engages in extra-marital sex and lies about it (gee, a real surprise!); and 6. Even if I "Don't Get It" - Bill damned sure got it, and got it, and got it... ;) ********************************************************************** Lynne L. Harrison, Esq. | Never doubt that a small group Poughkeepsie, New York | of citizens can change the world. mailto:lharrison at dueprocess.com | Indeed, it is the only thing that http://www.dueprocess.com | ever has. -- Margaret Mead ********************************************************************** DISCLAIMER: I am not your attorney; you are not my client. Accordingly, the above is *NOT* legal advice. From nobody at replay.com Tue Sep 15 14:06:53 1998 From: nobody at replay.com (Anonymous) Date: Wed, 16 Sep 1998 05:06:53 +0800 Subject: Fwd: I don't care if this is real or not! Message-ID: <199809161001.MAA18320@replay.com> You suck... Die prick, die Crack head wrote: > > > >Received: from 136.148.1.253 by www.hotmail.com with HTTP; > > Tue, 15 Sep 1998 05:55:15 PDT > >X-Originating-IP: [136.148.1.253] > >From: "Dodwell Leung" > >To: alexccl at hotmail.com, z2181727 at student.unsw.edu.au, > antonylam at hotmail.com, chonga at sbu.ac.uk, z2183890 at student.unsw.edu.au, > lcy at qms.ndirect.co.uk, z2155343 at student.unsw.edu.au, bahrid at hotmail.com, > daner at mail.mkv.mh.se, Evert.P.deVries at SI.shell.com, > harold.tan at mailexcite.com, ivanyip at hotmail.com, catkoo at hotmail.com, > jennyshek at hotmail.com, BKKsomporb at mail.nomura.com.hk, > joe621 at netvigator.com, heyloe at hotmail.com, kmyk at hotmail.com, > kenjess at apanet.com.au, lawhon at hotmail.com, lfan at mail.uoknor.edu, > 95481624J at hkpucc.polyu.edu.hk, shukai at netvigator.com, > z2188635 at student.unsw.edu.au, mattgow at hotmail.com, > z2192026 at student.unsw.edu.au, z2174314 at student.unsw.edu.au, > Steeve.Genot at wanadoo.fr, hsp996 at hotmail.com, physpot at asiaonline.net, > pixie_tan at hotmail.com, pooi_lee_chow at hotmail.com, eeyatir at hotmail.com, > saralee at chevalier.net, patelsu at sbu.ac.uk, beetch at pacific.net.sg, > z2188232 at student.unsw.edu.au, simpsonngan at hotmail.com, > yoon at pacific.net.sg, hamster.sol at lineone.net, stepcom at hkstar.com, > ext3366 at yahoo.com, tinyau1 at netvigator.com, z2193851 at student.unsw.edu.au, > huvl at sbu.ac.uk, z2193612 at student.unsw.edu.au, willmilk at hotmail.com, > wswinnie at netvigator.com, brackeye at hkstar.com, takleung at wisdom.com.hk > >Subject: I don't care if this is real or not! But forwarding is not > hard for me if I help > >Content-Type: text/plain > >Date: Tue, 15 Sep 1998 05:55:15 PDT > > > > > >>Received: from 202.184.46.2 by www.hotmail.com with HTTP; > >> Tue, 15 Sep 1998 01:39:48 PDT > >>X-Originating-IP: [202.184.46.2] > >>From: "san san" > >>To: alanling at usa.net, calviny at mol.net.my, chowpin at edb.gov.sg, > >chan911 at pc.jaring.my, gary_wang at hotmail.com, junifer at pl.jaring.my, > >karren at deakin.edu.au, klay at okstate.edu, lkhoong at pc.jaring.my, > >mcch at hotmail.com, murphy_l at hotmail.com, simfong at pl.jaring.my, > >stchai at pl.jaring.my, mote at hotmail.com, tlliew at tm.net.my, > >wthong at pl.jaring.my, dodwellleung at hotmail.com > >>Subject: Fwd: This is serious PLEEEEEEASE PLEASE DON'T DELETE!!!!! > >>Content-Type: text/plain > >>Date: Tue, 15 Sep 1998 01:39:48 PDT > >> > >> > >>>Received: from 202.188.25.160 by www.hotmail.com with HTTP; > >>> Mon, 14 Sep 1998 06:27:23 PDT > >>>X-Originating-IP: [202.188.25.160] > >>>From: "Lim Huey" > >>>To: alexlimyk at hotmail.com, audrey.looi at mailexcite.com, > >>kianwah19 at hotmail.com, enyen at hotmail.com, s9812221 at unitele.com.my, > >>rckj at hotmail.com, seliness at hotmail.com, stanchow at tm.net.my, > >>bhchua7 at hotmail.com, csheng at rocketmail.com, yoongyow at hotmail.com, > >>ching20 at hotmail.com, lphoo at hotmail.com, ken_thong at rocketmail.com, > >>twinsck at hotmail.com, poaysun at yahoo.com, mda97mk at sheffield.ac.uk, > >>yongqiang13 at hotmail.com, sammy_lee_79 at hotmail.com, > >>tungweileong at hotmail.com, lifesignx at yahoo.com, elim331 at yahoo.com, > >>lwloh at hotmail.com, audrey.looi at mailcity.com, sokyee at pc.jaring.my, > >>kah_kit at hotmail.com, siewgar at hotmail.com, chiane at mailcity.com, > >>Vvpenguin at hotmail.com, pkleong at hotmail.com, phangf at hotmail.com, > >>rolandhii at hotmail.com, stjdanzel at hotmail.com, leesiehui at hotmail.com, > >>jeennwei at hotmail.com, chouyong at hotmail.com, ttc1979 at yahoo.com, > >>guatyen at hotmail.com, chonkit at hotmail.com, thongyp at hotmail.com, > >>soonfung at hotmail.com, tsueyyin at hotmail.com, feiyy at hotmail.com > >>>Subject: Fwd: This is serious PLEEEEEEASE PLEASE DON'T DELETE!!!!! > >>>Content-Type: text/plain > >>>Date: Mon, 14 Sep 1998 06:27:23 PDT > >>> > >>> > >>> > >>> > >>>>Date: Mon, 14 Sep 1998 04:25:43 -0700 (PDT) > >>>>From: CHEW JUNN WENG > >>>>Subject: This is serious PLEEEEEEASE PLEASE DON'T DELETE!!!!! > >>>>To: lmoonc at hotmail.com, pvcheo at essex.ac.uk, cwnsim at essex.ac.uk, > >>>> yoongyow at hotmail.com, lenelene at hotmail.com, gcping38 at mailcity.com, > >>>> gthong at rocketmail.com, ching20 at hotmail.com, > lcchuan at rocketmail.com, > >>>> moon at tm.net.my, shaohuey at hotmail.com, janelsl at tm.net.my, > >>>> csheng at rocketmail.com, hwooi at yahoo.com, dianacn at hotmail.com, > >>>> stjdanzel at hotmail.com, effyjungle at hotmail.com, > >bus_tard at hotmail.com, > >>>> lphoo at hotmail.com, yakasaki at hotmail.com, colint79 at hotmail.com > >>>>Cc: anniesia at hotmail.com, pearlng at hotmail.com, liangser at hotmail.com, > >>>> choopar at hotmail.com > >>>> > >>>> > >>>> > >>>> > >>>> > >>>> > >>>> > >>>>Hello, my name is David "Darren" Bucklew. I live in > >>>>Pittsburgh PA where I attend Bethel Park High School > >>>>and participate in many sports. I have severe > >>>>ostriopliosis of the liver. (My liver is extremely > >>>>inflamed). > >>>>Modern Science has yet to find a cure. Valley > >>>>Childrens hospital > >>>>> has agreed to donate 7 cents to the National > >>>>Diesese Society for every name > >>>> on this letter.Please send it around as much as you > >>>>can. > >>>>Thank you, > >>>>Darren > >>>> > >>>>PS: For those of you who dont take 5 minutes to do > >>>>this, what goes around comes around. You can help > >>>>sick people, and it costs you nothing,yet you are too > >>>>lazy to do it? You will get what you deserve. > >>>> > >>>>_________________________________________________________ > >>>>DO YOU YAHOO!? > >>>>Get your free @yahoo.com address at http://mail.yahoo.com > >>>> > >>>> > >>> > >>> > >>>______________________________________________________ > >>>Get Your Private, Free Email at http://www.hotmail.com > >> > >> > >>______________________________________________________ > >>Get Your Private, Free Email at http://www.hotmail.com > > > > > >______________________________________________________ > >Get Your Private, Free Email at http://www.hotmail.com > > > ______________________________________________________ > Get Your Private, Free Email at http://www.hotmail.com > > == "The same thing we do every night Pinkey, try to take over the WORLD!" - The brain _________________________________________________________ DO YOU YAHOO!? Get your free @yahoo.com address at http://mail.yahoo.com From rain_dog_ at hotmail.com Tue Sep 15 14:15:14 1998 From: rain_dog_ at hotmail.com (Rain Dog) Date: Wed, 16 Sep 1998 05:15:14 +0800 Subject: Larry Gilbert, AOLers, and the Hyper-real flamer Message-ID: <19980916100923.15676.qmail@hotmail.com> AIMSX at aol.com wrote: > > Actually.. I am getting a SunOS Shell account this weekend. AOL has > improved > service somewhat, and it is now possible to use Netscape (or any other > browser) along with it. Of course, 32-bit AOL allows you to use all the TCP/IP protocols... > As for me paying it... I just became old enough to work (finally) > about a month ago, and I am only making minimum wage, and the hours > are not good enough for me to be able to keep up my hobbies of paintball, > computer upgrades, and Internet alone. Do you follow these hobbies simultaneously, or do you do 'Internet-ing' as a separate activity to paintballing your upgrades? Isn't 'Internet-ing' similar to 'road-ing' or 'railway-ing'? > Therefore... she pays for it, I wash dishes... These two are related? > ...not all AOLers are stupid warez lovers that don't know cu from cd. Fine. Obvious. Not all arabs mug me in the streets of Jerusalem. Enough have tried to make me wary. Why not shut the hell up bitching about how much we hate AOL-ers and demonstrate some reason for being on this list in the first place, other than 'Internet-ing'. Tim G ______________________________________________________ Get Your Private, Free Email at http://www.hotmail.com From stevem at tightrope.demon.co.uk Tue Sep 15 14:50:19 1998 From: stevem at tightrope.demon.co.uk (Steve Mynott) Date: Wed, 16 Sep 1998 05:50:19 +0800 Subject: Investigators find "assassination" page on the Web Message-ID: <19980916114905.A11245@tightrope.demon.co.uk> http://cnn.com/TECH/computing/9809/15/internet.hit.list.ap/index.html Investigators find "assassination" page on the Web hit.list September 15, 1998 Web posted at 4:07 PM ET Portland, Oregon (AP) -- Three Internal Revenue Service agents and a federal magistrate are the targets on what's described as an Internet "assassination" Web page. All four have prices on their heads -- in unusual amounts like 512 dollars and two cents. IRS investigators think it was posted by a patient in a federal mental hospital. The page is thought to be from an essay called "Assassination Politics." That essay -- written by a jailed tax protester -- describes a supposedly risk-free way to reward those who assassinate public officials. Anyone who wants to see someone killed contributes to a fund which -- when large enough -- attracts a killer who predicts the date, time and location for the deed to be done. If it happens, the killer is paid with untraceable digital money. -- pgp 1024/D9C69DF9 1997/10/14 steve mynott From brownrk1 at texaco.com Tue Sep 15 15:10:21 1998 From: brownrk1 at texaco.com (Brown, R Ken) Date: Wed, 16 Sep 1998 06:10:21 +0800 Subject: Predictions: Crime and Criminal Justice in the 21st Century Message-ID: <896C7C3540C3D111AB9F00805FA78CE2013F8423@MSX11002> >Sunder wrote: >> >> nnburk wrote: >> > >> > Predictions: Crime and Criminal Justice in the 21st Century >> > ... >> > 2. As the large pool of young people born in the early 1990s >> > become teenagers and young adults, there will be a dramatic >> > increase in violent crime around the year 2005-2010. >> >> I don't necessarily see this. What do you base this on? > >Um, actually, not _my_ predictions. Source was local LEA, obtained by them from some >nameless seminar. (Sorry. Should have made that point clear earlier.) It's pretty standard I think - as most crime is committed by young men aged between 15 and 25, the more of them there are around the more crime there is. So sociologists predict more crime 20 years after a surge in the birth rate. AFAIR it's also been observed that violent crime goes up in times of increasing prosperity but crime against property goes up in bad economic times. Of course none of that explains the huge secular trends in crime. In UK crime of all sorts fell almost continually from about 1700 (& there are no real records much before then) till the middle of this century. Since then it has been rising. Who knows why? And how come the US murder rate is maybe 8 or 10 times the UK? (actually that is unfair because the definition of "murder" is stricter here, but it is at least 4 times different). Are we nicer people? Not likely - the rape & indecent assault are no better here, & burglary is worse. > > > 5. As faith in the criminal justice system declines, there > > > will be a rise in vigilante-based incidents where citizens take > > > the enforcement of crime problems into their own hands. > > > > The rest of your prediction sounds like you've watched Robocop a few > times too > > many and actually BELIEVED it! :) Care to back it up with reasons? > > > > See above. Actually, haven't seen Robocop! > From bill.stewart at pobox.com Tue Sep 15 15:46:27 1998 From: bill.stewart at pobox.com (bill.stewart at pobox.com) Date: Wed, 16 Sep 1998 06:46:27 +0800 Subject: [NYT] Bell-South charging access fees for phone-over-Internet Message-ID: <3.0.5.32.19980914104601.008b0a10@idiom.com> INTERNET FEES CHARGED � [New York Times, C5.] Ever since April, when the Federal Communications Commission reported to Congress that telephone calls made from one phone to another using the Internet could become subject to network access fees, the industry has been waiting for a test case. BellSouth has now provided the test. The company has written to a half-dozen Internet service providers in its region saying that in November, BellSouth will start levying access fees for voice conversations the Internet companies transmit. The fees are the same sort that local phone companies like BellSouth charge to AT&T and MCI for connecting calls to the local network. Internet traffic has never been subject to such fees. But the Internet telephony companies are not ready to give in. In some ways, BellSouth's move may be largely symbolic, since most Internet voice traffic so far involves attempts to avoid the high charges for international long-distance calls, in which local access fees are a relatively minor part of the price. And yet, BellSouth is trying to close what many in the telephone industry have seen as a loophole in networking pricing regulations. Thanks! Bill Bill Stewart, bill.stewart at pobox.com PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639 From AIMSX at aol.com Tue Sep 15 15:47:11 1998 From: AIMSX at aol.com (AIMSX at aol.com) Date: Wed, 16 Sep 1998 06:47:11 +0800 Subject: Larry Gilbert, AOLers, and the Hyper-real flamer Message-ID: In a message dated 98-09-15 23:06:12 EDT, you write: > By the way, the sentence I quoted above is what is known as a question. In > English, you use a question mark for those. I know... I noticed that just when I hit the send button. Hmm, where you ever an English teacher... maybe named Mrs. Braly? Anyway... I don't type like an idiot, as I HAVE seen. I also rarely ever reply to someone, so I forget all about the quotes when I do, I am sorry for that mistake. Hopefully it is corrected to everyone on the internet's liking above. I think (but not sure) that you are trying to put words in my mouth with the following statement: > but since AOL _is_ the Internet Well, I never said anything like that. Actually, I only like a few things about AOL, but I know it is NOT _the_ Internet. I also know that NO ISP is _the_ Internet. It is a collection of protocols, etc. Next time, don't put words in my mouth. Someone once said (I can't remember who exactly), The greatest threat to manipulators are the people who think for themselves. So, I really don't CARE what you say about me, or too me. It really has no meaning to me. Oh, and maybe it will give you some wierd joy to know that I _am_ switching ISP's soon, to dfw.net, with SunOS shell account =) Well, enough of replying to your insults, or what I took to be insults. I need to read a little. Bye. -The person that has been labeled a typical AOL k00l d00d P.S. Grow up... quit berating people because of an ISP that they MAY not even have had a choice on... did you ever think of that? From lists at ticm.com Tue Sep 15 16:38:31 1998 From: lists at ticm.com (Technical Incursion Countermeasures) Date: Wed, 16 Sep 1998 07:38:31 +0800 Subject: CFP: The Insider December 1998 edition v2 Message-ID: <3.0.3.32.19980916202647.009069d0@localhost> (note: Due to the unexpected load on our systems - anyone who subscribed or sent us mail between the 9th of Sept and the 12 of September should consider doing it again - our server load peaked at approx 30 times the normal daily load - so our mailbox filled. We now have expanded our mailbox to 5M - hopefully this will be enough) Call for Papers The Insider - December 1998 edition The Insider (http://www.ticm.com/info/insider/index.html) has been in publication since November 1997. Since then it has gone trough a number of changes - all for the better :}. The latest change is to move from a newletter containing just the musing of its editor to a "learned journal". Yes, the papers will be refereed and the editorial board has some weight in the IT security world. Our editorial committee now includes: Andy Smith, Dr John Tongren and Dr Joseph Williams On that note this is the second Call for papers. We are looking for papers on Information Technology Security and fitting within the following broad areas: Audit, Design and Maintenance of IT Security. The Papers can be from 1000 to 2500 words. We may accept papers of down to 600 words or up to 5000 words but they will have to be of the utmost quality. For more information see http://www.ticm.com/info/insider/current.html Yours Bret Watson - Editor Technical Incursion Countermeasures consulting at TICM.COM http://www.ticm.com/ ph: (+61)(041) 4411 149(UTC+8 hrs) fax: (+61)(08) 9454 6042 The Insider - a e'zine on Computer security - August Edition out http://www.ticm.com/info/insider/index.html From declan at well.com Tue Sep 15 16:39:56 1998 From: declan at well.com (Declan McCullagh) Date: Wed, 16 Sep 1998 07:39:56 +0800 Subject: Democracy... In-Reply-To: Message-ID: Indeed. There are two types of freedoms at issue here: establishment and free exercise, which the Framers thought were complementary and the Supreme Court has said "occasionally overlap." There were three ideological positions that drove the clause forward: those who wanted to prevent corruption of the church, those who wanted to prevent corruption of the state (such as Jefferson), and those who wanted to protect the church from the state. I haven't come across documents written by the Founders or cases that say the "state CAN support one religion over another." Cites, please? The cass I'm familiar with suggest exactly the opposite. The Supremes believe in "the established principle that the Government must pursue a course of complete neutrality toward religion." Supporting one religion over another violates the rule against "forbidden effects." As Tim said, our new friend's interpretation is somewhat bizarre. -Declan On Tue, 15 Sep 1998, Tim May wrote: > At 9:09 PM -0700 9/15/98, Jaeger wrote: > >well, the first amendment is what I expected to be used... > >unfortunately, the phrase "...wall of separation between church and > >state" is not taken from the first amendment. It is taken from a letter > >written by Thomas Jefferson... and the meaning is not that church > >shouldn't have an effect on the state. The state CAN support one > >religion over another. > > Ah, it's the appearance of a new ranter arguing for some bizarre, > idiosyncratic interpretation of the Bill of Rights and suchlike. Mr. > Jaeger, meet Mr. Choate. > > Your notion that the state can support one religion over another so long as > it does not "restrict" the other will surely be news to the many who have > studied this issue for centuries. In particular, all those legal decisions > which got Christian manger scenes removed from public buildings, and which > got "Jesus Loves Sinners, Even Jews" removed from our coinage, will surely > now have to be reversed. > > > The state CAN make laws that encourage the practice of any one > >particular religion, as long as the laws do not RESTRICT the PRACTICE of > >other religions. > > > Bizarre. Try Ritalin. This has helped some list members cope. > > --Tim May > > > (This space left blank pending determ. of acceptability to the gov't.) > ---------:---------:---------:---------:---------:---------:---------:---- > Timothy C. May | Crypto Anarchy: encryption, digital money, > ComSec 3DES: 831-728-0152 | anonymous networks, digital pseudonyms, zero > W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, > Licensed Ontologist | black markets, collapse of governments. > > > > > > From mixmaster at remail.obscura.com Tue Sep 15 17:17:13 1998 From: mixmaster at remail.obscura.com (Mixmaster) Date: Wed, 16 Sep 1998 08:17:13 +0800 Subject: No Subject Message-ID: Monday, September 14, 1998 - 23:20:36 Question: How is it, that the FBI has so much power? Answer: Because 'the people' didn't do swat to stop them[the FBI]. Question: How do 'the people' change the situation? Answer: 'The people' get out their banners and megaphones and march on the Congress. Question: What do 'the people' do then they[Congress] don't hear 'the people'? Answer: 'The people' go on strike. Question: What do 'the people' do when Congress doesn't care about their strikes? Answer: 'The people' fire their M16'eens at Congress which they brought with them. Question: So where are 'the people'? From jya at pipeline.com Tue Sep 15 17:22:26 1998 From: jya at pipeline.com (John Young) Date: Wed, 16 Sep 1998 08:22:26 +0800 Subject: Crypto Deals Message-ID: <199809161316.JAA27937@dewdrop2.mindspring.com> News of easing US crypto limits sounds like the pr-fluff put out in the summer for easing controls only for financial institutions -- BXA is scheduled to release the rule for that about now (originally set to be "near Labor Day"). If the news is about this rule, it may allow a few more "reputable institutions" to get the privilege traditionally extended to banks, so long as longstanding cooperation with government is assured. There's a report out of France on the government's issue of a paper on crypto policy that reaffirms GAK for electronic commerce with zero protection of privacy: http://jya.com/fr-gak.htm There will probably be more such papers issued as international cooperation to control encryption is codified in accordance with the Wassenaar Arrangement and whatever secret agreements Aron and others have concluded. The US version will probably come out gradually as global agreements are firmed up, Congress is briefed, and US agencies are satisfied that export holes in other countries have been closed. Then watch for domestic clampdown on encryption, as Cohen and others have warned must be done to protect the populace from too much freedom. The secret deals among governments to share technology for information security and electronic surveillance in return for global controls must be wonderful reads of duplicity and disinformation, among the participants in the classified parts, and among the populace in the public versions. On a related topic, weakness of DES, the ANSI X9 committee handling cryptography has circulated a draft paper on what banks should do in response to recent successful cracks of DES: http://jya.com/destran.htm From ravage at EINSTEIN.ssz.com Tue Sep 15 17:31:53 1998 From: ravage at EINSTEIN.ssz.com (Jim Choate) Date: Wed, 16 Sep 1998 08:31:53 +0800 Subject: Where are the people... Message-ID: <199809161356.IAA05725@einstein.ssz.com> ... likely to effect their Safety and Happiness. Prudence, indeed, will dictate that Governments long established should not be changed for light and transient Causes; and accordingly all Experience hath shewn, that Mankind are more disposed to suffer, while evils are sufferable, than to right themselves by abolishing the Forms to which they are accustomed. But when a ... ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From bset4life at bigfoot.com Wed Sep 16 09:55:56 1998 From: bset4life at bigfoot.com (bset4life at bigfoot.com) Date: Wed, 16 Sep 1998 09:55:56 -0700 (PDT) Subject: BEST THING GOING Message-ID: <199809161642.BAA10040@nlpeng.sogang.ac.kr> THIS IS NOT SPAM! You are on our mailing list because you have subscribed at one of our associate web sites,sent us email or we have a previous online relationship. To be removed from future mailings mailto:database9898 at hotmail.com This is it folks. This is the letter you've been reading about in the news lately Due to the popularity of this letter on the Internet, a major nightly news program recently devoted an entire show to the investigation of the program described below , to see if it really can make people money. If you saw it, you know that their conclusion was ,that while most people did not make the $55,000, as discussed in the plan, EVERYONE who followed the instructions was able to make 100 to 160 times their money at the VERY LEAST . The show also investigated whether or not the program was legal. Their findings proved once and for all that there are absolutely no laws prohibiting the participation in the program. This is one of the most exciting opportunities with the MOST income potential on the internet today!" --48 Hours.. Hi, my name is Fred. After I saw this letter aired on the news program,I decided to get some of my skeptical questions answered. Does it really work? Until I try it, I can only go on the testimony of people I don't know,so I will only know if I try it. I've never done this type of thing, but I decided it was time to try something. If I keep doing what I am doing I'll keep getting what I've got. Besides, people 70 years old have been surveyed and they will consistently say that the 2 regrets they have of there lives are; they wish they had spent more time with their families and they wish they had taken more chances. Upon hearing this again,and hearing what the MEDIA said about it, I decided that at 34, I was going to take a small chance and see what would come of it. Is it legal? - Yes, (Refer to title 18, Section 1302 & 1342 of the U.S. Postal and Lottery Laws) This opportunity isn't much of a risk and could turn out to actually be a bit of fun. Bottom Line; The risk is only $20 and time on the Internet. The following is a copy of the letter that the media was referring to: MONEY-MAKING PHENOMENON. PRINT this letter, READ the directions, THEN READ IT AGAIN !!! You are about to embark on the most profitable and unique program you may ever see. Many times over, it has demonstrated and proven its ability to generate large amounts of This program is showing fantastic appeal with a huge and ever-growing on-line population desirous of additional income. This is a legitimate, LEGAL, money-making opportunity. It does not require you to come in personal contact with people, do any hard work, and best of all, you never have to leave the house, except to get the mail and go to the bank! This truly is that lucky break you've been waiting for! Simply follow the easy instructions in this letter, and your financial dreams can come true! When followed correctly, this electronic, multi-level marketing program WORKS! Thousands of people have used this program to: - Raise capital to start their own business - Pay off debts - Buy homes, cars, etc., - Even retire! This is your chance, Don't pass it up! ---------------------------------------------------------------------------------- OVERVIEW OF THIS EXTRAORDINARY ELECTRONIC MULTI-LEVEL MARKETING PROGRAM ---------------------------------------------------------------------------------- Basically, this is what we do: We send thousands of people a product that they paid us $5.00 US for, that costs next to nothing to produce and e-mail back to them. As with all multi-level businesses, we build our business by recruiting new partners and selling our products. Every state in the U.S. allows you to recruit new multi- level business online (via your computer). The products in this program are a series of four business and financial reports costing $5.00 each. Each order you receive is to include: $5.00 cash United States Currency * The name and number of the report they are ordering * The e-mail address where you will e-mail them the report they ordered. To fill each order, you simply e-mail the product to the buyer. THAT'S IT! The $5.00 is yours! This is the electronic multi-level marketing business anywhere! FOLLOW THE INSTRUCTIONS TO THE LETTER AND BE PREPARED TO REAP THE STAGGERING BENEFITS! I N S T R U C T I O N S This is what you MUST do: 1. Order all 4 reports shown on the list below (you can't sell them if you don't order them). * For each report, send $5.00 CASH, the NAME & NUMBER OF THE REPORT YOU ARE ORDERING, YOUR E-MAIL ADDRESS, and YOUR RETURN POSTAL ADDRESS (in case of a problem) to the person whose name appears on the list next to the report. * When you place your order, make sure you order each of the four reports. You will need all four reports so that you can save them on your computer and resell them. * Within a few days you are to receive, via e-mail, each of the four reports. Save them on your computer so they will be accessible for you to send to the 1,000's of people who will order them from you. 2. IMPORTANT-- DO NOT alter the names of the people who are listed next to each report, or their sequence on the list, in any way other than is instructed below in steps "a" through "d" or you will lose out on the majority of your profits. Once you understand the way this works, you'll also see how it doesn't work if you change it. Remember, this method has been tested, and if you alter it, it will not work. a. Look below for the listing of available reports. b. After you've ordered the four reports, replace the name and address under REPORT #1 with your name and address, moving the one that was there down to REPORT #2. c.Move the name and address that was under REPORT #2 down to . REPORT #3 d. Move the name and address that was under REPORT #3 down to REPORT#4 e. The name and address that was under REPORT #4 is removed from the list and has NO DOUBT collected large sums of cash! Please make sure you copy everyone's name and address ACCURATELY!!! 3. Take this entire letter, including the modified list of names, and save it to your computer. Make NO changes to the instruction portion of this letter. 4. Now you're ready to start an advertising campaign on the WORLDWIDE WEB! Advertising on the WEB can be very, very inexpensive, and there are HUNDREDS of FREE places to advertise. Another avenue which you could use for advertising is e-mail lists. You can buy these lists for under $20/2,000 addresses or you can pay someone to take care of it for you. BE SURE TO START YOUR AD CAMPAIGN IMMEDIATELY! 5. For every $5.00 you receive, all you must do is e-mail them the report they ordered. THAT'S IT! ALWAYS PROVIDE SAME-DAY SERVICE ON ALL ORDERS! This will help guarantee that the e-mail THEY send out, with YOUR name and address on it, will be prompt because they can't advertise until they receive the report! To grow fast be prompt and courteous. -------------------------------------- AVAILABLE REPORTS --------------------------------------- Order Each REPORT by NUMBER and NAME Notes: - ALWAYS SEND $5 CASH FOR EACH REPORT - ALWAYS SEND YOUR ORDER VIA THE QUICKEST DELIVERY - Make sure the cash is concealed by wrapping it in at least two sheets of paper - On one of those sheets of paper, include: (a) the number & name of the report you are ordering, (b) your e-mail address, and (c) your postal address. _________________________________________________________________ REPORT #1 "HOW TO MAKE $250,000 THROUGH MULTI-LEVEL SALES" ORDER REPORT #1 FROM: Pete Chiros PO Box 1262 Bakersfield, Ca 93302 _________________________________________________________________ REPORT #2 "MAJOR CORPORATIONS AND MULTI-LEVEL SALES" ORDER REPORT #2 FROM: JR Reevs PO Box 78152 Greenfield, Ca 93383-8152 ______________________________________________________________ REPORT #3 "SOURCES FOR THE BEST MAILING LISTS" ORDER REPORT #3 FROM: Claude Taylor 2323 Morro Road. Fallbrook Ca. 92028 _______________________________________________________________ REPORT #4 "EVALUATING MULTI-LEVEL SALES PLANS" ORDER REPORT #4 FROM: B.S.G. PO Box 9864 Bakersfield, Ca. 93389 ________________________________________________________________ HERE'S HOW THIS AMAZING PLAN WILL MAKE YOU $MONEY$ -------------------------------------------------------------------------------------------------- Let's say you decide to start small just to see how well it works. Assume your goal is to get 10 people to participate on your first level. (Placing a lot of FREE ads on the internet will EASILY get a larger response.) Also assume that everyone else in YOUR ORGANIZATION gets ONLY 10 downline members. Follow this example to achieve the STAGGERING results below. 1st level--your 10 members with $5...........................................$50 2nd level--10 members from those 10 ($5 x 100)..................$500 3rd level--10 members from those 100 ($5 x 1,000)..........$5,000 4th level--10 members from those 1,000 ($5 x 10,000)...$50,000 THIS TOTALS ----------->$55,550 Remember friends, this assumes that the people who participate only recruit 10 people each. Think for a moment what would happen if they got 20 people to participate! Lots of people get 100s of participants! THINK ABOUT IT! Your cost to participate in this is practically nothing (surely you can afford $20). You obviously already have an internet connection and e-mail is FREE!!! shows you the most productive methods for bulk e-mailing and purchasing e-mail lists. Some list & bulk e-mail vendors even work on trade! About 50,000 new people get online every month TIPS FOR SUCCESS * TREAT THIS AS YOUR BUSINESS! Be prompt, professional, and follow the directions accurately. * Send for the four reports IMMEDIATELY so you will have them when the orders start coming in because: When you receive a $5 order, you MUST send out the requested product/report to comply with the U.S. Postal & Lottery Laws, Title 18,Sections 1302 and 1341 or Title 18, Section 3005 in the U.S. Code also Code of Federal Regs. vol. 16, Sections 255 and 436, which state that "a product or service must be exchanged for money received." *ALWAYS PROVIDE SAME-DAY SERVICE ON THE ORDERS YOU RECEIVE. *Be patient and persistent with this program. If you follow the instructions exactly, the results WILL undoubtedly be SUCCESSFUL! * ABOVE ALL, HAVE FAITH IN YOURSELF AND KNOW YOU WILL SUCCEED! YOUR SUCCESS GUIDELINE Follow these guidelines to help assure your success: If you don't receive 10 to 20 orders for REPORT #1 within two weeks, continue advertising until you do. Then, a couple of weeks later you should receive at least 50 orders for REPORT #2. If you don't, continue advertising until you do. Once you have received 50 or more orders for REPORT #2, YOU CAN RELAX, because the system is already working for you, and the cash can continue to roll in! THIS IS IMPORTANT TO REMEMBER: Every time your name is moved down on the list, you are placed in front of a DIFFERENT report. You can KEEP TRACK of your PROGRESS by watching which report people are ordering from you. If you want to generate more income, send another batch of e-mails and start the whole process again! There is no limit to the income you will generate from this business! NOTE: If you need help with starting a business, registering a business name, how income tax is handled, etc., contact your local office of the Small Business Administration (a Federal agency) for free help and answers to questions. Also, the Internal Revenue Service offers free help via telephone and free seminars about business taxes. If you have any question of the legality of this letter contact the Office of Associate Director for Marketing Pratices Federal Trade Commission Bureau of Consumer Protection in Washington DC. T E S T I M O N I A L S This program does work, but you must follow it EXACTLY! Especially the rule of not trying to place your name in a different position, it won't work and you'll lose a lot of potential income. I'm living proof that it works. It really is a great opportunity to make relatively easy money, with little cost to you. If you do choose to participate, follow the program exactly, and you'll be on your way to financial security. Sean McLaughlin, Jackson, MS The main reason for this letter is to convince you that this system is honest, lawful, extremely profitable, and is a way to get a large amount of money in a short time. I was approached several times before I checked this out. I joined just to see what one could expect in return for the minimal effort and money required. To my astonishment, I received $36,470.00 in the first 19 weeks, with money still coming in. Sincerely yours, Phillip A. Brown, Esq. I had received this program before. I deleted it, but later I wondered if I shouldn't have given it a try. Of course, I had no idea who to contact to get another copy, so I had to wait until I was e-mailed another program...11 months passed then it came...I didn'tdelete this one!...I made more than $41,000 on the first try!! D. Wilburn, Muncie, IN This is my third time to participate in this plan. We have quit our jobs, and will soon buy a home on the beach and live off the interest on our money. The only way on earth that this plan will work for you is if you do it. For your sake, and for your family's sake don't pass up this golden opportunity. Good luck and happy spending! Charles Fairchild, Spokane, WA I am nearing the $90,000 mark from this program.I have used several forms of advertisement.I used regular mail and bulk e-mail. The regular mail that I used was very expensive for two reasons. I purchased a very select list of names and the postage. The third time I sent e-mails out,I did so in the quantity of 1 million. So, after 3 times participating in this program I am almost at the $90,000 mark. That isn't too bad. I hope the same success for you. . Good Luck. Raymond McCormick, New Cannan, Ct. You have great potential for extra earnings that is available at your finger-tips! You have unlimited access to wealth, but you must be willing to take that first step! The Media ALREADY PROVED That !!!! You could be making an obscene amount of money! I have given you the information, materials, and opportunity to become financially better off. IT IS UP TO YOU NOW!- THINK ABOUT IT - Your risk is only $20.? HOW MUCH DO YOU SPEND ON LOTTO TICKETS- for NO RETURN? ORDER YOUR REPORTS TODAY AND GET STARTED ON YOUR ROAD TO FINANCIAL FREEDOM!!! From schear at lvcm.com Tue Sep 15 19:01:20 1998 From: schear at lvcm.com (Steve Schear) Date: Wed, 16 Sep 1998 10:01:20 +0800 Subject: radio net In-Reply-To: <199809152029.QAA03672@mx02.together.net> Message-ID: At 11:41 PM -0400 9/15/98, Dave Emery wrote: >> On 9/6/98 6:20 PM, Steve Schear (schear at lvcm.com) passed this wisdom: > > I suspect that the cost of equipment and licensing and regulatory >compliance of various sorts might make it unpleasant for loosely knit >groups of private citizens - uplinks require competant installation >and maintainence to keep them from causing interference to other users >and various other problems such as RF radiation hazards under control. Because commercial satellite gear is almost always asembled from several vendors to form a station, and because it can be assembled in many ways and is invariably done so by professionals, there are no U.S. satellite equipment regulations for such gear. > > On the other hand, satellites are crawling with little signals >transmitting streams of data or voice or music to groups of receivers >scattered over wide geographic areas, so the econmics aren't prohibitive >for people who have some real need... > Surplus gear is pleantiful for those who know where to look. The hardest part is building the SS mod/demod and that's pretty straight forward for any competent RF engineer. If low bandwidth links can suffice, the very large spread codes (such as those used by GPS) can be used to place the covert channel well below the noise floor. GPS uses a whopping 63dB of code gain. This in turn means a small earth station with low power (cheap) transmitter can suffice. I would be surprised if you could use a backyard or even DirectTV antenna. --Steve --------------------------------------------------------------------- reply to schear - at - lvcm - dot - com --- PGP mail preferred, see http://www.pgp.com and http://web.mit.edu/network/pgp.html RSA fingerprint: FE90 1A95 9DEA 8D61 812E CCA9 A44A FBA9 RSA key: http://keys.pgp.com:11371/pks/lookup?op=index&search=0x55C78B0D --------------------------------------------------------------------- From stugreen at realtime.net Tue Sep 15 19:16:13 1998 From: stugreen at realtime.net (Stu Green) Date: Wed, 16 Sep 1998 10:16:13 +0800 Subject: Clinton to relax crypto rules Message-ID: <35FFD7AE.659BAB26@realtime.net> From nobody at replay.com Tue Sep 15 19:16:27 1998 From: nobody at replay.com (Anonymous) Date: Wed, 16 Sep 1998 10:16:27 +0800 Subject: Christopher Barkley Message-ID: <199809161509.RAA07787@replay.com> Oh, yes another guy to give it up so easily! Now look, why is it that you let these people tease me with Monica Lewinsky and kiddie porn, and then take them away from me just as quickly?! WHAT THE HELL KIND OF SERVICE ARE YOU RUNNING?!?!??! Don't you like kiddie porn? Don't you want to have sex with Monica, just like the prez? And you tell that cactus humper Christopher "I like little boys" Barkley to watch his caboose! The FBI are going to be after him like cheese on a stick when they find out that Mr. I Have Lotion In My Pants goes in for children-with-llamas bestiality like he does. What a maroon! Joe C. At 08:54 PM 9/15/98 -0500, sixdegrees wrote: >Just a quick update from sixdegrees(tm). Unfortunately Christopher >Barkley (barkley at cirr.com) asked not to be listed as your >contact with sixdegrees. > >The good news is that since you have other confirmed contacts, >you'll still be able to have a productive sixdegrees experience. >But, if you want to continue to increase your networking power, >you may want to head over to http://www.sixdegrees.com , log-in >and go to MY CONTACTS and list additional contacts. > > >==================================================================== >PLEASE NOTE: All replies to this address are processed by a computer. >If you have any problems, questions or requests send an e-mail to >issues at sixdegrees.com and someone will get back to you as soon as >possible. >==================================================================== > > > > >E.DB.BRESP.2 > From nobody at replay.com Tue Sep 15 19:21:03 1998 From: nobody at replay.com (Anonymous) Date: Wed, 16 Sep 1998 10:21:03 +0800 Subject: Harald Fragner Message-ID: <199809161517.RAA08343@replay.com> I think Harald Fragner has to take you off the list. Talk to him about it. Hope this helps! At 09:14 PM 9/15/98 -0400, John Scott Porterfield wrote: >How do I get off this list!!! > >Bob > From mark at sixdegrees.com Tue Sep 15 19:21:41 1998 From: mark at sixdegrees.com (Mark Salamon) Date: Wed, 16 Sep 1998 10:21:41 +0800 Subject: A personal response to your email to sixdegrees In-Reply-To: <199809152257.AAA05080@replay.com> Message-ID: <35FFD638.DB6920D3@sixdegrees.com> (I was not sure which email address to send this to, as the return address was: nobody at replay.com. I also do not know who to address this email to.) I am the WHOIS contact at sixdegrees you sent this email to, and since this is a peronal reply to your email, it is certainly NOT spam and I would appreciate it if you would take the time to read it and respond. I am very confused by your email. I understand that you do not wish to receive emails from sixdegrees, but it is very easy to solve this problem. If anyone ever sponsors you for sixdegrees, simply reply to the email and put the word "remove" in the header. (This is pretty standard stuff across the Internet, as I am sure you are aware.) If that occurs, in the future we will not send emails to the email address that received the original email from us. Unfortunately, if you have many email addresses (as it appears, from the bottom of your email), the only way for us to remove each is to have a sixdegrees email go to each of these email address accounts and then received a "remove" reply to each of these emails. (We have in our records references to 5 different cypherpunks email addresses: @toad.com, @cypherpunks.net, @cypherpunks.org, @algebra.com, and @ssz.com. If you wish for us not to contact you again at any of these addresses, we will need to confirm that you in fact control these email addresses. The best way for you to do this is to send an email to cancel at sixdegrees.com, and ask to have these email addresses removed. We will then send a reply to each email address you listed, asking you to confirm that you in fact control those email addresses and wish to have them removed. Once we receive your confirmation, we will adjust our records so you receive no further emails from us to those email addresses. For example, if I receive an email from you to this email, I will assume that you control the @toad.com email address and I will have that removed.) What is confusing to me is that the email you received from sixdegrees (with the subject: Harald Fragner) is one that would be sent ONLY to a CONFIRMED sixdegrees user. That means that once upon a time, whether you remember or not, you joined sixdegrees (as have over 1,000,000 people to date). It also appears that you listed Harald Fragner as a contact, and he recently denied his sixdegrees relationship with you. Thus, it is not surprising that you would receive emails from sixdegrees, as you had registered for our service at one time. (I assume that the email address you used to register with sixdegrees was the @toad.com one.) sixdegrees is purely a voluntary service, and if you do not want to participate in it, then we are happy to accommodate you. We do not send out spam and take great efforts to ensure that no one receives unwanted email from us. I look forward to receiving your reply to this email. Mark Salamon General Counsel MacroView Communications Corp. Anonymous wrote: > > On Tue, 15 Sep 1998, the shitheads at sixdegrees spammed the Cypherpunks > list with: > > > Just a quick update from sixdegrees(tm). Unfortunately Harald > > Fragner (harald at fragner.net) asked not to be listed as your > > contact with sixdegrees. > > > > We also wanted to make sure you were aware that you currently > > have no other confirmed contacts, so it will be hard for you to > > have a productive sixdegrees experience. As you probably know, > > without any confirmed contacts, you won't get any results from our > > networking searches. > > > > So, we just wanted to recommend that you head over to > > http://www.sixdegrees.com , log-in, and go to MY CONTACTS > > to list additional relationships. > > > > > > ==================================================================== > > PLEASE NOTE: All replies to this address are processed by a computer. > > If you have any problems, questions or requests send an e-mail to > > issues at sixdegrees.com and someone will get back to you as soon as > > possible. > > ==================================================================== > > > > > > E.DB.BRESP.3 > > > > > > Just a quick update from the Cypherpunks(tm). Fortunately, we don't want > anything to do with your worthless, pathetic, spamming selves. We don't > want to be your friends and, in fact, we'd prefer it if you would crawl > under a rock and die because that seems to be the only way you'll stop > spamming our mailing list. > > We also wanted to make sure that you were aware that you currently have no > confirmed redeeming qualities, so it will be hard for you to be taken > seriously by those of us who do have a clue. As you probably know, without > any redeeming qualities, you will get lots of results every time you send > out a batch of spam. > > So, we just wanted to recommend that you head on over to your bathtub with > the rest of your coworkers, fill it up, jump in together, and then drop in > a large, plugged-in, turned-on electric heater into the water and remain > in until you stop twitching and cardiac activity ceases. > > C.LU.EFULS.2000 > > You people don't give a fuck how much excrement you shoot all over the > net, so long as you let people know of your pathetic, worthless, > disgusting service. If you can get somebody's mailing list to relay your > shit for you, so much the better, because then you don't have to > personally send it. > > Sorry, but I've had it with Sixdegrees. I've personally told you idiots > very nicely what the Cypherpunks list is, and asked you nicely to stop > spamming it. I've personally told you a method to keep people from > submitting these addresses to your worthless spam haven. Other people have > done the same thing. You haven't fixed it, indicating that you don't care. > I'm no longer asking nicely. > > A copy is being sent to your technical contact, on the assumption that > maybe he is a little more responsible, though I doubt it. > > -- The Cypherpunks List cypherpunks@*.cyberpass.net, cypherpunks@*.ssz.com, > cypherpunks at algebra.com, and others> From kriek at bigfoot.com Tue Sep 15 19:37:17 1998 From: kriek at bigfoot.com (Neels Kriek) Date: Wed, 16 Sep 1998 10:37:17 +0800 Subject: Fw: WARRANTY CARD ON PURCHASED GOVERNMENT OFFICIAL[tm] Message-ID: <002c01bde187$e8188ec0$a7060cd1@alien> -----Original Message----- From: Gernot Lachner Newsgroups: za.humour Date: Monday, September 14, 1998 10:57 Subject: WARRANTY CARD ON PURCHASED GOVERNMENT OFFICIAL[tm] > >Dear Special Interest, > >Congratulations on the purchase of your genuine Government Official[tm]. > >With regular maintenance your Government Official[tm] should provide you >with a lifetime of sweetheart deals, insider information, preferential >legislation and other fine services. > >Before you begin using your product, we would appreciate it if you would >take the time to fill out this customer service card. This information will >not be sold to any other party, and will be used solely to aid us in better >fulfilling your future needs in political influence. > >1. Which of our fine products did you buy? > >__ President >__ Vice-President >__ Minister >__ Governor >__ Mayor >__ Cabinet Secretary - Commerce >__ Cabinet Secretary - Other >__ Other Elected Official (please specify) >__ Other Appointed Official (please specify) > >2. How did you hear about your Government Official[tm]? >Please check all that apply. > >__ TV ad. >__ Magazine/newspaper ad. >__ Shared jail cell with. >__ Former law partner of. >__ Unindicted co-conspirator with. >__ Kwazulu-Natal crony of. >__ Procured for. >__ Related to. >__ Recommended by lobbyist. >__ Recommended by organized crime figure. >__ Frequently mentioned in conspiracy theories. (On Internet.) >__ Frequently mentioned in conspiracy theories. (Elsewhere.) >__ Spoke at fundraiser at my temple. >__ Solicited bribe from me. >__ Attempted to seduce me. > >3. How do you expect to use your Government Official[tm]? > (Please check all that apply.) > >__ Obtain lucrative government contracts. >__ Have my prejudices turned into law. >__ Obtain diplomatic concessions. >__ Obtain trade concessions. >__ Have embargo lifted from own nation/ally. >__ Have embargo imposed on enemy/rival nation/religious infidels. >__ Obtain patronage job for self/spouse/mistress. >__ Forestall military action against self/allies. >__ Instigate military action against internal enemies/aggressors/targets > for future conquest. >__ Impede criminal/civil investigation of self/associates/spouse. >__ Obtain pardon for self/associates/spouse. >__ Inflict punitive legislation on class enemies/rivals/hated ethnic > groups. >__ Inflict punitive regulation on business competitors/environmental > exploiters/capitalist pigs. > >4. What factors influenced your purchase? > (Please check all that apply.) > >__ Performance of currently owned model. >__ Reputation. >__ Price. >__ Appearance. >__ Party affiliation. >__ Professed beliefs of Government Official[tm]. >__ Actual beliefs of Government Official[tm]. >__ Orders from boss/superior officer/foreign government. >__ Blackmail. >__ Celebrity endorsement. > >5. Is this product intended as a replacement for a currently owned > Government Official[tm]? ______ > >If you answered "yes," please indicate your reason(s) for changing models. > >__ Excessive operating / maintenance costs. >__ Needs have grown beyond capacity of current model. >__ Defect in current model: >__ Dead. >__ Senile. >__ Indicted. >__ Convicted. >__ Resigned in disgrace. >__ Switched parties / beliefs. >__ Outbribed by competing interest. > >Thank you for your valuable time. > >Always remember: in choosing a Government Official[tm] you have chosen >the best politician that money can buy. > > >credits go to someone from atj. >-- >sciath�n leathair ~..~ >"the mortality rate amongst humans is 100%" > > From JGORDON at scana.com Tue Sep 15 19:45:43 1998 From: JGORDON at scana.com (GORDON, JEFFREY A) Date: Wed, 16 Sep 1998 10:45:43 +0800 Subject: I don't care if this is real or not! But forwarding is not hard for me if I help Message-ID: >From http://jacksonville.com/tu-online/stories/021798/web217__.html Chain letter: Poor Timothy Flyte. He's dying of ostriopliosis of the liver and is urging Internet users to forward his electronic chain letter to everyone in their address books. The letter says a children's hospital will donate 7 cents to the National Disease Society for every person who forwards the letter. But wait: There is no such disease as ''ostriopliosis,'' there is no such thing as the National Disease Society and the name Timothy Flyte apparently was taken from Peter O'Toole's character in the movie Phantoms. At the end, the letter includes a threat to those who don't forward it that ''what goes around comes around.'' This piece of e-junk is a particularly loathsome example of Internet chain letters. If you receive this letter or any other electronic chain letter, do the world a favor: Delete it without forwarding it to anyone and inform the person who sent it to you that the letter is a hoax. For the full story on this letter, see The Mining Co.'s guide to urban legends. > -----Original Message----- > From: Chiu Ngan [SMTP:simpsonngan at hotmail.com] > Sent: Wednesday, September 16, 1998 4:52 AM > To: dueli at hotmail.com; centrebet at centrebet.com.au; contact at unsw.edu.au; > Declan at well.com; Dodwellleung at hotmail.com; dlin at gpu.srv.ualberta.ca; > dorngan at hkstar.com.hk; cypherpunks at toad.com; cj2802 at singnet.com.sg; > parsley at unforgettable.com; S.Lundy at unsw.edu.au; accounts at magna.com.au; > n.harding at unsw.edu.au; philiph at magna.com.au; ulf at fitug.de; > leevv at hotmail.com; vanessa.ho at mailexcite.com > Subject: Fwd: I don't care if this is real or not! But forwarding is > not hard for me if I help > > > > >Received: from 136.148.1.253 by www.hotmail.com with HTTP; > > Tue, 15 Sep 1998 05:55:15 PDT > >X-Originating-IP: [136.148.1.253] > >From: "Dodwell Leung" > >To: alexccl at hotmail.com, z2181727 at student.unsw.edu.au, > antonylam at hotmail.com, chonga at sbu.ac.uk, z2183890 at student.unsw.edu.au, > lcy at qms.ndirect.co.uk, z2155343 at student.unsw.edu.au, bahrid at hotmail.com, > daner at mail.mkv.mh.se, Evert.P.deVries at SI.shell.com, > harold.tan at mailexcite.com, ivanyip at hotmail.com, catkoo at hotmail.com, > jennyshek at hotmail.com, BKKsomporb at mail.nomura.com.hk, > joe621 at netvigator.com, heyloe at hotmail.com, kmyk at hotmail.com, > kenjess at apanet.com.au, lawhon at hotmail.com, lfan at mail.uoknor.edu, > 95481624J at hkpucc.polyu.edu.hk, shukai at netvigator.com, > z2188635 at student.unsw.edu.au, mattgow at hotmail.com, > z2192026 at student.unsw.edu.au, z2174314 at student.unsw.edu.au, > Steeve.Genot at wanadoo.fr, hsp996 at hotmail.com, physpot at asiaonline.net, > pixie_tan at hotmail.com, pooi_lee_chow at hotmail.com, eeyatir at hotmail.com, > saralee at chevalier.net, patelsu at sbu.ac.uk, beetch at pacific.net.sg, > z2188232 at student.unsw.edu.au, simpsonngan at hotmail.com, > yoon at pacific.net.sg, hamster.sol at lineone.net, stepcom at hkstar.com, > ext3366 at yahoo.com, tinyau1 at netvigator.com, z2193851 at student.unsw.edu.au, > huvl at sbu.ac.uk, z2193612 at student.unsw.edu.au, willmilk at hotmail.com, > wswinnie at netvigator.com, brackeye at hkstar.com, takleung at wisdom.com.hk > >Subject: I don't care if this is real or not! But forwarding is not > hard for me if I help > >Content-Type: text/plain > >Date: Tue, 15 Sep 1998 05:55:15 PDT > > > > > >>Received: from 202.184.46.2 by www.hotmail.com with HTTP; > >> Tue, 15 Sep 1998 01:39:48 PDT > >>X-Originating-IP: [202.184.46.2] > >>From: "san san" > >>To: alanling at usa.net, calviny at mol.net.my, chowpin at edb.gov.sg, > >chan911 at pc.jaring.my, gary_wang at hotmail.com, junifer at pl.jaring.my, > >karren at deakin.edu.au, klay at okstate.edu, lkhoong at pc.jaring.my, > >mcch at hotmail.com, murphy_l at hotmail.com, simfong at pl.jaring.my, > >stchai at pl.jaring.my, mote at hotmail.com, tlliew at tm.net.my, > >wthong at pl.jaring.my, dodwellleung at hotmail.com > >>Subject: Fwd: This is serious PLEEEEEEASE PLEASE DON'T DELETE!!!!! > >>Content-Type: text/plain > >>Date: Tue, 15 Sep 1998 01:39:48 PDT > >> > >> > >>>Received: from 202.188.25.160 by www.hotmail.com with HTTP; > >>> Mon, 14 Sep 1998 06:27:23 PDT > >>>X-Originating-IP: [202.188.25.160] > >>>From: "Lim Huey" > >>>To: alexlimyk at hotmail.com, audrey.looi at mailexcite.com, > >>kianwah19 at hotmail.com, enyen at hotmail.com, s9812221 at unitele.com.my, > >>rckj at hotmail.com, seliness at hotmail.com, stanchow at tm.net.my, > >>bhchua7 at hotmail.com, csheng at rocketmail.com, yoongyow at hotmail.com, > >>ching20 at hotmail.com, lphoo at hotmail.com, ken_thong at rocketmail.com, > >>twinsck at hotmail.com, poaysun at yahoo.com, mda97mk at sheffield.ac.uk, > >>yongqiang13 at hotmail.com, sammy_lee_79 at hotmail.com, > >>tungweileong at hotmail.com, lifesignx at yahoo.com, elim331 at yahoo.com, > >>lwloh at hotmail.com, audrey.looi at mailcity.com, sokyee at pc.jaring.my, > >>kah_kit at hotmail.com, siewgar at hotmail.com, chiane at mailcity.com, > >>Vvpenguin at hotmail.com, pkleong at hotmail.com, phangf at hotmail.com, > >>rolandhii at hotmail.com, stjdanzel at hotmail.com, leesiehui at hotmail.com, > >>jeennwei at hotmail.com, chouyong at hotmail.com, ttc1979 at yahoo.com, > >>guatyen at hotmail.com, chonkit at hotmail.com, thongyp at hotmail.com, > >>soonfung at hotmail.com, tsueyyin at hotmail.com, feiyy at hotmail.com > >>>Subject: Fwd: This is serious PLEEEEEEASE PLEASE DON'T DELETE!!!!! > >>>Content-Type: text/plain > >>>Date: Mon, 14 Sep 1998 06:27:23 PDT > >>> > >>> > >>> > >>> > >>>>Date: Mon, 14 Sep 1998 04:25:43 -0700 (PDT) > >>>>From: CHEW JUNN WENG > >>>>Subject: This is serious PLEEEEEEASE PLEASE DON'T DELETE!!!!! > >>>>To: lmoonc at hotmail.com, pvcheo at essex.ac.uk, cwnsim at essex.ac.uk, > >>>> yoongyow at hotmail.com, lenelene at hotmail.com, gcping38 at mailcity.com, > >>>> gthong at rocketmail.com, ching20 at hotmail.com, > lcchuan at rocketmail.com, > >>>> moon at tm.net.my, shaohuey at hotmail.com, janelsl at tm.net.my, > >>>> csheng at rocketmail.com, hwooi at yahoo.com, dianacn at hotmail.com, > >>>> stjdanzel at hotmail.com, effyjungle at hotmail.com, > >bus_tard at hotmail.com, > >>>> lphoo at hotmail.com, yakasaki at hotmail.com, colint79 at hotmail.com > >>>>Cc: anniesia at hotmail.com, pearlng at hotmail.com, liangser at hotmail.com, > >>>> choopar at hotmail.com > >>>> > >>>> > >>>> > >>>> > >>>> > >>>> > >>>> > >>>>Hello, my name is David "Darren" Bucklew. I live in > >>>>Pittsburgh PA where I attend Bethel Park High School > >>>>and participate in many sports. I have severe > >>>>ostriopliosis of the liver. (My liver is extremely > >>>>inflamed). > >>>>Modern Science has yet to find a cure. Valley > >>>>Childrens hospital > >>>>> has agreed to donate 7 cents to the National > >>>>Diesese Society for every name > >>>> on this letter.Please send it around as much as you > >>>>can. > >>>>Thank you, > >>>>Darren > >>>> > >>>>PS: For those of you who dont take 5 minutes to do > >>>>this, what goes around comes around. You can help > >>>>sick people, and it costs you nothing,yet you are too > >>>>lazy to do it? You will get what you deserve. > >>>> > >>>>_________________________________________________________ > >>>>DO YOU YAHOO!? > >>>>Get your free @yahoo.com address at http://mail.yahoo.com > >>>> > >>>> > >>> > >>> > >>>______________________________________________________ > >>>Get Your Private, Free Email at http://www.hotmail.com > >> > >> > >>______________________________________________________ > >>Get Your Private, Free Email at http://www.hotmail.com > > > > > >______________________________________________________ > >Get Your Private, Free Email at http://www.hotmail.com > > > ______________________________________________________ > Get Your Private, Free Email at http://www.hotmail.com From h3ad5034 at auto.sixdegrees.com Tue Sep 15 19:53:19 1998 From: h3ad5034 at auto.sixdegrees.com (sixdegrees) Date: Wed, 16 Sep 1998 10:53:19 +0800 Subject: Your new password Message-ID: <199809161546.IAA23087@toad.com> Name: Joe Cypherpunk sixdegrees Password: rollflip In response to your request for a new sixdegrees(tm) password, we have sent you the following temporary password: rollflip. As soon as you come to the site, http://www.sixdegrees.com , and use it to log-in on the home page, it will become your official password, and your old password will be deactivated. (If you end up remembering your old password and use that to log-in at the site before using this new temporary password, the temporary password will be deactivated.) This may seem wacky, but it's for your security. And, either way, once you successfully log-in at the site, you can go to your personal profile and choose whatever password you like - in fact, we encourage you to do so. If you never requested a new password and got this message in error, just continue using your old password and e-mail us at issues at sixdegrees.com. ==================================================================== PLEASE NOTE: All replies to this address are processed by a computer. If you have any problems, questions or requests send an e-mail to issues at sixdegrees.com and someone will get back to you as soon as possible. ==================================================================== E.SI.REQPW.1 From rah at shipwright.com Tue Sep 15 19:57:53 1998 From: rah at shipwright.com (Robert Hettinga) Date: Wed, 16 Sep 1998 10:57:53 +0800 Subject: [NYT] Bell-South charging access fees for phone-over-Internet In-Reply-To: <3.0.5.32.19980914104601.008b0a10@idiom.com> Message-ID: At 1:46 PM -0400 on 9/14/98, bill.stewart at pobox.com wrote: > The company has written > to a half-dozen Internet service providers in its region saying > that in November, BellSouth will start levying access fees for > voice conversations the Internet companies transmit. Bingo. A hole big enough to drive cryptography through... Crank up your PGPFones, folks. Or, maybe we just need ipsec? Cheers, Bob Hettinga ----------------- Robert A. Hettinga Philodox Financial Technology Evangelism 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From jf_avon at citenet.net Tue Sep 15 20:18:51 1998 From: jf_avon at citenet.net (Jean-Francois Avon) Date: Wed, 16 Sep 1998 11:18:51 +0800 Subject: Political purges and Bill C-68 Message-ID: <199809161614.MAA06660@cti06.citenet.net> Hi to all of you. I know most of you personnally, except for the posts to mailing lists and public organisms. ------------------ beginning of letter --------------- Yesterday night, around 2am, I was unable to sleep and surfing the TV channels up until I fell on a movie on the ShowCase channel. This channel is devoted to repertoire cinema and less mainstream movies. As I flick to this channel, I see something I can't take my eyes off for it's overwhelming revolting topic: a bunch of corpses are on a dolly, each of one being tied by the feet to a crane cable and quickly, efficiently taken away to a big heap of corpses. Then, a lineup of peoples, waiting in line to pass before some officer. They are promplty urged to take off their clothes, aligned to face a wall and shot in the back of the head. And this continues like an dis-assembly chain. I did not bear more than a few minutes of the thing. During thoses few minutes, maybe five or six rows of five peoples were slaughtered. Peoples of all walk of life, of all ages, young and olds, male and females, beautiful and ugly, strugling or resigned were executed by an indifferent row of unintelligent and/or psychotic thugs that simply "executed orders". There was the firing squad captain that did not shoot but that gave the firing orders, so that the thugs could sleep without remorse. There was their superior supervising the whole slaughterhouse operation and finally, there was the political supervisor, dressed in the "de rigueur" grey with grey hat. This operation was clearly in the context of some political purge. I did not comprehend the full details of the context, but it appeared that it was happening during the russian revolution, or more possibly in East Germany after WW-II. The executed peoples were helpless, at the mercy of thoses thugs because they had no way to respond to death threat by death threat. Most of them had accepted their fate and walked to their death attempting to defend themselves with calm reason, useless in this context since the firing squad was composed of idiots and psychotics. One girls pleaded for her life and her great beauty made the animals of the firing squad hesitate, but was promptly shot in the head from a distance by the political supervisor. And it dawned on me that it could never had happened in a society where gun ownership was unregulated, and it also dawned on me that it is the essence of the natural outcome of all gun regulation/registration schemes. That to provide that kind of power to the ruling political class is the ultimate goal of gun registration and regulation, notwithstanding that they chose to exert it or not. Very soon (in principle on october 1st 1998), under the new bill C-68 , you will be declared a criminal in the full sense of the law, just as if you had killed somebody, if you don't register your guns (or don't plan to do so before the limit date comes up in a few years). Putting aside for a moment the tremendous costs associated with that C-68 nonsense (around 2 billions $ wasted money) we must realize that private law-abiding firearm owners account for 0.08% of all homicides commited with a firearms. So, I ask because I consider it of extreme importance, what's the ULTIMATE purpose of declaring criminal seven millions of individuals who wants nothing more than lead peacefull lifes? ----------- end of letter -------------- Jean-Francois Avon, Montreal, Canada Hitler, Stalin, Pinochet, PolPot and every other notorious psychotic butchers insisted on a tight control of privately owned firearms. I wonder why? "nobody runs faster than a bullet" - supposedly from Idi Amin Dada Jean-Francois Avon, B.Sc. Physics, Montreal, Canada DePompadour, Soci�t� d'Importation Lt�e Limoges fine porcelain and french crystal JFA Technologies, R&D physicists & engineers Instrumentation & control, LabView programming PGP keys: http://bs.mit.edu:8001/pks-toplev.html PGP ID:C58ADD0D:529645E8205A8A5E F87CC86FAEFEF891 PGP ID:5B51964D:152ACCBCD4A481B0 254011193237822C From jya at pipeline.com Tue Sep 15 20:19:12 1998 From: jya at pipeline.com (John Young) Date: Wed, 16 Sep 1998 11:19:12 +0800 Subject: US Updates Crypto Policy Message-ID: <199809161613.MAA07615@dewdrop2.mindspring.com> http://library.whitehouse.gov/PressReleases-plain.cgi?date=0&briefing=3 THE WHITE HOUSE Office of the Press Secretary ____________________________________________________________________ For Immediate Release September 16, 1998 STATEMENT BY THE PRESS SECRETARY Administration Updates Encryption Policy The Clinton Administration today announced a series of steps to update its encryption policy in a way that meets the full range of national interests: promotes electronic commerce, supports law enforcement and national security and protects privacy. These steps are a result of several months of intensive dialogue between the government and U.S. industry, the law enforcement community and privacy groups that was called for by the Vice President and supported by members of Congress. As the Vice President stated in a letter to Senator Daschle, the Administration remains committed to assuring that the nation?s law enforcement community will be able to access, under strictly defined legal procedures, the plain text of criminally related communications and stored information. The Administration intends to support FBI?s establishment of a technical support center to help build the technical capacity of law enforcement - Federal, State, and local - to stay abreast of advancing communications technology. The Administration will also strengthen its support for electronic commerce by permitting the export of strong encryption when used to protect sensitive financial, health, medical, and business proprietary information in electronic form. The updated export policy will allow U.S. companies new opportunities to sell encryption products to almost 70 percent of the world?s economy, including the European Union, the Caribbean and some Asian and South American countries. These changes in export policy were based on input from industry groups while being protective of national security and law enforcement interests. The new export guidelines will permit exports to other industries beyond financial institutions, and further streamline exports of key recovery products and other recoverable encryption products. Exports to those end users and destination countries not addressed by today?s announcement will continue to be reviewed on a case-by-case basis. Very strong encryption with any key length (with or without key recovery) will now be permitted for export, under license exception, to several industry sectors. For example, U.S. companies will be able to export very strong encryption for use between their headquarters and their foreign subsidiaries worldwide except the seven terrorist countries (Iran, Iraq, Libya, Syria, Sudan, North Korea and Cuba) to protect their sensitive company proprietary information. On-line merchants in 45 countries will be able to use robust U.S. encryption products to protect their on-line electronic commerce transactions with their customers over the Internet. Insurance companies as well as the health and medical sectors in those same 46 countries will be able to purchase and use robust U.S. encryption products to secure health and insurance data among legitimate users such as hospitals, health care professionals, patients, insurers and their customers. The new guidelines also allow encryption hardware and software products with encryption strength up to 56-bit DES or equivalent to be exported without a license, after a one time technical review, to all users outside the seven terrorist countries. Currently, streamlined exports of DES products are permitted for those companies that have filed key recovery business plans. However, with the new guidelines, key recovery business plans will no longer be required. The Administration will continue to promote the development of key recovery products by easing regulatory requirements. For the more than 60 companies which have submitted plans to develop and market key recovery encryption products, the six month progress reviews will no longer be required. Once the products are ready for market, they can be exported, with any bit length -- without a license -- world-wide (except to terrorist nations) after a one-time review. Furthermore, exporters will no longer need to name or submit additional information on a key recovery agent prior to export. These requirements will be removed from the regulations. Finally, industry has identified other so-called "recoverable" products and techniques that allow for the recovery of plaintext by a system or network administrator and that can also assist law enforcement access, subject to strict procedures. The Administration will permit their export for use within most foreign commercial firms, and their wholly-owned subsidiaries, in large markets, including Western Europe, Japan and Australia, to protect their internal business proprietary communications. The Administration welcomes a continued dialogue with U.S. industry and intends to review its policy in one year to determine if additional updates may be necessary to continue a balanced approach that protects the public safety and national security, ensures privacy, enables continued technology leadership by U.S. industry and promotes electronic commerce. # # # From xasper8d at lobo.net Tue Sep 15 20:24:25 1998 From: xasper8d at lobo.net (X) Date: Wed, 16 Sep 1998 11:24:25 +0800 Subject: Just what we need... In-Reply-To: Message-ID: <000601bde18e$11900a20$862580d0@ibm> I know I'm new here, so pardon the long post if you will, but this came to my attention... Jesse Berst says: This is another in my occasional series about Natural Born Killers (NBKs) -- products, services or sites with the genetic potential to become a "killer application." An NBK is not a recommendation to buy. Or even, as in the case of Alexa, a recommendation to use a free product. An NBK nomination is a recommendation to study a product for the good ideas it contains. And Alexa stuffs a lot of good ideas into a small toolbar that appears at the bottom of your browser. This toolbar links back to the company's massive database, which archives most public Web sites. It also tracks anonymous usage patterns, so it can analyze what people really do on the Web. (This is handy because we really need to know what people do on the Web. For Gosh sakes, if we didn't know what you were doing, that'd be downright depressing! Then how could we pigeonhole you and market to you and we all know, the Web won't be successful without some good, clean, marketing!) The toolbar goes along with you as you surf, (nothing makes me more comfortable than to have a nice tracking device stapled in my flanks) offering site statistics and a variety of helpful tools. For instance, if you get a File Not Found error, you can retrieve a previous version of the page from the Alexa archive. You can see site ratings from other Alexa users (and vote on sites yourself). You even get a direct link to a Web-based dictionary, thesaurus and encyclopedia. (Compromise your right to privacy and we'll give you chump-change-virtual-trinkets!) PC Magazine says "those with more Internet savvy will get the most out of Alexa." I would go even further. Alexa is less valuable to mainstream users -- it's intended audience -- than it is to Internet insiders like you. I say that because of three things you can get from Alexa: (1 An optional shoulder-mounted Duo-Cam(r) which simultaneously watches your monitor and tracks retinal placement so marketers will REALLY know what you're looking at: 2, A FREE newsletter with important messages from our sponsors who you have indicated interest in by allowing your retina to focus on their banner ad .gif: and 3, AnalProbe Y2k(tm) that monitors, in conjunction with the Duo-Cam(r), your sphincter tightness when certain images are placed on your monitor. This device has been known to become addictive to certain members of the Log-Cabin-Republican party and certain NOW founding members, so extended use is recommended only with caution. However, the data we are able to collect has proven to be 100% accurate shit, so our sponsors feel it is a beneficial device.) From jya at pipeline.com Tue Sep 15 20:33:28 1998 From: jya at pipeline.com (John Young) Date: Wed, 16 Sep 1998 11:33:28 +0800 Subject: US Crypto Update Fact Sheet Message-ID: <199809161625.MAA31953@dewdrop2.mindspring.com> http://library.whitehouse.gov/PressReleases-plain.cgi?date=0&briefing=4 The White House Briefing Room September 16, 1998 FACT SHEET THE WHITE HOUSE Office of the Press Secretary ______________________________________________________________________ For Immediate Release September 16, 1998 FACT SHEET Administration Updates Encryption Policy Exports of 56-bit DES and equivalent products (hardware and software) will be streamlined (under license exception). Requirements for key recovery plans are eliminated. Exports of unlimited strength encryption products (with or without key recovery) will be streamlined (under license exception) to certain industries. The sectors are: Subsidiaries of U.S. Firms, worldwide (except seven terrorist nations). Insurance companies to the same 45 countries recently approved for exports to banks and financial institution exports. Health and medical organizations (including civilian government health agencies) in the same 45 countries. Does not include biochemical/pharmaceutical manufacturers. On-line merchants for client-server applications, in the same 45 countries, with the purpose of securing electronic transactions between merchants and their customers. Does not include manufacturers and distributors of items controlled on the U.S. munitions list. Key Recovery products will continue to be exportable under license exception worldwide (except seven terrorist nations). Review of foreign key recovery agents is eliminated. Exports of "recoverable" products will be approved to most commercial firms, and their wholly-owned subsidiaries, in a broad range of countries under encryption licensing arrangements. This group of countries covers most major commercial markets including Western Europe, Japan, and Australia. The policy does not include service providers and manufacturers and distributors of items controlled on the U.S. munitions list. Exports to end users or destinations outside this policy are possible on a case-by-case basis. Prior to export, products are subject to a one-time product technical review. # # # From guy at panix.com Tue Sep 15 20:41:07 1998 From: guy at panix.com (Information Security) Date: Wed, 16 Sep 1998 11:41:07 +0800 Subject: US Updates Crypto Policy Message-ID: <199809161642.MAA01758@panix7.panix.com> > From: John Young > > http://library.whitehouse.gov/PressReleases-plain.cgi?date=0&briefing=3 > > THE WHITE HOUSE > ____________________________________________________________________ > For Immediate Release > September 16, 1998 > > Administration Updates Encryption Policy [snip] > Very strong encryption with any key length (with or without key > recovery) will now be permitted for export, under license exception, to > several industry sectors. [snip] > On-line merchants in 45 countries will be able to use robust U.S. > encryption products to protect their on-line electronic commerce > transactions with their customers over the Internet. On-line merchants? Anyone care to try and purchase US-strong crypto from overseas for their WWW business? Which crypto products? What are the minimum "business" requirements? ;-) ---guy How long does it take to get approval? From nobody at remailer.ch Tue Sep 15 20:41:54 1998 From: nobody at remailer.ch (Anonymous) Date: Wed, 16 Sep 1998 11:41:54 +0800 Subject: Clinton's fake apologies (fwd) Message-ID: <19980916164728.9462.qmail@hades.rpini.com> Jim Choate wrote: > > > Declan McCullagh wrote: > > lying under oath is perjury, whether you like it or not. > > As rare as it is, I agree with Declan here. If Clinton would lie under oath > about a non-crime (ie sex between consenting adults) what would he do if > faced with a real issue? > > He should have said "Yeah, I had sex with her. What business is it of > yours?". > Presumably he should lie to protect the state. So lieing per se isn't the problem. It is the use of the privilege where it doesn't apply that upsets you. Murky water for impeachment, methinks. Furthermore, we have gone from the CDA to government publication of pornography in short order. Farbeit for any cypherpunk to complain. From 90cd50e1 at auto.sixdegrees.com Tue Sep 15 20:43:54 1998 From: 90cd50e1 at auto.sixdegrees.com (sixdegrees) Date: Wed, 16 Sep 1998 11:43:54 +0800 Subject: Your new password Message-ID: <199809161636.JAA23664@toad.com> Name: Jolly CyberSnot sixdegrees password: suchlamp Congratulations Jolly. You're well on your way to becoming a full sixdegrees(tm) member. Here is your member password: suchlamp. Use it to log-in on the home page at the sixdegrees Web site, http://www.sixdegrees.com. We'll ask you for a little more information to complete your registration, and then you'll be ready to start networking. It's important that you return to the site and log-in. Your membership will not be complete until you do so. Once you've successfully logged in with your password, just go to Personal Profile and you'll be able to choose your own password. Thanks for becoming part of sixdegrees. We're looking forward to seeing you at the site. ==================================================================== PLEASE NOTE: All replies to this address are processed by a computer. If you believe you received this e-mail in error, and it was not your intention to become a sixdegrees member, or if you have any problems, questions or requests send an e-mail to issues at sixdegrees.com and someone will get back to you as soon as possible. ==================================================================== E.SI.BAM.1 From attila at hun.org Tue Sep 15 20:54:17 1998 From: attila at hun.org (attila) Date: Wed, 16 Sep 1998 11:54:17 +0800 Subject: Clinton still doesnt get it In-Reply-To: Message-ID: On Wed, 16 Sep 1998, Mac Norton wrote: > >On Tue, 15 Sep 1998, attila wrote: > > > 25 years of Clinton's raging psychopathic, oversexed behavior: > > Hillary has been a willing partner. > > > > nothing but control freaques and obscene power trippers. there > > is only amorality in that house --and power by any means. > > snip > > One of you had the good sense to > post the column i repost below, because that fellow seems to > have gotten a pretty good handle on this squalid mess. > the American public was informed, and snowed under by the Clintons together on TV; unfortunately, the stories very true. and, it should have been abundantly clear that Hillary, and her far left agenda, was driving the car. I "like" Clinton for one thing only: he _is_ a made for TV President who _could_ project an image to the world which would make Americans proud to be Americans. unfortunately, he never graduated from the sandbox" "...it's mine... it's all mine...." I will grudgingly give Bill credit for accepting the clarion call for him to reign in Hillary, after the health care package she shepherded by fascist means, and the largest tax increase in some time; to be a Centrist --too bad it took Newt Gingrich and friends to deliver the message. however, my premise, which you did not include underneath the said by (in fact, the mail [mis]quoting potential places some of our more vociferous philosopher kings in jeopardy), is that for whatever reason, Clinton was born without, or destroyed enroute, any sense of morality --Bill is, and has been, the man who must honestly believe he has the right to play the game without rules. Hillary is unquestionably obsessed not only with power, but revenge for her enemies. well, the process goes on; Starr is back to working on White- watergate, Fostergate, Travelgate, FBIgate, and a few more "?-gates" --the primary focus probably on Hillary. and, as much as I think the two of them are scurrilous pests which should be dealt with by Terminix, I don't like the process; does America have any pride? not much, and hanging Hillary or Bill will leave America just that much poorer. > But punks . . . well, punks . . . a few years ago when I first > subscribed to this list, to lurk and learn, as I still mostly > do, there were some hardasses you could depend on to come out > of the woodwork when things got way out of space, and they'd > say: Punks write code. > > And they were write. > MacN > correct; and I was one complainer, and part of the group which started coderpunks. but, cypherpunks, and the arguments and discourses, is an excellent diversion --with the exception of the often one-sided "arbitration and adjudication" of opinion. anyone who can follow the threads of cypherpunks continuously has too much time on their hands; I can only afford the luxury of the occasional hit and run. attila out... __________________________________________________________________________ go not unto usenet for advice, for the inhabitants thereof will say: yes, and no, and maybe, and I don't know, and fuck-off. _________________________________________________________________ attila__ From ravage at EINSTEIN.ssz.com Tue Sep 15 20:55:49 1998 From: ravage at EINSTEIN.ssz.com (Jim Choate) Date: Wed, 16 Sep 1998 11:55:49 +0800 Subject: Clinton's fake apologies (fwd) Message-ID: <199809161720.MAA07023@einstein.ssz.com> Forwarded message: > Date: 16 Sep 1998 16:47:28 -0000 > From: Anonymous > Subject: Re: Clinton's fake apologies (fwd) > Presumably he should lie to protect the state. Then don't take the oath: To tell the truth, the whole truth, and nothing but the truth. So lieing per se isn't the problem. > It is the use of the privilege where it doesn't apply that upsets you. No, it's the fact that he took an oath to tell the truth and didn't. Murky water > for impeachment, methinks. Then you don't think very well. ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From nobody at replay.com Tue Sep 15 20:58:13 1998 From: nobody at replay.com (Anonymous) Date: Wed, 16 Sep 1998 11:58:13 +0800 Subject: Clinton still doesnt get it In-Reply-To: Message-ID: <199809161658.SAA15778@replay.com> Mac Norton writes: > Well, I've been working for a couple of days and spent the weekend before > that with The Report. I read all of it, including the footnotes, every > damn one of them, and they're where all the good stuff is, btw. Given > that weekend study, it's apparent to me, after reviewing several days > of posts on this topic on this list, that most of you people can't > or don't read or have the attention spans of gnats. > > The perjury case has some serious reasonable doubt problems, the > abuse of power case is thin, thin, and the executive privilege > stuff is there as sheer trade goods to give Congress something > to throw out. In legal parlance, it wouldn't pass Rule 11. > And I don't know who is giving you legal advice, but there's > no sexual harrassment count in the thing. Read it, if you can. > Peferably after your medication. Mac, Rather than merely writing to say what bozos all the list members are (unfairly stereotyping us all - even those not from AOL :-), why don't you give us the benefit of a little of your expertise? Why do you believe the perjury case has `reasonable doubt' problems? {Were I on a jury and if convinced that matters are as Starr presents them, I would have no problem deciding that Clinton lied in the deposition at least, where the term `sexual relations' seems to have been carefully and explicitly defined - even assuming that he /shouldn't/ be convicted on what seems a clear intent to deceive the court and later the grand jury on multiple points.} And the abuse of power case seems thin even to a non-lawyer. But where does the `executive privilege stuff' come in? I don't see that Starr listed that among his possible grounds for impeachment. And what about obstruction of justice? Do you see any merit to those charges? Inquiring minds want to know. - Frondeur From emc at wire.insync.net Tue Sep 15 21:05:44 1998 From: emc at wire.insync.net (Eric Cordian) Date: Wed, 16 Sep 1998 12:05:44 +0800 Subject: The DES Analytic Crack Project In-Reply-To: <35FF6B68.41B863BB@stud.uni-muenchen.de> Message-ID: <199809161706.MAA16662@wire.insync.net> Mok-Kong Shen writes: > As far as I know Boolean minimization has been one of the central > themes of people doing circuit design from the beginning. I should be > surprised if there are spectacular breakthroughs recently. The general boolean minimization problem is hard. A specific boolean minimization problem may or may not be difficult to solve. Going back to our "safe execution" analogy; determining the runtime properties of an arbitrary computer program by examination of the code is impossible. Determining whether Bob's page of assembler will write all over the OS may be easy or hard, depending upon the code in question. Knapsack with power of two integers is trivial, general knapsack is NP-Complete, and random knapsack is not secure enough to be used as a strong cryptosystem. So given a specific problem, like DES, it is wrong to say that DES is combinatorially intractable because general satisfiability is hard or general boolean minimization is hard and DES has a polynomial reduction into such a problem, or that DES cannot be broken analytically because there have been no "spectacular breakthroughs" in the general case of these other problems. DES is a single instance, not a class of problems. It is of some constant degree of difficulty, and solving it, even under the image of a transformation into an instance of some other well-known problem, implies things only about the strength of DES, and not about the general case of other classes of problems which might be used to represent it. Breaking N-Round DES tells us only about the resistance of N-Round DES to whatever attack we are using, and does not imply intractable problems do not exist, or disclose some new sneak attack against all problems in NP. After this project is done, hard problems will still be hard. Hopefully what will have been demonstrated is that a small simple block cipher designed in the mid-70's is algebraically crunchable in a lot less time than an exhaustive search would take. An interesting result, but one which has no huge implications for the larger scheme of things. -- Sponsor the DES Analytic Crack Project http://www.cyberspace.org/~enoch/crakfaq.html From sunder at brainlink.com Tue Sep 15 21:08:40 1998 From: sunder at brainlink.com (Sunder) Date: Wed, 16 Sep 1998 12:08:40 +0800 Subject: Larry Gilbert, AOLers, and the Hyper-real flamer In-Reply-To: Message-ID: <35FFEE4E.24B7466D@brainlink.com> AIMSX at aol.com wrote: > Actually.. I am getting a SunOS Shell account this weekend. AOL has improved > service somewhat, and it is now possible to use Netscape (or any other > browser) along with it. Okay, so you're getting a shell account, good for you. > I also have over 100 accounts on a local ISP - so trust me... it's not that > big of a deal for me to get another ISP, I just like some of the keywords and > a few other areas. Something smells vaguely like rotten tuna, you already have 100 accounts on a local ISP. Why does anyone need more than one account on any ISP? That being the case, why do you need another account for on a SunOS box? If the ISP is >>>>LOCAL<<<< to you, why do you need to dial AOL to use all the 32 bit TCP/IP protocols? Why not dial up to the ISP and use PPP? Why do you need to post from AOL when you can post from one of your over 100 ISP accounts? > As for your thought that it is a CHOICE for everyone... well, I am sorry to > say it is not. My parent would rather use the [semi]- user-friendly software > of AOL, which she is familiar with, than have a dialup access with browsers > and other utilities in different areas she can't find as easily. (I know, it > sounds stupid.) Damn straight it's stupid, but not your mom: So fucking which is it? Either you have a hundred (and now 101) accounts on local ISP's >OR< you're forced to use AOL by your clueless mom. > getting a shell account, and not all AOLers are stupid warez lovers that don't > know cu from cd. > I am sure there are morons on other ISP's, they are just more visible on AOL. That's obvious. Some of them have over 100 accounts on the same ISP, and are truly so full of shit, that they're swimming in it. Kid, by bullshiting, all you're doing is enforcing the view that AOL users are really AOLusers. -- =====================================Kaos=Keraunos=Kybernetos============== .+.^.+.| Sunder |Prying open my 3rd eye. So good to see |./|\. ..\|/..|sunder at sundernet.com|you once again. I thought you were |/\|/\ <--*-->| ------------------ |hiding, and you thought that I had run |\/|\/ ../|\..| "A toast to Odin, |away chasing the tail of dogma. I opened|.\|/. .+.v.+.|God of screwdrivers"|my eye and there we were.... |..... ======================= http://www.sundernet.com ========================== From declan at well.com Tue Sep 15 21:10:27 1998 From: declan at well.com (Declan McCullagh) Date: Wed, 16 Sep 1998 12:10:27 +0800 Subject: A personal response to your email to sixdegrees In-Reply-To: <35FFD638.DB6920D3@sixdegrees.com> Message-ID: Mark, trust me on this: remove all five cypherpunks addresses from your lists. Really. -Declan On Wed, 16 Sep 1998, Mark Salamon wrote: > (I was not sure which email address to send this to, as the return > address was: nobody at replay.com. I also do not know who to address this > email to.) > > I am the WHOIS contact at sixdegrees you sent this email to, and since > this is a peronal reply to your email, it is certainly NOT spam and I > would appreciate it if you would take the time to read it and respond. > > I am very confused by your email. I understand that you do not wish to > receive emails from sixdegrees, but it is very easy to solve this > problem. If anyone ever sponsors you for sixdegrees, simply reply to > the email and put the word "remove" in the header. (This is pretty > standard stuff across the Internet, as I am sure you are aware.) If > that occurs, in the future we will not send emails to the email address > that received the original email from us. > > Unfortunately, if you have many email addresses (as it appears, from the > bottom of your email), the only way for us to remove each is to have a > sixdegrees email go to each of these email address accounts and then > received a "remove" reply to each of these emails. (We have in our > records references to 5 different cypherpunks email addresses: > @toad.com, @cypherpunks.net, @cypherpunks.org, @algebra.com, and > @ssz.com. If you wish for us not to contact you again at any of these > addresses, we will need to confirm that you in fact control these email > addresses. The best way for you to do this is to send an email to > cancel at sixdegrees.com, and ask to have these email addresses removed. > We will then send a reply to each email address you listed, asking you > to confirm that you in fact control those email addresses and wish to > have them removed. Once we receive your confirmation, we will adjust > our records so you receive no further emails from us to those email > addresses. For example, if I receive an email from you to this email, I > will assume that you control the @toad.com email address and I will have > that removed.) > > What is confusing to me is that the email you received from sixdegrees > (with the subject: Harald Fragner) is one that would be sent ONLY to a > CONFIRMED sixdegrees user. That means that once upon a time, whether > you remember or not, you joined sixdegrees (as have over 1,000,000 > people to date). It also appears that you listed Harald Fragner as a > contact, and he recently denied his sixdegrees relationship with you. > Thus, it is not surprising that you would receive emails from > sixdegrees, as you had registered for our service at one time. (I > assume that the email address you used to register with sixdegrees was > the @toad.com one.) > > sixdegrees is purely a voluntary service, and if you do not want to > participate in it, then we are happy to accommodate you. We do not send > out spam and take great efforts to ensure that no one receives unwanted > email from us. > > I look forward to receiving your reply to this email. > > Mark Salamon > General Counsel > MacroView Communications Corp. > > > > Anonymous wrote: > > > > On Tue, 15 Sep 1998, the shitheads at sixdegrees spammed the Cypherpunks > > list with: > > > > > Just a quick update from sixdegrees(tm). Unfortunately Harald > > > Fragner (harald at fragner.net) asked not to be listed as your > > > contact with sixdegrees. > > > > > > We also wanted to make sure you were aware that you currently > > > have no other confirmed contacts, so it will be hard for you to > > > have a productive sixdegrees experience. As you probably know, > > > without any confirmed contacts, you won't get any results from our > > > networking searches. > > > > > > So, we just wanted to recommend that you head over to > > > http://www.sixdegrees.com , log-in, and go to MY CONTACTS > > > to list additional relationships. > > > > > > > > > ==================================================================== > > > PLEASE NOTE: All replies to this address are processed by a computer. > > > If you have any problems, questions or requests send an e-mail to > > > issues at sixdegrees.com and someone will get back to you as soon as > > > possible. > > > ==================================================================== > > > > > > > > > E.DB.BRESP.3 > > > > > > > > > > Just a quick update from the Cypherpunks(tm). Fortunately, we don't want > > anything to do with your worthless, pathetic, spamming selves. We don't > > want to be your friends and, in fact, we'd prefer it if you would crawl > > under a rock and die because that seems to be the only way you'll stop > > spamming our mailing list. > > > > We also wanted to make sure that you were aware that you currently have no > > confirmed redeeming qualities, so it will be hard for you to be taken > > seriously by those of us who do have a clue. As you probably know, without > > any redeeming qualities, you will get lots of results every time you send > > out a batch of spam. > > > > So, we just wanted to recommend that you head on over to your bathtub with > > the rest of your coworkers, fill it up, jump in together, and then drop in > > a large, plugged-in, turned-on electric heater into the water and remain > > in until you stop twitching and cardiac activity ceases. > > > > C.LU.EFULS.2000 > > > > You people don't give a fuck how much excrement you shoot all over the > > net, so long as you let people know of your pathetic, worthless, > > disgusting service. If you can get somebody's mailing list to relay your > > shit for you, so much the better, because then you don't have to > > personally send it. > > > > Sorry, but I've had it with Sixdegrees. I've personally told you idiots > > very nicely what the Cypherpunks list is, and asked you nicely to stop > > spamming it. I've personally told you a method to keep people from > > submitting these addresses to your worthless spam haven. Other people have > > done the same thing. You haven't fixed it, indicating that you don't care. > > I'm no longer asking nicely. > > > > A copy is being sent to your technical contact, on the assumption that > > maybe he is a little more responsible, though I doubt it. > > > > -- The Cypherpunks List > cypherpunks@*.cyberpass.net, cypherpunks@*.ssz.com, > > cypherpunks at algebra.com, and others> > > > > From alan at clueserver.org Tue Sep 15 21:12:08 1998 From: alan at clueserver.org (Alan Olsen) Date: Wed, 16 Sep 1998 12:12:08 +0800 Subject: Democracy... In-Reply-To: Message-ID: On Tue, 15 Sep 1998, Tim May wrote: > > At 7:27 PM -0700 9/15/98, Jaeger wrote: > >hey, would you care to show us where "seperation of church and state" is > >to be found in the constitution/bill of rights? absolute right and > > Gee, check out the First Amendment to the U.S. Constitution. Also the first > item in the Bill of Rights. "Congress shall make no law respecting the > establishment of religion or prohibiting the free exercise thereof..." > (from memory, so don't bother me with minor wording corrections.) > > By standard convention, this is also referred to as "separation of church > and state." Also check out the text of the Virginia law involving seperation of church and state written by Thomas Jefferson. (Should be required reading for those who insist that the country is based on "Christian values".) Any good collection of the writings of Thomas Jefferson should have it. (My copy was borrowed and never returned a few years ago... Argh!) alan at ctrl-alt-del.com | Note to AOL users: for a quick shortcut to reply Alan Olsen | to my mail, just hit the ctrl, alt and del keys. From alan at clueserver.org Tue Sep 15 21:19:33 1998 From: alan at clueserver.org (Alan Olsen) Date: Wed, 16 Sep 1998 12:19:33 +0800 Subject: your mail In-Reply-To: Message-ID: On Wed, 16 Sep 1998, Mixmaster wrote: > > Monday, September 14, 1998 - 23:20:36 > > Question: How is it, that the FBI has so much power? > Answer: Because 'the people' didn't do swat to stop them[the FBI]. > > Question: How do 'the people' change the situation? > Answer: 'The people' get out their banners and megaphones and march on the Congress. > > Question: What do 'the people' do then they[Congress] don't hear 'the people'? > Answer: 'The people' go on strike. > > Question: What do 'the people' do when Congress doesn't care about their strikes? > Answer: 'The people' fire their M16'eens at Congress which they brought with them. > > Question: So where are 'the people'? "Evil will prevail because good people are too busy having fun." alan at ctrl-alt-del.com | Note to AOL users: for a quick shortcut to reply Alan Olsen | to my mail, just hit the ctrl, alt and del keys. From nobody at replay.com Tue Sep 15 21:23:52 1998 From: nobody at replay.com (Anonymous) Date: Wed, 16 Sep 1998 12:23:52 +0800 Subject: No Subject Message-ID: <199809161725.TAA17834@replay.com> The magic word is totocus. -----BEGIN PGP SECRET KEY BLOCK----- Version: 2.6.3a-sha1 Comment: 4 lQFwAzX4QxUAAAEDAOVKclQNZ3wdYS6mLvrfzZIKBCcjDEmjyw9DzXYUqqWbfoby ex+WMPyvYctHecHZyTyWPR/B7Nn1wx0FI8KTC33O7GqrhaFfXXyhRn1VAJbibL7g O4123prR91OxIZmdNQAFEQFllMHKKfsiYAL8yA9nOEYQriDdduVXNCu/JMaSAyJC NEdCQVOFFYture82kp1fZJkwk5eegH06NBEkyX7Uo11EbUHYJa/ozTNUpE628RBV VtpwNcI1jbTHfbMwpIC3NBf4yFScb1ZpH49dAYCfqeL5sq+vPY1uaPQ8ZuPYR5z8 XGkDuYIx8RJickonaME8JF8CWB51k65mFP6wGfgBgLJSCmlx+gI75D5395lne2Go KAZkKkfQNMkghXQAlRxMUOiXCPMB+9ZksY1+thjrngGAQSm6+JK1us4MggXp+4ux rfhmD3sz9jFVDfuJUT0Ql0VAyrNkyL+4q5Erx1A8RwMbe/e0B1RPVE9DVVOJAHUD BRA1+EMV0fdTsSGZnTUBAdLwAwDK51iax96YezcrSdB1h2menS0m3gjzzluzzRxQ y56rD0ZCkLtOBZVoCty7hwLW9ot1h1wkVeaaqUGv1We0BG/6iw8i05FBv/A5D+kV NafvNDnoYjUZts+0Io0MrfVtRf8= =qp7F -----END PGP SECRET KEY BLOCK----- From frissell at panix.com Tue Sep 15 21:28:29 1998 From: frissell at panix.com (Duncan Frissell) Date: Wed, 16 Sep 1998 12:28:29 +0800 Subject: Political purges and Bill C-68 In-Reply-To: <199809161614.MAA06660@cti06.citenet.net> Message-ID: <199809161722.NAA01433@mail1.panix.com> >Very soon (in principle on october 1st 1998), under the new bill C-68 , you >will be declared a criminal in the full sense of the law, just as if you had >killed somebody, if you don't register your guns (or don't plan to do so >before the limit date comes up in a few years). Plenty of public storage facilities on this side of the border. DCF From jdobruck at kki.net.pl Tue Sep 15 21:28:50 1998 From: jdobruck at kki.net.pl (Jan Dobrucki) Date: Wed, 16 Sep 1998 12:28:50 +0800 Subject: A personal response to your email to sixdegrees In-Reply-To: <199809152257.AAA05080@replay.com> Message-ID: <35FFF6A5.30B15074@kki.net.pl> Well... so far this is the longest response from sixdegrees I've read on cypherpunks... those guys are such numbskulls... can't they just go to the cypherpunk homepage, at: ftp://ftp.csua.berkeley.edu/pub/cypherpunks/Home.html get the info to get themselves of the cypherpunk mailing list...? And about folks on the list... seems awfully quite... Ende Jan D. P.S. :I remember this from a comic film... robo something... "Information is Ammunition" Mark Salamon wrote: > > (I was not sure which email address to send this to, as the return > address was: nobody at replay.com. I also do not know who to address this > email to.) > > I am the WHOIS contact at sixdegrees you sent this email to, and since > this is a peronal reply to your email, it is certainly NOT spam and I > would appreciate it if you would take the time to read it and respond. > > I am very confused by your email. I understand that you do not wish to > receive emails from sixdegrees, but it is very easy to solve this > problem. If anyone ever sponsors you for sixdegrees, simply reply to > the email and put the word "remove" in the header. (This is pretty > standard stuff across the Internet, as I am sure you are aware.) If > that occurs, in the future we will not send emails to the email address > that received the original email from us. (remainder of the nonsense I don't care to read is cut) From nobody at replay.com Tue Sep 15 21:28:52 1998 From: nobody at replay.com (Anonymous) Date: Wed, 16 Sep 1998 12:28:52 +0800 Subject: No Subject Message-ID: <199809161729.TAA18190@replay.com> On Feb. 1, 1996, the US House of Representatives voted to pass the Telecommunications Reform Act. This Act included the Communications Decency Act, which sought to criminalize posting to the Internet any material deemed indecent and patently offensive, with no exception for socially redeeming material. On Sept. 11, 1998, the US House of Representatives voted to release the Referral of Independent Counsel Starr on the Internet. 365 individuals were Members of Congress during these two votes, 196 Republicans and 169 Democrats. Of that total, 284, or 77.6%, voted Aye both times. 185 of the Republicans, or 94.4%, voted Aye both times. 96 of the Democrats, or 56.8%, voted Aye both times. Had the Communications Decency Act withstood judicial review (which it did not), posting the Starr report to the Internet arguably would have subjected the posters to fines of $250,000 and 5 years in prison. The question of who voted for both the CDA and the release of the Starr report is not cut-and-dried, because Congress did not record a roll-call vote for the CDA in isolation, but only for its vehicle the Telecommunications Reform Act. Also, the vote Friday to post the Starr report was primarily a vote to start up impeachment machinery. Nevertheless, if accountability to the voters means anything in this democracy, the Congress members who voted "Aye" on both February 1, 1996 and September 11, 1998 ought to come in for a bit of uncomfortable public exposure. http://www.tbtf.com/resource/hypocrites.html
From btroyan at yahoo.com Tue Sep 15 21:30:27 1998 From: btroyan at yahoo.com (Bart Troyan) Date: Wed, 16 Sep 1998 12:30:27 +0800 Subject: It's finally over (was Re: Explanation of Harald Fragner and cypherpunks) Message-ID: <35FFF486.A3DD8B9A@yahoo.com> ---Mark Salamon wrote: > > Thanks for the reply. I have now received about 10 such replies. We > will take them to heart, remove the cypherpunks and attempt to deal with > the mailing list issue in an intelligent way. > > And thanks, but we have enough magazine subscriptions already. :) > > Mark > > Bart Troyan wrote: > > > > OK, here's what happened. Someone signed up for sixdegrees using one or > > more of the cypherpunks addresses as their address, either deliberately in > > order to cause problems like this, or accidentally, not realizing what > > would happen. > > > > The real-world analogy would be for me and all my friends to get a bunch of > > magazines, rip out all those postage-paid subscription flaps, and fill out > > your name and address on each of them, then you'd have unwanted trial > > subscriptions to lots and lots of magazines. > > > > hmmmm... > > MacroView > > 90 William Street, Suite 301 > > New York, NY 10038 > > > > Wouldn't that suck? Can you imagine if 1000 people did that to you all the > > same day? (this is *not* a threat, just an example). You'd have bags and > > bags of zines and bills coming in daily... > > > > As I am sure you are aware, the net makes it REALLY EASY to screw someone > > over like that, by signing them up for all sorts of things with little > > effort. Even if you remove all the cypherpunks addresses, someone can come > > along and do it again. There must be a permanent solution...how about > > hardcoding a block on signing up with an address containing the string > > "cypherpunks" in your email software? Why should thousands of us on > > cypherpunks all have to do our own filtering to delete everything from > > @sixdegrees.com and still have to waste all that bandwidth when one site is > > the source of all of it, and it could be eradicated with a simple > > programming change? > > > > I assure you this is not the last time you'll see this problem occur--there > > are thousands of mailing lists out there, and lots of vindictive former > > subscribers for each one that would love to annoy everyone on the list for > > a while... and signing a list up for sixdegrees does the trick quite > > efficiently. > > > > -Bart > > > > Mark Salamon wrote: > > > What is confusing to me is that the email you received from sixdegrees > > > (with the subject: Harald Fragner) is one that would be sent ONLY to a > > > CONFIRMED sixdegrees user. That means that once upon a time, whether > > > you remember or not, you joined sixdegrees (as have over 1,000,000 > > > people to date). It also appears that you listed Harald Fragner as a > From nobody at nowhere.to Tue Sep 15 21:36:04 1998 From: nobody at nowhere.to (Anonymous) Date: Wed, 16 Sep 1998 12:36:04 +0800 Subject: 128 bit or 40 bit? Message-ID: <67ee9e3cc8499f9d72a11a2df56c48fe@anonymous> Being outside North America, I have an "export" version of Internet Explorer/Netscape Navigator. These offer 40 bit encryption. (40 bit RC4, I understand). My financial institution has a 128 bit Verisign certificate. To my surprise, they claim this offers 128 bit encryption to /me/. [in transactions to https://secure.mybank.com.xx] I thought my 40 bit client limited the security to 40 bits. Who is right? Please explain. TIA From nobody at replay.com Tue Sep 15 21:59:49 1998 From: nobody at replay.com (Anonymous) Date: Wed, 16 Sep 1998 12:59:49 +0800 Subject: Clinton still doesnt get it Message-ID: <199809161800.UAA20746@replay.com> Frondeur writes: > Why do you believe the perjury case has `reasonable doubt' problems? Watch TV and learn the answer. It's only perjury if it's material, and the judge said it wasn't material. > And the abuse of power case seems thin even to a non-lawyer. But > where does the `executive privilege stuff' come in? I don't see > that Starr listed that among his possible grounds for impeachment. Among the grounds Starr listed was Clinton's attempt to delay the investigation by raising many legal objections. He claimed privilege, for example, with respect to Secret Service testimony. Most of his efforts were ultimately overruled. From CTIA_Daily_News at um2.unitymail.com Wed Sep 16 13:02:01 1998 From: CTIA_Daily_News at um2.unitymail.com (CTIA Daily News) Date: Wed, 16 Sep 1998 13:02:01 -0700 (PDT) Subject: CTIA Daily News from WOW-COM - September 16, 1998 Message-ID: <199809161951.OAA26204@mailstrom.revnet.com> ========================================== Welcome to today's edition of the CTIA Daily News from WOW-COM.� Please click on the icon / attachment for the most important news in wireless communications today. The Newest Most Comprehensive Tradeshow of Wireless Computing and Communications is Only a Month Away. Register TODAY! http://www.wirelessit.com/register.htm Team WOW-COM wowcom at ctia.org =========================================== -------------- next part -------------- A non-text attachment was scrubbed... Name: bin00019.bin Type: application/octet-stream Size: 9429 bytes Desc: "_CTIA_Daily_News_19980916.htm" URL: From chromedemon at netcologne.de Tue Sep 15 22:03:23 1998 From: chromedemon at netcologne.de (Lars Weitze) Date: Wed, 16 Sep 1998 13:03:23 +0800 Subject: Encrypting files. Message-ID: <003d01bde1a3$c848e060$7b0000c8@chrome> Does anyone now a program for WindozeNT to store encrypted data on harddisk. At the moment i use ZIP-Files with a Password on them (I now it is not very secure). I am living outside USA and do not want any software with backdoors ,"masterkeys" or stuff like that. Thanks ChromeDemon -- "One dead is a tragedy, thousand deads are a statistic." Karl Marx e-mail: chromedemon at netcologne.de http://chromedemon.home.pages.de http://www.netcologne.de/~nc-weitzela2 From mgering at ecosystems.net Tue Sep 15 22:04:39 1998 From: mgering at ecosystems.net (Matthew James Gering) Date: Wed, 16 Sep 1998 13:04:39 +0800 Subject: Democracy... Message-ID: <33CCFE438B9DD01192E800A024C84A1928467E@mossbay.chaffeyhomes.com> Someone wrote: >Religion has nothing to do with 'faith' or 'Churches' What definition of "religion" are you using. I am very hard pressed to find single definition that does not involve *faith*, although I have yet to find a good etymological dictionary on the Internet (anyone know of one?). You are correct that religion need not have anything to do with church. >A man may be an atheist and be religious. Greek: a- (without) + [theos (god) + ismos (practice or doctrine)] Unless you can show me a religion that does not involve a god or gods, and although etymologically unjustified I would claim one that does not involve *faith*, then I would say you could NOT be both an atheist and religious. Agnostic perhaps, but not an atheist. You can be contradictory and hypocritical and claim you are many things, but we are talking about a coherent philosophy. You can be both spiritual and an atheist. Spirituality does not require faith in any external mystical element or being. Jaeger wrote: > notice the wording in the first amendment...it only restricts gov't > restrictions on religion. What part of "Congress shall make no law respecting an establishment of religion" didn't you understand? As with most the constitution, however, this is theory, not practice. In practice there are many laws and case precedence establishing and preferring certain religious practices, particularly the institution of marriage. Jim wrote: > The 1st prevents the government from regulating religion, even to the > point of having the authority to define what a religion is. I agree, but clearly they have. Particularly all the IRS code involving certain exemptions for religious organizations and individuals. Like I said above, theory versus practice, we are essentially no longer living under the constitution. Matt From mix at anon.lcs.mit.edu Tue Sep 15 22:04:45 1998 From: mix at anon.lcs.mit.edu (lcs Mixmaster Remailer) Date: Wed, 16 Sep 1998 13:04:45 +0800 Subject: sixdegreees spam Message-ID: <19980916180002.7081.qmail@nym.alias.net> Has any cypherpunk not noticed that all sixdegrees participants have twodegreees (TM) of separation via the sixdegrees site???? From usura at replay.com Tue Sep 15 22:32:26 1998 From: usura at replay.com (Alex de Joode) Date: Wed, 16 Sep 1998 13:32:26 +0800 Subject: 128 bit or 40 bit? Message-ID: <199809161832.UAA23457@replay.com> In article <67ee9e3cc8499f9d72a11a2df56c48fe at anonymous> you wrote: : Being outside North America, I have an "export" version of : Internet Explorer/Netscape Navigator. These offer 40 bit : encryption. (40 bit RC4, I understand). : My financial institution has a 128 bit Verisign certificate. : To my surprise, they claim this offers 128 bit encryption to /me/. : [in transactions to https://secure.mybank.com.xx] : I thought my 40 bit client limited the security to 40 bits. : Who is right? Please explain. All browsers have the 128 bits encryption inthem, but in the non-US version it can only enabled by a 'special cert'. Banks are the only institutions that are currently allowed to recieve such an cert. This is also why fortify.net works as it does, anyways, we also offer 128 bit versions of the popular browsers *g* -- Alex de Joode | International CryptoRunners | http://www.replay.com 'A little paranoia can longer your life' From ravage at EINSTEIN.ssz.com Tue Sep 15 22:38:14 1998 From: ravage at EINSTEIN.ssz.com (Jim Choate) Date: Wed, 16 Sep 1998 13:38:14 +0800 Subject: Democracy... (fwd) Message-ID: <199809161903.OAA08336@einstein.ssz.com> Forwarded message: > From: Matthew James Gering > Subject: RE: Democracy... > Date: Wed, 16 Sep 1998 11:00:09 -0700 > Unless you can show me a religion that does not involve a god or gods, > and although etymologically unjustified I would claim one that does not > involve *faith*, then I would say you could NOT be both an atheist and > religious. Agnostic perhaps, but not an atheist. You can be > contradictory and hypocritical and claim you are many things, but we are > talking about a coherent philosophy. Try pantheism. If one fundamentaly believes that god does not exist, which clearly involves faith, then yes it is a religion. A religion is a belief system that provides a relationship between the individual and the totality of all else (the cosmos if you'll allow me). By your view an agnostic can't be religion since it is the recognition of a *lack* of faith, clearly something you require to be religous. An atheist says that god could exist but doesn't - clearly an act of faith. There are fundamentaly two types of religions, those that recognize some for of transcendance and those that don't. Quibbling over what is the 'correct' form of transcendence is as irrelevant as arguing over the 'correct' religion. In either case the same failure to understand human psychology is committed. In short it is the axiomatic assumption that there *is* a single anything that will satisfy everyone. > You can be both spiritual and an atheist. Spirituality does not require > faith in any external mystical element or being. What do you mean by 'spiritual'? Are you refering to a ghost-in-the-machine either at the individual or cosmological level? Whether one believes that mystical element is external (which if you understood God would clearly be seen to be a non sequitar with the rest of your argument) or internal is irrelevant. ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From tcmay at got.net Tue Sep 15 22:39:21 1998 From: tcmay at got.net (Tim May) Date: Wed, 16 Sep 1998 13:39:21 +0800 Subject: A personal response to your email to sixdegrees In-Reply-To: <35FFD638.DB6920D3@sixdegrees.com> Message-ID: At 10:09 AM -0700 9/16/98, Declan McCullagh wrote: >Mark, trust me on this: remove all five cypherpunks addresses from your >lists. > >Really. > As others have noted, operations like "sixdegrees" need to be very careful about how list addresses are signed up. This is a problem mailing lists (formerly called "list exploders," until Congress began to rant about Internet terrorists) have been dealing with for many years. "Lists subscribed to lists," with resulting circularity problems, is something that can bring a list to standstill. >From the dozens of irate messages about "sixdegrees," and the joking responses sent to "I hear you are my friend, but who are you?" queries seen from hapless "sixdegrees" clients, the meltdown may be underway. There are concrete things you folks can do. When someone is nominated (or whatever) as a potential contact, you can ask the contactee if he or she wants this person to be a contact. In other words, take some of the automation out of the loop. (Or add more of the right kind, such as sending a cookie or chit back to the parties and require them to forward the cookies back. This, of course, adds complexity for the "sixdegrees" customers and may actually cause many of them to just give up in frustration.) If you do nothing, expect many of us to get more and more irate at the abuses your service are facillitating. I expect some of the list subscribers on lists your service "infects" will take the usual hackers measures to crash your system. Not that I necessarily endorse this, but it's happened in the past. --Tim May (This space left blank pending determ. of acceptability to the gov't.) ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, ComSec 3DES: 831-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Licensed Ontologist | black markets, collapse of governments. From melliott at ncsa.uiuc.edu Tue Sep 15 22:47:46 1998 From: melliott at ncsa.uiuc.edu (Matt Elliott) Date: Wed, 16 Sep 1998 13:47:46 +0800 Subject: Democracy... In-Reply-To: <33CCFE438B9DD01192E800A024C84A1928467E@mossbay.chaffeyhomes.com> Message-ID: >As with most the constitution, however, this is theory, not practice. In >practice there are many laws and case precedence establishing and >preferring certain religious practices, particularly the institution of >marriage. The congress doesn't pass laws regarding marriages. That is all up to individual states. Matt From blancw at cnw.com Tue Sep 15 23:05:17 1998 From: blancw at cnw.com (Blanc) Date: Wed, 16 Sep 1998 14:05:17 +0800 Subject: [NYT] Bell-South charging access fees for phone-over-Internet In-Reply-To: <3.0.5.32.19980914104601.008b0a10@idiom.com> Message-ID: <000101bde1a5$fd2d4da0$4f8195cf@blanc> Indirectly, I am already being charged a tax for internet service: this month AT&T added a "Universal Connectivity Charge" for a "Universal Service Fund" which "not only helps provide affordable phone service but also gives schools and libraries access to the internet." It's only $1.88 right now, just a wedge . . . .. Blanc From mmotyka at lsil.com Tue Sep 15 23:05:57 1998 From: mmotyka at lsil.com (Michael Motyka) Date: Wed, 16 Sep 1998 14:05:57 +0800 Subject: Democracy... In-Reply-To: <80256681.0031C8CB.00@seunt002e.ssa.co.uk> Message-ID: <36000B3E.780C@lsil.com> > However, if you believe in something to be life changing and > beneficial to both the idividual and society you'll want or be > compelled to "pass it on". > Altruistic on the surface. Regarding religion though, why do I always get the feeling that when implemented and empowered it is judgemental and intolerant of those who do not fall properly in line? > What I wanted to illustrate is that there are absolutes, to say there > are no obsolutes is in itself an absolute and so is self defeating. > All right Mr. Logic, you're so sharp, give me ONE example of a *moral* absolute. > We must have absolutes. > We do: speed of light, mass of the electron, probably, but behavior? We have behaviors that facilitate our persistance and propagation as a species at ever increasing densities. Operating outside the boundaries is neither right nor wrong, simply different. Not necessarily without consequences, but simply different. Your yardstick is an hallucination to which you cling to forlornly like a kitten clinging to a stick in a raging river. Mike ps - is 'forlornly' really a word? I think so, but it looks odd today. From tcmay at got.net Tue Sep 15 23:07:46 1998 From: tcmay at got.net (Tim May) Date: Wed, 16 Sep 1998 14:07:46 +0800 Subject: Would Congress have been affected by the CDA? In-Reply-To: <199809161729.TAA18190@replay.com> Message-ID: At 10:29 AM -0700 9/16/98, Anonymous wrote: >Had the Communications Decency Act withstood >judicial review (which it did not), posting the >Starr report to the Internet arguably would have >subjected the posters to fines of $250,000 and 5 >years in prison. You're missing an important point: when has government not found ways to exempt itself from laws? Whether the laws are about Social Security, overtime, quotas for hiring, or even libel and slander, Congress and the other branches exempt themselves. How convenient. I don't know for sure if buried in Section 17, Paragraph 42 of the CDA was an exemption for Official Government Documents, but I expect lawyers would've found ample ways to publish what they want to publish. Amongst other things, there would be many problems in forcing official documents, court reports, executive findings, etc., to be bowdlerized to meet the CDA requirements. And the burrowcrats just _love_ to have laws which apply to the sheeple, and not to them. So I wouldn't make too much of this "apparent violation" of the CDA. Don't forget that throughout history bluenoses and puritans have gotten off on holding up examples of thoughtcrime. --Tim May (This space left blank pending determ. of acceptability to the gov't.) ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, ComSec 3DES: 831-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Licensed Ontologist | black markets, collapse of governments. From mmotyka at lsil.com Tue Sep 15 23:09:53 1998 From: mmotyka at lsil.com (Michael Motyka) Date: Wed, 16 Sep 1998 14:09:53 +0800 Subject: US Updates Crypto Policy In-Reply-To: <199809161613.MAA07615@dewdrop2.mindspring.com> Message-ID: <36000A69.74D5@lsil.com> > As the Vice President stated in a letter to Senator Daschle, the > Administration remains committed to assuring that the nation?s law > enforcement community will be able to access, under strictly defined legal > procedures, the plain text of criminally related communications and stored > information. The Administration intends to support FBI?s establishment of > a technical support center to help build the technical capacity of law > enforcement - Federal, State, and local - to stay abreast of advancing > communications technology. > Considering that domestic controls are not discussed they are certainly mentioning a lot of activities that sound like they would be taking place here in the US. They also mention a wide range of LEAs that would welcome domestic controls. Is this just a continuation of the attempt to control domestic use by export policy? Mike From whgiii at invweb.net Tue Sep 15 23:11:09 1998 From: whgiii at invweb.net (William H. Geiger III) Date: Wed, 16 Sep 1998 14:11:09 +0800 Subject: Clinton still doesnt get it In-Reply-To: <199809161800.UAA20746@replay.com> Message-ID: <199809161911.PAA23405@domains.invweb.net> -----BEGIN PGP SIGNED MESSAGE----- In <199809161800.UAA20746 at replay.com>, on 09/16/98 at 08:00 PM, Anonymous said: >Watch TV and learn the answer. Of course, why didn't I think of that! If it's on TV it *must* be true!! I would write more but I have to go watch CNN for my daily dose of Goodspeak so I can think Goodthoughts. - -- - --------------------------------------------------------------- William H. Geiger III http://www.openpgp.net Geiger Consulting Cooking With Warp 4.0 Author of E-Secure - PGP Front End for MR/2 Ice PGP & MR/2 the only way for secure e-mail. OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html - --------------------------------------------------------------- Tag-O-Matic: My best view from a Window was through OS/2. -----BEGIN PGP SIGNATURE----- Version: 2.6.3a-sha1 Charset: cp850 Comment: Registered_User_E-Secure_v1.1b1_ES000000 iQCVAwUBNgAPXo9Co1n+aLhhAQFwFgP/ZM79Cnho28TqEefiZBrZHTb8bm+80ygq LPZJYainq8wSVgG6mTDpxovBbsCwvYA911KzjxESKwjRI6vjzZYoGyoWJBjX02Qx n9H3S1QxTIm9XkKw6Dqd+KN8STKk1VzNHhqkL+BGrNEsqvZGC7qhQjHCpXIjfAU8 CEb7KQNUq68= =fn9o -----END PGP SIGNATURE----- From ravage at EINSTEIN.ssz.com Tue Sep 15 23:12:25 1998 From: ravage at EINSTEIN.ssz.com (Jim Choate) Date: Wed, 16 Sep 1998 14:12:25 +0800 Subject: Democracy... (fwd) Message-ID: <199809161937.OAA08809@einstein.ssz.com> Forwarded message: > Date: Wed, 16 Sep 1998 12:02:22 -0700 > From: Michael Motyka > Subject: Re: Democracy... > All right Mr. Logic, you're so sharp, give me ONE example of a *moral* > absolute. Morality and the distinctions that can be drawn from it are a consequence of the individual and the characteristics of their milieu and their species. ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From support at bulletproof.com Tue Sep 15 23:21:11 1998 From: support at bulletproof.com (BulletProof Customer Support) Date: Wed, 16 Sep 1998 14:21:11 +0800 Subject: JDesignerPro 3.0 Enterprise Edition Message-ID: <19980916190405551.AXZ392@www.bulletproof.com> Hi Cypher, Do you remember downloading JDesignerPro from the Microsoft Site Builder Network? As a Microsoft partner, BulletProof wants you to know about our latest product annoucements. We have just released JDesignerPro 3.0 Enterprise Edition. We know that you may be too busy to download and try new software so we've put together a multimedia demonstation that runs for just 5 minutes. It's in AVI format and can be downloaded from our home page. See below for the link. We strongly encourage you to take 10 minutes to download the demo and run it. You'll quickly see whether JDesignerPro 3.0 has the features that meet your needs. BulletProof Corp, known worldwide as a leading vendor in the Java RAD tools business, has just released JDesignerPro 3.0. This is a major new version of our widely used Java Intranet toolset. BulletProof has worked hard on this release which includes enhanced client-side development and deployment and two completely new breakthrough additions for the server-side. JDesignerPro 3.0 Main Features * The Client Application Builder enhanced. Visual Client-side RAD development in pure Java. This is the #1 database application development tool if you are building for the Intranet. It includes over a dozen built-in, professional data-bound components, built-in deployment system, access control and data-access server. Interface and Interaction code generation with detailed wizards - requires little or no coding of Java. * New Visual Server-Side Development. For the first time ever the new Method Explorer(tm) makes visual server-side development possible thanks to a graphical view of how Java classes are put together. With only mouse clicks you can explore any Java class in seconds to instantly see how methods and variables in your class interact. This has never been achieved before in any programming language. The Method Explorer is a must-see feature. * The New Enteprise Server. The Enterprise Server combines our existing middleware server with a complete suite of new features and a powerful management console. This new product gives you exceptional control over how your server processes are executed and managed. For the first time you now have all the job management features that before were only available on Mainframe computers. Job scheduling, queuing, prioritization and detailed logging are all included leaving you only the work of programming your business logic. We have also included EJB support, server push and much more. If you have any sort of backend process to run daily, weekly or at other set intervals or based on events, the Enterprise Server is for you. We have always believed that JDesignerPro could be the premier system for developing and deploying an Intranet System in Java. With the new Enterprise Edition JDesignerPro includes everything from visual client and server development to client and server deployment. JDesignerPro is now truly a world class solution. JDesignerPro is 100% Java and runs on any Java platform. A database and JDBC driver are required for non Windows platforms. Server side requires Java 1.1, client is 1.02 and up compatible. As always BulletProof has a 30-day free trial of JDesignerPro 3.0 waiting for you on our website (only 4 MB download). The multimedia demo is also available on our site. It is only 2.5MB. Give it a try today: http://www.bulletproof.com/ JDesignerPro 3.0 has far too many new features to list in an email. If you want to know whether JDesignerPro has a feature you're looking for please email us and we'll tell you exactly how JDP will meet your needs. Thank you for taking the time to read about JDesignerPro 3.0. We believe you'll save so much time using JDesignerPro you may get Fridays Off! Sincerely, The BulletProof Team support at bulletproof.com 800-505-0105 To be removed from our mailing list please reply to this with "remove" in the subject. From mgering at ecosystems.net Tue Sep 15 23:40:00 1998 From: mgering at ecosystems.net (Matthew James Gering) Date: Wed, 16 Sep 1998 14:40:00 +0800 Subject: It's finally over (was Re: Explanation of Harald Fragner and cypherpunks) Message-ID: <33CCFE438B9DD01192E800A024C84A19284687@mossbay.chaffeyhomes.com> > ---Mark Salamon wrote: > > > > Thanks for the reply. I have now received about 10 such > > replies. We will take them to heart, remove the cypherpunks > > and attempt to deal with the mailing list issue in an > > intelligent way. Most lists and services have dealt with the problem of someone accidentally subscribing or maliciously subscribing someone else in one of two ways: A) send and acknowledgement message with a randomly generated authorization code that requires the user to respond. B) send out a password and require the user to login before account is activated. This works only if you assume the malicious individual will not receive mail sent to that address. This therefore falls down when the address is a mailing list or other distribution point that the malicious individual has access to directly or via archives. What we really need is an automated system that could authorize/deny an address prior to the code/password being sent that would keep track of distribution list addresses and such. Perhaps I'll create one myself soon. Matt From 78hd50g0 at auto.sixdegrees.com Tue Sep 15 23:54:26 1998 From: 78hd50g0 at auto.sixdegrees.com (sixdegrees) Date: Wed, 16 Sep 1998 14:54:26 +0800 Subject: Your new password Message-ID: <199809161946.MAA25881@toad.com> Name: Jolly CyberSnot sixdegrees Password: fishmelt In response to your request for a new sixdegrees(tm) password, we have sent you the following temporary password: fishmelt. As soon as you come to the site, http://www.sixdegrees.com , and use it to log-in on the home page, it will become your official password, and your old password will be deactivated. (If you end up remembering your old password and use that to log-in at the site before using this new temporary password, the temporary password will be deactivated.) This may seem wacky, but it's for your security. And, either way, once you successfully log-in at the site, you can go to your personal profile and choose whatever password you like - in fact, we encourage you to do so. If you never requested a new password and got this message in error, just continue using your old password and e-mail us at issues at sixdegrees.com. ==================================================================== PLEASE NOTE: All replies to this address are processed by a computer. If you have any problems, questions or requests send an e-mail to issues at sixdegrees.com and someone will get back to you as soon as possible. ==================================================================== E.SI.REQPW.1 From rah at shipwright.com Wed Sep 16 00:02:08 1998 From: rah at shipwright.com (Robert Hettinga) Date: Wed, 16 Sep 1998 15:02:08 +0800 Subject: Democracy... In-Reply-To: <33CCFE438B9DD01192E800A024C84A1928467E@mossbay.chaffeyhomes.com> Message-ID: At 2:47 PM -0400 on 9/16/98, Matt Elliott wrote: > The congress doesn't pass laws regarding marriages. That is all up to > individual states. Nit: But, not in Utah, of course. :-). Cheers, Bob Hettinga ----------------- Robert A. Hettinga Philodox Financial Technology Evangelism 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From bmccaffrey at executive.com Wed Sep 16 00:02:15 1998 From: bmccaffrey at executive.com (bmccaffrey at executive.com) Date: Wed, 16 Sep 1998 15:02:15 +0800 Subject: the people Message-ID: <4CBEEB8C7D24D211971500A0C98F15BC02EE85@mail.executive.com> Monday, September 14, 1998 - 23:20:36 Question: How is it, that the FBI has so much power? Answer: Because 'the people' didn't do swat to stop them[the FBI]. Question: How do 'the people' change the situation? Answer: 'The people' get out their banners and megaphones and march on the Congress. Question: What do 'the people' do then they[Congress] don't hear 'the people'? Answer: 'The people' go on strike. Question: What do 'the people' do when Congress doesn't care about their strikes? Answer: 'The people' fire their M16'eens at Congress which they brought with them. Question: So where are 'the people'? Answer: At home watching the coverage of these exciting events on TV. From nobody at replay.com Wed Sep 16 00:16:06 1998 From: nobody at replay.com (Anonymous) Date: Wed, 16 Sep 1998 15:16:06 +0800 Subject: Clinton still doesnt get it Message-ID: <199809162017.WAA32443@replay.com> Anonymous writes: > > Frondeur writes: > > > Why do you believe the perjury case has `reasonable doubt' problems? > > Watch TV and learn the answer. It's only perjury if it's material, > and the judge said it wasn't material. This doesn't speak to `reasonable doubt' which was the subject under discussion. Or are you arguing that a defense to perjury is that there is reasonable doubt that a question was material? Go watch TV and report back with the answer. > > And the abuse of power case seems thin even to a non-lawyer. But > > where does the `executive privilege stuff' come in? I don't see > > that Starr listed that among his possible grounds for impeachment. > > Among the grounds Starr listed was Clinton's attempt to delay the > investigation by raising many legal objections. He claimed privilege, > for example, with respect to Secret Service testimony. Most of his > efforts were ultimately overruled. Yes, but I assumed Mac had included this under the `abuse of power' heading since he explicitly cited that topic in his message to which I was responding, and since that appeared to match one of the broad headings under which Starr classifies his possible `grounds for impeachment': "...that President Clinton's actions ... have been inconsistent with the President's constitutional duty to faithfully execute the laws. " I see nowhere that Starr claims that it was illegal/impeachable for Clinton to have claimed executive privilege. He merely notes that Clinton used it (extensively) along with a bunch of other tactics to delay and impede the investigation. - Frondeur From mgering at ecosystems.net Wed Sep 16 00:32:48 1998 From: mgering at ecosystems.net (Matthew James Gering) Date: Wed, 16 Sep 1998 15:32:48 +0800 Subject: Encrypting files. Message-ID: <33CCFE438B9DD01192E800A024C84A1928468C@mossbay.chaffeyhomes.com> PGP International for file encryption, NTSentry or BestCrypt for virtual-disk encryption. PGP International STFM BestCrypt http://www.jetico.sci.fi/bcnt.htm NTSentry http://www.softwinter.com/sentry.html All are outside the US. If anyone has other good recommendations, please add them. Matt > -----Original Message----- > From: Lars Weitze [mailto:chromedemon at netcologne.de] > Does anyone now a program for WindozeNT to store encrypted > data on harddisk. From nobody at anon.olymp.org Wed Sep 16 00:37:45 1998 From: nobody at anon.olymp.org (Anonymous) Date: Wed, 16 Sep 1998 15:37:45 +0800 Subject: Is nym.alias.net down? Message-ID: Anonymous wrote: > > Is nym.alias.net down? I've sent a request twice using > a different remailer chain each time yet it still doesn't > reply. It's been about two days since I sent it in. > > I did however create a nym with dongco.hyperreal.art.pl. > Is this service reliable? or will it disppear quickly? Please, try creating a testxxx by direct mail first. Then upgrade to a remailer chain. From 5hmd50a5 at auto.sixdegrees.com Wed Sep 16 00:38:22 1998 From: 5hmd50a5 at auto.sixdegrees.com (sixdegrees) Date: Wed, 16 Sep 1998 15:38:22 +0800 Subject: Your new password Message-ID: <199809162032.NAA26383@toad.com> Name: Schlomo CyberPoopy sixdegrees password: linkcusp Congratulations Schlomo. You're well on your way to becoming a full sixdegrees(tm) member. Here is your member password: linkcusp. Use it to log-in on the home page at the sixdegrees Web site, http://www.sixdegrees.com. We'll ask you for a little more information to complete your registration, and then you'll be ready to start networking. It's important that you return to the site and log-in. Your membership will not be complete until you do so. Once you've successfully logged in with your password, just go to Personal Profile and you'll be able to choose your own password. Thanks for becoming part of sixdegrees. We're looking forward to seeing you at the site. ==================================================================== PLEASE NOTE: All replies to this address are processed by a computer. If you believe you received this e-mail in error, and it was not your intention to become a sixdegrees member, or if you have any problems, questions or requests send an e-mail to issues at sixdegrees.com and someone will get back to you as soon as possible. ==================================================================== E.SI.BAM.1 From zebo at pro-ns.net Wed Sep 16 00:39:07 1998 From: zebo at pro-ns.net (zebo) Date: Wed, 16 Sep 1998 15:39:07 +0800 Subject: Democracy... In-Reply-To: Message-ID: <36002351.339B@pro-ns.net> Matt Elliott wrote: > The congress doesn't pass laws regarding marriages. Yet. Z From vinnie at vmeng.com Wed Sep 16 16:00:10 1998 From: vinnie at vmeng.com (vinnie at vmeng.com) Date: Wed, 16 Sep 1998 16:00:10 -0700 (PDT) Subject: Announcement: Mac-Crypto Conference Oct 6-9, 1998 Message-ID: <199809162247.PAA49860@scv1.apple.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 The Membership of the Mac-Crypto List invites you to The Third Annual Macintosh Cryptography and Internet Commerce Software Development Workshop October 6 - 9th, 1998 Town Hall Auditorium Apple R&D Campus 4 Infinite Loop, Cupertino, CA, USA Keeping with tradition, this is still free workshop, but we'd *really* like it if you register (see below). We are once again hosting our annual workshop, where you are sure to find the latest and greatest information about whats going on in the Macintosh cryptography world. A lot has happened in the past year in the world of the Internet and Cryptography, so this year, thanks to popular demand we have allocated more time and a larger hall for developers to talk about what they are working on. PRELIMINARY WORKSHOP TOPICS: (more to come) Introductions and Overviews: Intro to Crypto Systems Export Controls & Crypto software Crypto Opportunities for the Mac Tech Stuff: AppleShare Authentication Architecture PGPticket - A Secure Authorization Protocol The AltaVec PowerPC Architecture Apple Security Architecture Overview. Apple Keychain / Subwoofer update OpenPGP & the IETF standards process Overview of Crypto API's and Toolkits Applications of Cryptography RC5 cracking effort & the Mac PGPUAM - Appleshare Public Key Authentication Graphically displaying the Web of Trust Anonymous Communications and the Macintosh Open Sessions: As requested we scheduled lots of time for developer demos and open discussions plus the much asked for and a PGP Keysigning party ... and plenty of time for developers to network with each other and Apple. We have also left time open for a few last-minute speakers. If you would like to present a paper or give a talk, please contact Vinnie Moscaritolo at vinnie at apple.com To find out more about previous Mac-Crypto workshops check out our webpage at http://www.vmeng.com/mc/ REGISTRATION: To register, complete the following form, and email it to mac-crypto-conference at vmeng.com with the subject line REGISTRATION Registration is limited to 300 attendees, so be sure to register early. _______________________________________________________________________ * Name: * Email Address: Title: Affliation: Address: Telephone: Comments: _______________________________________________________________________ Local Hotels: Cupertino Inn, 800-222-4828 Pretty much Across the Street. Cupertino Courtyard by Marriot, 800-321-2211 5 Minute Drive Inn at Saratoga 408-867-5020 About 3 Miles See you in Cupertino on October 6 - 9th! Vinnie Moscaritolo Apple World Wide Developer Support DSS/DH: 3F903472C3AF622D5D918D9BD8B100090B3EF042 -----BEGIN PGP SIGNATURE----- Version: PGP 6.0 iQA/AwUBNgA9BR16LYZvFyoKEQKYAACfXK7uA40tX1DRy44zTaqkesDs5TkAoKS3 Fx/5lcgO9b6Wqfsibdpc1MRz =c+ZP -----END PGP SIGNATURE----- From mgering at ecosystems.net Wed Sep 16 01:06:08 1998 From: mgering at ecosystems.net (Matthew James Gering) Date: Wed, 16 Sep 1998 16:06:08 +0800 Subject: 128 bit or 40 bit? Message-ID: <33CCFE438B9DD01192E800A024C84A1928468E@mossbay.chaffeyhomes.com> > All browsers have the 128 bits encryption inthem, but in the > non-US version it can only enabled by a 'special cert'. So what makes it so "special?" A special CA? What happens when that special CA expires, cannot the user add/modify certs, or does everyone need to patch their MSIE (or whatever) when that happens. Matt From billh at ibag.com Wed Sep 16 01:35:26 1998 From: billh at ibag.com (William J. Hartwell) Date: Wed, 16 Sep 1998 16:35:26 +0800 Subject: fascinating quote........ Message-ID: <3.0.5.32.19980916143302.00860df0@mail.xroads.com> This was passed to me by a friend, it may have already made it here and I missed it. If so forgive the redundant post. "Yes, the president should resign. He has lied to the American people, time and time again, and betrayed their trust. Since he has admitted guilt, there is no reason to put the American people through an impeachment. He will serve absolutely no purpose in finishing out his term, the only possible solution is for the president to save some dignity and resign." - From 12th Congressional District Hopeful William Jefferson Clinton during the Nixon investigations -- William J. Hartwell (602)987-8436 Queencreek, Az. billh at ibag.com billh at interdem.com billh at hartwell.net From sunder at brainlink.com Wed Sep 16 01:36:42 1998 From: sunder at brainlink.com (Sunder) Date: Wed, 16 Sep 1998 16:36:42 +0800 Subject: Democracy... In-Reply-To: Message-ID: <36002E61.C2427AFA@brainlink.com> zebo wrote: > > Matt Elliott wrote: > > > The congress doesn't pass laws regarding marriages. > > Yet. > > Z Yes, that's the IRS's job. :^) -- =====================================Kaos=Keraunos=Kybernetos============== .+.^.+.| Sunder |Prying open my 3rd eye. So good to see |./|\. ..\|/..|sunder at sundernet.com|you once again. I thought you were |/\|/\ <--*-->| ------------------ |hiding, and you thought that I had run |\/|\/ ../|\..| "A toast to Odin, |away chasing the tail of dogma. I opened|.\|/. .+.v.+.|God of screwdrivers"|my eye and there we were.... |..... ======================= http://www.sundernet.com ========================== From 17221646 at 25050.com Wed Sep 16 16:51:46 1998 From: 17221646 at 25050.com (17221646 at 25050.com) Date: Wed, 16 Sep 1998 16:51:46 -0700 (PDT) Subject: Golf Strokes Message-ID: <93904039291232@hsd_hypothesis.com> "If i can drop my handicap 11 strokes...so can you !" Golfer: Brad Beckett CLICK HERE >> http://www.swingeez.com/ From mmotyka at lsil.com Wed Sep 16 02:07:18 1998 From: mmotyka at lsil.com (Michael Motyka) Date: Wed, 16 Sep 1998 17:07:18 +0800 Subject: Would Congress have been affected by the CDA? In-Reply-To: Message-ID: <360036D8.470B@lsil.com> Tim May wrote: > Don't forget that throughout history bluenoses and puritans have gotten off > on holding up examples of thoughtcrime. > I suppose that allows them to enjoy the material under the guise of saving the rest of us from it. Or maybe, just maybe, they want to punish somebody because they are unable to partake of the feast without feeling guilt strong enough to cause sphincter lockup. Mike From mgering at ecosystems.net Wed Sep 16 02:09:19 1998 From: mgering at ecosystems.net (Matthew James Gering) Date: Wed, 16 Sep 1998 17:09:19 +0800 Subject: Democracy... (fwd) Message-ID: <33CCFE438B9DD01192E800A024C84A19284693@mossbay.chaffeyhomes.com> > Try pantheism. If one fundamentaly believes that god does not > exist, which clearly involves faith, then yes it is a religion. Then I guess you could say that pantheism is an atheist religion, as opposed to a theist religion. My nice definition of atheism is reason over faith, science over mysticism, basically an anti-religion. While that may be etymologically unjustified, it does accurately reflect the views of the majority of people I know who call themselves atheist, myself included. Notice my brackets: a- (without) + [theos (god) + ismos (practice or doctrine)] not [a- (without) + theos (god)] + ismos (practice or doctrine) > By your view an agnostic can't be religion No, and it's not, it's like standing in the doorway of a religion, not sure whether to enter or leave, perhaps practicing but not believing. Such indecisiveness annoys me, but it accounts for the majority of the population. Matt From ravage at EINSTEIN.ssz.com Wed Sep 16 02:13:19 1998 From: ravage at EINSTEIN.ssz.com (Jim Choate) Date: Wed, 16 Sep 1998 17:13:19 +0800 Subject: Democracy... (fwd) Message-ID: <199809162238.RAA09965@einstein.ssz.com> Forwarded message: > From: Matthew James Gering > Subject: RE: Democracy... (fwd) > Date: Wed, 16 Sep 1998 15:07:37 -0700 > > Try pantheism. If one fundamentaly believes that god does not > > exist, which clearly involves faith, then yes it is a religion. > > Then I guess you could say that pantheism is an atheist religion, as > opposed to a theist religion. You could, but you'd be wrong. > My nice definition of atheism is reason over faith, science over > mysticism, basically an anti-religion. While that may be etymologically > unjustified, it does accurately reflect the views of the majority of > people I know who call themselves atheist, myself included. Atheism means that one believes that there is no God. > > By your view an agnostic can't be religion > > No, and it's not, it's like standing in the doorway of a religion, not > sure whether to enter or leave, perhaps practicing but not believing. Ah, so there are personal beliefs that aren't religion and then there are personal beliefs that are? What a self-rightous, pretentious, egotistical viewpoint. Your view is *exactly* why the 1st was put in there. > Such indecisiveness annoys me, but it accounts for the majority of the > population. Actualy not, the vast majority of people believe in God, just not your particular brand - which after all is what the 1st is all about. ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From silly at ofb.net Wed Sep 16 02:26:41 1998 From: silly at ofb.net (silly at ofb.net) Date: Wed, 16 Sep 1998 17:26:41 +0800 Subject: Democracy... In-Reply-To: <36002351.339B@pro-ns.net> Message-ID: <19980916222736.1665.qmail@ofb.net> > > The congress doesn't pass laws regarding marriages. > Yet. Not really true, IMO. Consider http://thomas.loc.gov/cgi-bin/bdquery/z?d104:HR03396:@@@L Signed into law in 1996, The Defense of Marriage Act, seeks to define "marriage" as a marriage between one man and one woman, in an attempt to prevent gay people from getting, say, married in Hawaii and then getting the same protection as other married people. Unfortunately, it it seems to be in character with the "full faith and credit" clause (Article IV, Section 1) of the U.S. Constitution, which follows "And the Congress may by general Laws prescribe the Manner in which such Acts, Records and Proceedings shall be proved, and the Effect thereof." The same rationale could be used in turning state-issued driver's licenses into National ID Cards, couldn't it? (me) From sunder at brainlink.com Wed Sep 16 02:28:13 1998 From: sunder at brainlink.com (Sunder) Date: Wed, 16 Sep 1998 17:28:13 +0800 Subject: Encrypting files. In-Reply-To: <003d01bde1a3$c848e060$7b0000c8@chrome> Message-ID: <360037C7.341AD349@brainlink.com> Lars Weitze wrote: > > Does anyone now a program for WindozeNT to store encrypted data on harddisk. > At the moment i use > ZIP-Files with a Password on them (I now it is not very secure). > I am living outside USA and do not want any software with backdoors > ,"masterkeys" or stuff like that. http://www.pcdynamics.com/SafeHouse/ -- =====================================Kaos=Keraunos=Kybernetos============== .+.^.+.| Sunder |Prying open my 3rd eye. So good to see |./|\. ..\|/..|sunder at sundernet.com|you once again. I thought you were |/\|/\ <--*-->| ------------------ |hiding, and you thought that I had run |\/|\/ ../|\..| "A toast to Odin, |away chasing the tail of dogma. I opened|.\|/. .+.v.+.|God of screwdrivers"|my eye and there we were.... |..... ======================= http://www.sundernet.com ========================== From playandwin at casino.com Wed Sep 16 17:34:46 1998 From: playandwin at casino.com (playandwin at casino.com) Date: Wed, 16 Sep 1998 17:34:46 -0700 (PDT) Subject: FREE CASINO DOLLARS!!! Message-ID: <199809170006.UAA25323@mail.scanlanhs.edu> The time has come to enjoy casino games from the comfort of your home. Find out where to play ALL of your favorite casino games online securely. Blackjack! Craps! Slot Machines! Roulette! Baccarat! & Much, Much More! The Best Odds! Huge Pay-Outs! Top-Rated Customer Service, GUARANTEED! For more information, reply below IMMEDIATELY and you will be GUARANTEED TO RECEIVE between $25 and $10,000 INSTANTLY! You need to reply today for more info and GUARANTEED acceptance. You must respond NOW at onlinefun at bigfoot.com and type "Show Me The Money" in the Subject. It's simple! All you have to do is reply to this e-mail and you will be GUARANTEED TO RECEIVE between $25 and $10,000. Just CLICK HERE onlinefun at bigfoot.com and put "Show Me The Money" in the Subject of the e-mail message. Remember, you will be GUARANTEED TO RECEIVE between $25 and $10,000! DON'T DELAY. REPLY NOW! Should you choose to be removed from this list and future mailings, reply to this e-mail with "REMOVE" in the Subject of the message. To learn more about e-mail advertising please call (416)410-2938 From ravage at EINSTEIN.ssz.com Wed Sep 16 02:44:45 1998 From: ravage at EINSTEIN.ssz.com (Jim Choate) Date: Wed, 16 Sep 1998 17:44:45 +0800 Subject: Democracy... (fwd) Message-ID: <199809162310.SAA10167@einstein.ssz.com> Forwarded message: > From: silly at ofb.net > Subject: Re: Democracy... > Date: Wed, 16 Sep 1998 15:27:36 -0700 (PDT) > > > The congress doesn't pass laws regarding marriages. > > Yet. > Not really true, IMO. Consider > > http://thomas.loc.gov/cgi-bin/bdquery/z?d104:HR03396:@@@L > > Signed into law in 1996, The Defense of Marriage Act, seeks to define > "marriage" as a marriage between one man and one woman, in an attempt to > prevent gay people from getting, say, married in Hawaii and then getting > the same protection as other married people. > > Unfortunately, it it seems to be in character with the "full faith and > credit" clause (Article IV, Section 1) of the U.S. Constitution, which > follows "And the Congress may by general Laws prescribe the > Manner in which such Acts, Records and Proceedings shall be proved, > and the Effect thereof." > > The same rationale could be used in turning state-issued driver's > licenses into National ID Cards, couldn't it? Section 1. Full Faith and Credit shall be given in each State to the public Acts, Records, and judicial Proceedings of every other State. And the Congress may by general Laws prescribe the Manner in which such Acts, Records and Proceedings shall be proved, and the Effect thereof. -------------------------------------------------------------------------- The interpetation you offer is bogus. The article says Congress shall pass what laws are deemed necessary to guarantee that the rights and priviliges of one state are enjoyed in the others. It does *NOT* say they have a right to define *what those privileges actualy are*. It has one other effect in that it prohibits safe haven states. Though it would seem to imply that once a person changed residence from one state to another and obtained citizenship in the new state some extradition could be refused... Example: Bob is living in Texas and growing pot, it is illegal. In Louisana on the other hand personal possession is allowed for quantities up to 500 lbs. Bob decides that he would rather live in Louisiana. Until Bob actualy obtained Louisiana citizenship he would still be considered a Texas resident and therefore responsible to the laws of that state. So if Texas were to extradite prior to Louisiana citizenship Bob would have to be extradited. However, once Bob became a Louisiana citizen and no longer a Texas citizen his prior actions wouldn't be extraditable. A sort of get out of jail free card. At no point is Congress given the authority to define state law, only that it must guarantee a representative form of government in each state - not that they all have to be identical. The 10th would prevent such an extension of authority. The reality is the actual law could be incredibly simple: Every state shall respect and protect the rights and priviliges of any citizen of another state who is resident within the boundaries of the state. The state shall further protect those rights even if they are in direct conflict with the laws of that state. So if a Texas DPS officer pulled over a car from Louisiana he couldn't hassle them in regards to the pot they had in the car. Even though it was illegal for Texas citizens. ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From ravage at EINSTEIN.ssz.com Wed Sep 16 02:55:17 1998 From: ravage at EINSTEIN.ssz.com (Jim Choate) Date: Wed, 16 Sep 1998 17:55:17 +0800 Subject: Democracy... - an extension of speculation Message-ID: <199809162318.SAA10229@einstein.ssz.com> Forwarded message: [related stuff deleted] > Every state shall respect and protect the rights and priviliges of any > citizen of another state who is resident within the boundaries of the state. > The state shall further protect those rights even if they are in direct > conflict with the laws of that state. > > So if a Texas DPS officer pulled over a car from Louisiana he couldn't > hassle them in regards to the pot they had in the car. Even though it was > illegal for Texas citizens. One way that Texas could address this issue is that the instant somebody enters the state of Texas they are instant citizens. The downside is that they could then vote. This leads to the potential of having persons spin-loop through states gaining citizenship and voting. So Texas would probably require 30 days or such, retaining the original intent of the Constitution and the Amendments. The founding fathers were strong believes in voting with ones feet in regards discussion and expression of personal beliefs. The United States are supposed to be a haven for personal freedom. ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From 09644775KG at fiberia.com Wed Sep 16 18:04:21 1998 From: 09644775KG at fiberia.com (09644775KG at fiberia.com) Date: Wed, 16 Sep 1998 18:04:21 -0700 (PDT) Subject: PLEASE CONSIDER THIS TERRIFIC HOME BUSINESS ! Message-ID: <987883301KV4499.cyclone.net>

From nnburk at cobain.HDC.NET Fri Sep 18 03:46:39 1998 From: nnburk at cobain.HDC.NET (nnburk) Date: Fri, 18 Sep 1998 18:46:39 +0800 Subject: Navajo Code Talkers Message-ID: <36030CB8.2DD@yankton.com> The History Channel will broadcast an episode on the role of Navajo Code Talkers in WWII tonight at 8pm EST. From mmotyka at lsil.com Fri Sep 18 03:54:20 1998 From: mmotyka at lsil.com (Michael Motyka) Date: Fri, 18 Sep 1998 18:54:20 +0800 Subject: Democracy... (fwd) The Nature of Religion In-Reply-To: <33CCFE438B9DD01192E800A024C84A192846AD@mossbay.chaffeyhomes.com> Message-ID: <3602F345.5BBD@lsil.com> Michael Hohensee wrote: > So you do believe (or at least act under the assumption) that the > universe is real, then? ;) > Don't know, don't trust anyone else's answer therefore don't really care about the question. I'll contemplate it while sitting by the pool ( still at 88 degrees without a heater! ) after lots of margaritas. NYU, eh. Whether this is all real or I'm just a brain in a tank somewhere playing every part and doing props too, I love the restaurant hunting in The City. I can't take the population density for too many days in a row but it's *great* for a visit. Crack dealers still operating openly in WSP? Mike From ravage at EINSTEIN.ssz.com Fri Sep 18 03:55:08 1998 From: ravage at EINSTEIN.ssz.com (Jim Choate) Date: Fri, 18 Sep 1998 18:55:08 +0800 Subject: [Fwd: Petition for Redress] (fwd) Message-ID: <199809190022.TAA06495@einstein.ssz.com> Forwarded message: >From APFN at netbox.com Fri Sep 18 18:05:19 1998 Message-ID: <3602D946.291104DC at netbox.com> Date: Fri, 18 Sep 1998 15:05:58 -0700 From: American Patriot Friends Network Reply-To: APFN at netbox.com Organization: American Patriot Friends Network X-Mailer: Mozilla 4.05 [en] (Win95; I) MIME-Version: 1.0 To: "\"apfn at onelist.com\"" Subject: [Fwd: Petition for Redress] Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit The question is, "Are we a nation of law?" // Yes // No // You are either on one side or the other, there is no in-between! Without Justice, there is JUST_US! http://www.freeyellow.com/members5/apfn/ Subject: [Fwd: Petition for Redress] Date: Fri, 18 Sep 1998 14:47:01 -0700 From: American Patriot Friends Network Organization: American Patriot Friends Network To: lorraine at pioche.com Re: http://www.independentamericans.org/redress.htm Petition for Redress Re: below info... Subj: Plan to Restore... (APFN Web Page) Can you please add this link to that APFN page... http://www.esotericworldnews.com/planto.htm --------------------------------------------------------------------- Subject: [TheEagle-L] Fwd: Petition for Redress Date: Fri, 18 Sep 1998 16:49:20 EDT From: Sagitt1 at aol.com Reply-To: theeagle-l at egroups.com To: slane at moment.net, texnat57 at gateway.net, dream at bga.com, TFIJDSHOW at aol.com, TBS , TBS , TBS , TBS , TBS , TBS , truelaw at swbell.net, LORDFOUL28 at aol.com, syncro2 at flash.net, singer at ccms.net, mltaylor at freewwweb.com, Misty1941 at aol.com, msf at texas.net, gene.ritter at mci2000.com, S62140Y at aol.com, PLanders at interserv.com, Jbyrd2 at acad.stedwards.edu, patricia.warfel at austin.ppdi.com CC: ANOTHER PATRIOT , "Archibald Roberts Col." , BioFractal at aol.com, CENTRAL ALABAMA MILITIA , Frances L Hartge , Militia264 at aol.com, JOHN DI NIARDO , Medesec at aol.com, "Mike & LaurieO'Donnell" , MilitiaNet at aol.com, "mrbill888 at ycsi.net" , Patricia Neill , SCOTTSDALE , "snoball at idt.net" , SOUTHSANDY at aol.com, "spiff at netusa1.net" , TheVizor at aol.com, Yechiel Mann , HRomero at X25.net, tate , Nicholas , Hoosier Reb , Rosie , Norseman , Wolfeyes , Partridge , Matlock111 at aol.com If anyone out there is from Ohio...please respond to Lainnie, please. In a message dated 9/18/98 3:42:37 PM Central Daylight Time, lainnie at zoomnet.net writes: << I have a question and maybe someone out there can help me. I live in Southern Ohio.......and I have been thinking about trying to get an e-mail list going with others from Southern OHIO......to receive and exchange information on issues that involve the mistreatment of the people of S. Oh. by the systems.....political,human services,courts ,jails Constitutional issues etc. I am new at this and really have very little idea of how to go about establishing this e-mail connection. Is there anyone out there that can give suggestions or advice ? I'd appreciate so much your assistence. lainnie >> --------------------------------------------------------------------- Subject: Re: Petition for Redress Date: Fri, 18 Sep 1998 16:42:25 -0400 (EDT) From: lainnie at zoomnet.net To: Sagitt1 at aol.com At 04:19 PM 9/18/98 EDT, you wrote: >You must all go to this web site and read this heart wrenching powerful >Redress. If this doesn't get you off your couch, you are already dead. > >http://www.independentamericans.org/redress.htm >Petition for Redress >http://www.independentamericans.org/redress.htm > >Excellent..........just excellent! I have a question and maybe someone out there can help me. I live in Southern Ohio.......and I have been thinking about trying to get an e-mail list going with others from Southern OHIO......to recieve and exchange information on issues that involve the mistreatment of the people of S. Oh. by the systems.....political,human services,courts, jails Constitutional issues etc. I am new at this and really have very little idea of how to go about establishing this e-mail connection. Is there anyone out there that can give suggestions or advice ? I'd appreciate so much your assistence. lainnie Media & Patriot Web Pages: (Bookmark) http://home.rica.net/CaptainNemo/pers/patsites.htm APFN http://www.freeyellow.com/members5/apfn/ ---------------------------------------------------------------------- CONTACTING CONGRESS: +++ CONGRESS +++ U.S. CONGRESS - CALL 1-800-504-0031 OR 202-224-3121 1-800-343-3222 >The new number is: 1-800-361-5222 (90001). When you call the number, > follow the prompts. When asked for your 5 letter zip code, enter the > number 90001. You will be connected to the main capitol switchboard. > Just ask for the congressman or the senator you wish to speak to. If you > enter your home zip code, you will be connected directly to your > Congress "CRITTER". (Congressman or Senator)Posted:08/11/98 Contact Congress via the net - Elected Net: http://www.hoboes.com/html/Politics/electednet/ Netline To Congress - Question of the Day http://www.netline-to-congress.com/ The Best Congress Money Can Buy http://mojones.com/COINOP_CONGRESS/data_viewer/data_viewer.html SENATE: http://www.senate.gov SENATE EMAIL ADDRESS: http://www.senate.gov/senator/membmail.html http://www.senate.gov/senator/state.html Senate Judiciary Committee members with contact information: http://www.senate.gov/committee/judiciary.html Senate - send email: http://www.freecongress.org/jsmp/ContactSenators.htm *** Letter to Senators: http://members.foothills.net/ricefile/index.html HOUSE OF REPRESENTATIVES - http://www.house.gov House Of Representatives (EMAIL) http://www.house.gov/writerep/ House Judiciary Committee members with contact information: http://www.house.gov/judiciary/mem105.htm HOUSE AS THE SPEAKER http://speakernews.house.gov/asknewt/ QUICK SEARCH TEXT OF BILLS 105th CONGRESS: http://thomas.loc.gov/home/thomas.html?66,9 HOUSE - DOWNLOADING BILL TEXT http://thomas.loc.gov/home/billdwnloadhelp.html CONTRACTING CONGRESS http://www.visi.com/juan/congress/ ----------------------------------------------------------------The moderator of the apfn at egroups.com group would like to invite you to join the group. Reply-To: apfn-req-s6a1 at egroups.com If you join, you can read group messages in your e-mail in-box or on the Web. http://www.eGroups.com/list/apfn/ To accept this invitation, please use the "Send Reply" to apfn-req-s6a1 at egroups.com send back a blank message. Or you can accept by going to this Web location: http://www.egroups.com/subscribe?list=apfn&vcode=6a1 If you have questions, please feel free to contact the moderator of this group at apfn at netbox.com or visit http://www.eGroups.com/info/help.html "There can't be a crisis next week. My schedule is already full." ~ Henry Kissinger ~ *=======================================================================* "It's the action, not the fruit of the action, that's important. You have to do the right thing. It may not be in your power, may not be in your time, that there'll be any fruit. But that doesn't mean you stop doing the right thing. You may never know what results come from your action. But if you do nothing, there will be no result." -Gandhi *=======================================================================* 1 if by land, 2 if by sea. Paul Revere - encryption 1775 From ravage at EINSTEIN.ssz.com Fri Sep 18 04:29:06 1998 From: ravage at EINSTEIN.ssz.com (Jim Choate) Date: Fri, 18 Sep 1998 19:29:06 +0800 Subject: Reno in contempt of Congress? [CNN] Message-ID: <199809190054.TAA06601@einstein.ssz.com> Forwarded message: > X-within-URL: http://www.cnn.com/ALLPOLITICS/stories/1998/09/17/reno.burton/ > WASHINGTON (AllPolitics, Sept. 17) -- Rep. Dan Burton (R-Ind.) said > Thursday he intends to ask the full House to cite Attorney General > Janet Reno for contempt of Congress for refusing to turn over internal > documents related to the Justice Department's investigation into > alleged fund-raising irregularities during the 1996 election > campaign.. Burton Rep. Dan Burton > > Burton chairs the House Reform and Oversight Committee, which has been > conducting its own investigation into allegations of campaign finance > abuses. > > In response, Reno said she was "disappointed" that Burton was pressing > ahead with a contempt citation, saying that she had made > "extraordinary accommodations" to supply Burton's committee with > information about the Justice Department's probe. [text deleted] ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From nobody at replay.com Fri Sep 18 05:00:50 1998 From: nobody at replay.com (Anonymous) Date: Fri, 18 Sep 1998 20:00:50 +0800 Subject: Calif Leads US with Mobile Tracker Message-ID: <199809190059.CAA27983@replay.com> On Fri, 18 Sep 1998, John Young wrote: > > Thanks to John Gilmore. > > > http://www.msnbc.com/local/KNBC/14920.asp > > CHP introduces cellular-friendly 911 system > > Operators will now be able to capture the > telephone number and location of the caller > within a half-block area While I understand the implications and outrage here, anybody who uses cellular phones as a measure of security is a total idiot. The connections usually aren't encrypted, they're radiated to the rest of the area, and your position can be triangulated (half-ass) if nothing else. With that in mind, maybe this one is actually legitimate. If criminals and/or patriots are that stupid, they'll get caught for something else like driving drunk two states away. From nobody at remailer.ch Fri Sep 18 05:21:06 1998 From: nobody at remailer.ch (Anonymous) Date: Fri, 18 Sep 1998 20:21:06 +0800 Subject: Cyberpunks Signal-to-Noise Ratio Message-ID: <19980919012849.4800.qmail@hades.rpini.com> Quoting Tim May (tcmay at got.net): > And that proceeds in spurts, not surprisingly, as topics come to the fore. Are you seriously advocating further discussion of Clinton's penis? From rah at shipwright.com Fri Sep 18 06:30:20 1998 From: rah at shipwright.com (Robert Hettinga) Date: Fri, 18 Sep 1998 21:30:20 +0800 Subject: BAN DOGS.. In-Reply-To: Message-ID: All of this reminds me of my favorite Vinnie Moscaritolo quote: "If we could just pass a few more laws, we could *all* be criminals!" :-). Cheers, Bob Hettinga ----------------- Robert A. Hettinga Philodox Financial Technology Evangelism 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From rah at shipwright.com Fri Sep 18 06:30:22 1998 From: rah at shipwright.com (Robert Hettinga) Date: Fri, 18 Sep 1998 21:30:22 +0800 Subject: Cyberpunks Signal-to-Noise Ratio In-Reply-To: <19980919012849.4800.qmail@hades.rpini.com> Message-ID: At 9:28 PM -0400 on 9/18/98, Anonymous wrote: > Quoting Tim May (tcmay at got.net): > > And that proceeds in spurts, not surprisingly, as topics come to the fore. > Are you seriously advocating further discussion of Clinton's penis? Hmmm... Speaking of noise to signal, I feel a, um, cascade, um, coming on... ----------------- Robert A. Hettinga Philodox Financial Technology Evangelism 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From Whtsametau at aol.com Fri Sep 18 07:06:00 1998 From: Whtsametau at aol.com (Whtsametau at aol.com) Date: Fri, 18 Sep 1998 22:06:00 +0800 Subject: Guess Who! Message-ID: <58adfa62.36031df2@aol.com> It's Me! Stan! I need technical advice this time. How does one write to a newsgroup via e- mail? Thanks in advance, cyphers! And check out my Brave Combo discography again, I'm sure I've had some interesting upgrades since I was last here, Stan Rosenthal, Stan and the Sequencers members.aol.com/StanSqncrs/ Stan's Brave Combo discography members.aol.com/whtsametau/BraveCombo/ From inform at trustedsystems.com Fri Sep 18 07:06:48 1998 From: inform at trustedsystems.com (inform at trustedsystems.com) Date: Fri, 18 Sep 1998 22:06:48 +0800 Subject: Trusted Systems Services Newsletter Message-ID: <199809190303.WAA24054@duracef.shout.net> *************************************************************** ************* Trusted Systems Services Newsletter ************* 17 September 98 http://www.trustedsystems.com Thanks for your past interest in Trusted Systems Services. We�ve sincerely been overwhelmed by the response to our "Windows NT Security Guidelines Report for NSA Research" give-away as well as our Super CACLS networking administrators software tool and wanted to let you know what we�ve been up to lately. ** Addenda & Errata Web Site for Windows NT Security Guidelines ** Super CACLS Report ** Advanced Checker Status Report (formerly known as Checker or Super Checker) ** Trusted Systems Services Selected by Microsoft To Review Configurations for Securing Windows NT We�d like to send occasional announcements, but if you want to be removed from our list, please tell us. (To unsubscribe, just send a reply to this e-mail with the word "unsubscribe" as the Subject.) *************************************************************** ADDENDA & ERRATA WEB SITE FOR WINDOWS NT SECURITY GUIDELINES We now have an Addendad and Errata web page for our Windows NT Security Guidelines. We highly recommend you periodically visit this page, especially if you are actively using these guidelines. Some of the addenda topics include "Limiting Installers in the WINNT & Registry ACL Settings," "Minimizing Services & Stolen Service Password," and "Software Installation that "Moves" New Items into Protected Directories." http://www.trustedsystems.com/NSAGuideAdd.htm *************************************************************** SUPER CACLS REPORT The latest version of Super CACLS is version 2.52. If you�ve licensed an earlier version, you can receive a free upgrade from our web site by using your update code. Trusted Systems Services (and Super CACLS) have been selected to be a security sponsor of the upcoming 1998 Compaq Grand Slam Tennis Cup to be held in Munich, Germany this month. Super CACLS was used to set up the network for all journalists in the Olympic Hall. Stefan Werner, Chief Technical Officer for this event said, "We like Super CACLS because of its enhanced and easy-to-use features in modifying ACLs for securing NT-mass-rollouts." If you haven�t tried Super CACLS, you�re invited to try our full demo available at : http://www.trustedsystems.com/SCACLSMain.htm *************************************************************** ADVANCED CHECKER STATUS REPORT (formerly known as Checker or Super Checker) Our newest networking security tool, Advanced Checker, is in the formal testing phase. Advanced Checker is a fully-featured, programmable scripting language that checks, and in some cases corrects, the security attributes of a Windows NT Server or Workstation. Advanced Checker lets you create simple "scripts" in text files using any text editor. You then run Advanced Checker which reads the scripts and performs its security checks. The security parameters it checks include the ACL�s of files and directories on NTFS file systems, Registry keys and share directories, audit SACL�s, registry values, audit policy, rights policy and more. We believe that Advanced Checker will fundamentally change the way that beginning and especially advanced networking administrators monitor and manage the security of their networks. It gives you unprecedented power and flexibility in an easy-to-use package that we are committed to expand and improve through feedback from our customers. We hope you�ll give this product a try when it debuts later this year. For a complete description: http://www.trustedsystems.com/AdvancedChecker.htm *************************************************************** TSS SELECTED BY MICROSOFT TO REVIEW CONFIGURATIONS FOR SECURING WINDOWS NT URBANA, IL September 1, 1998 Trusted Systems Services, Inc. announced today that Microsoft has selected them to perform an independent, detailed review and analysis of the recommended Security Configurations for securing Windows NT-based systems. TSS will undertake a thorough analysis of the broad range of Windows NT-based systems security settings that typical users of Windows NT apply to secure their systems. These recommendations will help administrators to secure their Windows NT-based systems using the Security Configuration Editor tool that is part of Windows NT 4.0 Service Pack 4. "Trusted Systems has practical experience in securing Windows NT-based systems," said Peter Brundrett, Windows NT Security Program Manager at Microsoft Corp. "Our customers will be able to use the results of this analysis to secure their Windows NT-based systems." For the complete press release, go to: http://www.trustedsystems.com/SCTS.htm *************************************************************** This message was sent to you by Advanced Checker. From nobody at replay.com Fri Sep 18 09:05:40 1998 From: nobody at replay.com (Anonymous) Date: Sat, 19 Sep 1998 00:05:40 +0800 Subject: No Subject Message-ID: <199809190501.HAA12423@replay.com> So I fly home Friday from San Jose. Probably because I was in a hurry, after walking through the magnetometer and x-raying my stuff, a security dude grabbed my laptop and said he wanted to 'analyze' it. Yeah sure whatever, I decided not to protest I was late for my flight. This analysis, it turned out, was wiping a coffee filter over the strap of its bag, and sticking the coffee filter into a slot on a machine. No solvent even. The machine had columns labelled TNT RDX NITRO PETN HMX. I recognized the first four as high explosives. Later, I wondered if people with angina (who take nitro orally) ever set this off. Most of them, of course, are not bearded eastern-european/semetic guys in their 30's who look worried and in a hurry. Anyway, that was it, and I made my flight. Didn't even open the laptop's case. The machine name was ION-something; I wonder whether it sucked vapors from the fiber disk or whether it was a neutron-spectrometer (?) device. (Had this been a UK Customs 'inspection' of the contents of the disk, I might have had to explain the half-gig of "noise" I have on the disk. Only, it really is noise. Really.) Anyway, the moral of the story: Don't store your laptop with your explosives :-) From bill.stewart at pobox.com Fri Sep 18 09:27:24 1998 From: bill.stewart at pobox.com (Bill Stewart) Date: Sat, 19 Sep 1998 00:27:24 +0800 Subject: Mailboxes and Pseudonyms In-Reply-To: <33CCFE438B9DD01192E800A024C84A192846AF@mossbay.chaffeyhomes.com> Message-ID: <3.0.5.32.19980918093301.008e83c0@idiom.com> At 11:56 AM 9/17/98 -0700, Matthew James Gering wrote: > BTW, why are most businesses so hostile to pseudonyms? > I go to rent a mailbox, paid 1 yr. in advance with cash, > and they still want two pieces of photo ID to copy. Where do you live? In the US, the Post Office has rules against anybody running mailbox services without making sure that the customers sign some forms - you not only have to acknowledge that the Post Office doesn't forward first class mail addressed to mailbox companies (semi-reasonable), but also (unreasonably) demonstrate to the Post Office's satisfaction that you really are the you living at some other location and you don't mind having mail addressed to you sent to this mailbox. Exactly what that means is up to the local Postmaster; one town where I've rented a mailbox really doesn't care, and another had a control freak Postmistress. But if you live in California, it's worse. There was a law passed in about 1994 (AB185 or AB187?) that asserted that 1) Many businesses in California are run from mailboxes 2) Many businesses in California have committed fraud 3) Therefore, we'll force anybody who rents a mailbox, business or not, to identify their True Name and True Address and appoint the mailbox service as an agent for service of process so we can bust them in case they use the mailbox for fraud. The wording of the law was actually more blatantly annoying than that. The exact amount of ID you have to produce is tied to the local Post Office regulations, but also requires a picture ID. The PO will accept major credit cards and SSN cards as ID, and my mailbox vendor didn't really want either of those, because she didn't want the liability of having private financial data around in a file she has to keep readily accessible for inspection. A year or two ago, California was also having problems with women who were battered or otherwise trying to avoid violent ex-husbands and ex-boyfriends being tracked to where they lived through their mailbox addresses, and some legislator was pushing a program that would get Certified Endangered Women a mailbox using some kind of cutout program that would give them some privacy. Would have made much more sense just to dump the recent law, so everybody could have some privacy. Thanks! Bill Bill Stewart, bill.stewart at pobox.com PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639 From nobody at replay.com Fri Sep 18 09:30:28 1998 From: nobody at replay.com (Anonymous) Date: Sat, 19 Sep 1998 00:30:28 +0800 Subject: No Subject Message-ID: <199809190527.HAA13780@replay.com> Is anybody on this list form one of these nations just out of curiosity? Iran, Iraq,Libya, Syria,Sudan, North Korea and Cuba. I would find it funny considering the exemption made for them in the new crypto policy :) From pooh at efga.org Fri Sep 18 09:46:11 1998 From: pooh at efga.org (Robert A. Costner) Date: Sat, 19 Sep 1998 00:46:11 +0800 Subject: Airline security searches In-Reply-To: <199809190501.HAA12423@replay.com> Message-ID: <3.0.3.32.19980919014810.035277ec@mail.atl.bellsouth.net> At 07:01 AM 9/19/98 +0200, Anonymous wrote: >This analysis, it turned out, was wiping a coffee filter over the strap >of its bag, and sticking the coffee filter into a slot on a machine. >No solvent even. The machine had columns labelled TNT RDX NITRO PETN HMX. >I recognized the first four as high explosives. Later, I wondered >if people with angina (who take nitro orally) ever set this off. >Most of them, of course, are not bearded eastern-european/semetic >guys in their 30's who look worried and in a hurry. I didn't take a close look at the process, but I had this happen to me on a flight headed towards San Jose using America West. They did the chemical screen here in Atlanta airport. I'm white, normal looking Atlanta guy, but they said at the ticket counter they were doing random searches, handed me a piece of paper, and said I would get my boarding pass after I was checked. -- Robert Costner Phone: (770) 512-8746 Electronic Frontiers Georgia mailto:pooh at efga.org http://www.efga.org/ run PGP 5.0 for my public key From nobody at replay.com Fri Sep 18 10:09:26 1998 From: nobody at replay.com (Anonymous) Date: Sat, 19 Sep 1998 01:09:26 +0800 Subject: No Subject Message-ID: <199809190609.IAA16339@replay.com> >a security dude grabbed my laptop and said he wanted >to 'analyze' it. Yeah sure whatever, I decided not to protest >I was late for my flight. >This analysis, it turned out, was wiping a coffee filter over the strap >of its bag, and sticking the coffee filter into a slot on a machine. >No solvent even. The machine had columns labelled TNT RDX NITRO PETN HMX. ..... >The machine name was ION-something; I wonder whether it sucked vapors >from the fiber disk or whether it was a neutron-spectrometer (?) device. Try asking them where they've posted the California Prop 65 warning indicating which toxic chemicals are used in the system :-) From frantz at netcom.com Fri Sep 18 10:26:46 1998 From: frantz at netcom.com (Bill Frantz) Date: Sat, 19 Sep 1998 01:26:46 +0800 Subject: Questions for Magaziner? In-Reply-To: Message-ID: At 8:38 PM -0800 9/17/98, Robert Hettinga wrote: >Anyway, In light of more recent crypto-shenanigans from Billary, and the >fact that this thing's a small crowd, I figured I'd ask if anyone on these >lists had a question they wanted me to ask him. Probably a bit late, but I would ask, "If the government is going to require GAK, how is it going to demonstrate that all the keys is accessed were accessed according to legal proceedings?" Another way of asking is, "How do we ensure that all government accesses to keys become publicly known within a reasonable amount of time." (I would define reasonable as much less than 5 years.) (I've been reading David Brin's "The Transparent Society".) ------------------------------------------------------------------------- Bill Frantz | If hate must be my prison | Periwinkle -- Consulting (408)356-8506 | lock, then love must be | 16345 Englewood Ave. frantz at netcom.com | the key. - Phil Ochs | Los Gatos, CA 95032, USA From nobody at earth.wazoo.com Fri Sep 18 10:31:24 1998 From: nobody at earth.wazoo.com (Anonymous) Date: Sat, 19 Sep 1998 01:31:24 +0800 Subject: No Subject In-Reply-To: <199809190527.HAA13780@replay.com> Message-ID: <199809190626.GAA09380@earth.wazoo.com> > Is anybody on this list form one of these nations just out of > curiosity? > Iran, Iraq,Libya, Syria,Sudan, North Korea and Cuba. Yes. From jim at smallworks.com Fri Sep 18 10:36:55 1998 From: jim at smallworks.com (Jim Thompson) Date: Sat, 19 Sep 1998 01:36:55 +0800 Subject: Oh my God... Message-ID: <002d01bde375$d5f31b80$7c7ecfc0@stewart.smallworks.com> Forgive me if this has been covered on cypherpunks. I hang out on coderpunks, and this is far too political for that list. Please keep me Cc'd on any discussion on this topic. If true, RSA is dirty, SDI is dirty, Robertson Stevens is dirty, and Ron Brown, Jim Bizdos, Al Gore, John Huang and Sanford Robertson are going to jail. http://www.worldnetdaily.com/smith/980915.comcs.html Jim Thompson / Smallworks, Inc. / jim at smallworks.com 512 338 0619 phone / 512 338 0625 fax C++ is like jamming a helicopter inside a Miata and expecting some sort of improvement. -- Drew Olbrich -------------- next part -------------- A non-text attachment was scrubbed... Name: bin00006.bin Type: application/octet-stream Size: 2027 bytes Desc: "smime.p7s" URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: bin00005.bin Type: application/octet-stream Size: 340 bytes Desc: "Jim Thompson.vcf" URL: From Whtsametau at aol.com Fri Sep 18 10:50:35 1998 From: Whtsametau at aol.com (Whtsametau at aol.com) Date: Sat, 19 Sep 1998 01:50:35 +0800 Subject: It's Nobody's Business! Message-ID: I see things haven't changed much around here. [BIG GRIN!] Stan, bass/vocals Nobody's Business members.aol.com/StanSqncrs/nobiz.html From nobody at replay.com Fri Sep 18 11:22:02 1998 From: nobody at replay.com (Anonymous) Date: Sat, 19 Sep 1998 02:22:02 +0800 Subject: Cyberpunks Signal-to-Noise Ratio Message-ID: <199809190724.JAA20244@replay.com> Isn't it in bad form to filter the Cypherpunk anonymous remailers on the cypherpunk list? ---Matthew James Gering wrote: > > What! I can't hear you! > > You could always filter *aol*, *anon* and *sixdegrees*. > > Or shout louder (i.e. contribute signal). > > Matt From best25 at worldonline.nl Sat Sep 19 03:56:26 1998 From: best25 at worldonline.nl (best25 at worldonline.nl) Date: Sat, 19 Sep 1998 03:56:26 -0700 (PDT) Subject: Ground Floor Pre-IPO Opportunity Message-ID: <199809191057.GAA25805@nebula.hjford.com> Most Wall Street investors cannot participate on the upside of an IPO since the investment firms reserve the stock for themselves. Get the scoop and learn how to target these companies before they trade on the NASDAQ Small Cap and Bulletin Board. REMEMBER, THE MONEY IS ALWAYS MADE GOING INTO THE DEAL. WANT MORE? Go To: Click Here From pjm at spe.com Fri Sep 18 14:16:37 1998 From: pjm at spe.com (pjm at spe.com) Date: Sat, 19 Sep 1998 05:16:37 +0800 Subject: atheism (was: RE: Democracy... (fwd)) In-Reply-To: <199809171915.OAA15655@einstein.ssz.com> Message-ID: <6485-Sat19Sep1998112432+0200-pjm@spe.com> Jim Choate writes: [ . . . ] > A personal philosophy is a religion, different words but same idea. If your > thesis is that for something to be a religion it requires some sort of > social approval you miss the whole point. Even Jesus recognized that a > persons religion didn't rely on a 'church' and the implied infrastructure. > This is the reason he told his listeners to pray in a closet alone. Not all philosophies are religions. Asserting so is an attempt to make one or both of the terms meaningless. > > There is no reason to think that a god does exist, so why would one even > > need to think about or believe in the negative. > > There is no reason to believe one doesn't either. If we take your claim at [ . . . ] There are two forms of atheism (visit alt.atheism.moderated for an unending discussion). "Strong" atheists state that they "believe that god does not exist." "Weak" atheists state that they "do not believe that god exists." The first is a faith based positive assertion, analogous to "god exists". The second makes no assertion and hence has no associated burden of proof. Given the lack of evidence for the existence of a god, it is the default, logical position. Do you believe in leprechauns, because there is no proof that they don't exist? Do you believe in the Hindu pantheon? [ . . . ] > Ah, another of your mistakes. Religion and by extension faith are not > constrained by reason or logic. It's this realisation that puts some > issues and aspect of human inquiry outside of the reach of science, logic, > etc. Without reason and logic, how do you propose to prove these assertions? Reason and logic don't "constrain", they provide a framework for discovery. This framework is unavailable to, and indeed actively rejected by, believers in the supernatural. Any meaningful definition of the word "inquiry" presupposes the use of logic. > No, only some religions are irrational. The point you're missing is not > one of rationality or irrationality but rather transcendance. All faith-based assertions are by definition irrational. Mystics frequently speak of transcendence as if the word denotes a concept with a particular meaning, but never provide a coherent definition. Perhaps you'll surprise me? Regards, pjm From aba at dcs.ex.ac.uk Fri Sep 18 15:13:33 1998 From: aba at dcs.ex.ac.uk (Adam Back) Date: Sat, 19 Sep 1998 06:13:33 +0800 Subject: CHALLENGE? Toto/signature attack w. unpublished public key Message-ID: <199809191052.LAA19676@server.eternity.org> This post discusses the possibility of generating a RSA public key n, and e given a signature s on a message m creating using an unknown (unpublished) n and e. A message and signature whose validity has some bearing on a current IRS investigation is given as a target for an attack if such an attack is feasible. Toto published one signed message [1] but not a public key for the signature. It seems to me that there should be other public keys which one could generate which could have signed the same message. I would like comments on the feasibility of the signature attack proposed below, and suggestions for more efficient methods. (For those not following the Toto saga, he was the author of a series of anti-government rants and future fiction stories on cypherpunks. The posting of [1] to the list seems to have been deemed a handy excuse for the IRS to arrange Carl Johnson's incarceration See: http://jya.com/cejfiles.htm. They claim that the presence of a public key on Carl Johnson's hard disk proves that he authored the post in question [1].) What we have is: Unknowns: e, n, d Knowns: m, s Where m = padding || md5( message ) A signature is computed as: s = m ^ d mod n and verified by checking that: s ^ e mod n = m ( where RSA says: n = p.q, d.e = 1 mod (p-1).(q-1) ) We are trying to find an n and an e which satisfy s ^ e mod n = m, with the additional constraints that log2( n ) = 1024 and n > s (because we have the signature s, and it is 1024 bits in length). For bonus points it would be nice for n mod 2^64 = 0xCE56A4072541C535, which is the key-id in the signature. (I say bonus points because the key-id in the signature is not authenticated, or included in the message digest, so could have been for example edited after the signature was made, or filled with random numbers for whatever reason). Tinkering with PGP I can extract the values for the knowns: s = 0x08F4D5CBC10063725B206F787EB7370BBD0C5B4854CE79A9007D1801AEAEE6E6 D2C68D7EDF877FECE1FA539D08BEC54BD152BA05113951E8A84CDECAD2CB8E7A C28BE916570BA7BB9C00C64DF57113C4AE81613BD351541523CD3A028FBF220E F7469BD4175302DCB5B6E886974877F28A2D301433AFFFE26081008BFF687B37 m = 0x0001FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF003020 300C06082A864886F70D0205050004105A82A30F832DC6839C20DD6DB2EF783B (the 00 01 FF .. FF 00 are the PKCS#7 required padding, then the 3020300c06082a864886f70d020505000410 is the ASN padding indicating various PKCS #7 cruft, and 5A82A30F832DC6839C20DD6DB2EF783B is the digest of the message (which includes some of the info in the signature block: timestamp, signature type, etc)) So next we would like to solve: s ^ e mod n = m or in other words find e, k and n st: s ^ e - m = k * n I have been trying to factor f3 = s ^ e - m for e = 3, and can get factors: f = 2 2 5 11 17 26496937 and 251048771208077840279253039518619486761149393656018551881762776705901\ 323868599665917317036581098944533770815064901485649759588104677561495\ 719846643046535204246014520276297740544890135011586884286882393788265\ 716989378535974685125268132766806309723740928058713253950594405611241\ 121342427851929130344133177905256374336176401503386547907484013668011\ 870701681839150463738400849274433891413410494500220449307074230633487\ 686485522732190007426023068542565670710414256907678005650439818373128\ 045462081252984434043133357326332595300178784873354995536385391488171\ 082297914170316457453668703759313538562865586078736676571820284813613\ 435988240345557012477625002576044754861439307189875911957770722297269\ 127365840009630893296289725097984631185778357339553526670628683341222\ 179800672224971064029655723085468566526546006022122686584662976524189\ 679277675211381453870834486124773894995875790430641434242560016378644\ 4039359130261 (I call the f resulting from choosing e = 3, f3, other e values can be denoted f5, f7, etc). It seems to me that if we can get get a factor out (or construct a composite from factors) which is greater than s, and is 1024 bits long, then this "key" could have signed the message in question. If the number has 2 or more factors, which we know because we constructed it by multiplying them, then we could even "sign" another message with this key, by generating a d based on the p, q (and possibly other multiples) and have both messages appear to be signed by the same key. If we can get some larger factors, we stand a chance because we have the flexibility of being able to adjust a potentional n's size by multiplying by combinations of factors found so far 5 11 17 26496937. This means we can adjust n's size by adding bits by multiplying by combinations as follows combination bits added 5 2 - 3 11 3 - 4 17 4 5 11 5 - 6 5 17 6 - 7 11 17 7 - 8 26496937 24 - 25 So the challenge is to find other factors of: f = 251048771208077840279253039518619486761149393656018551881762776705901\ 323868599665917317036581098944533770815064901485649759588104677561495\ 719846643046535204246014520276297740544890135011586884286882393788265\ 716989378535974685125268132766806309723740928058713253950594405611241\ 121342427851929130344133177905256374336176401503386547907484013668011\ 870701681839150463738400849274433891413410494500220449307074230633487\ 686485522732190007426023068542565670710414256907678005650439818373128\ 045462081252984434043133357326332595300178784873354995536385391488171\ 082297914170316457453668703759313538562865586078736676571820284813613\ 435988240345557012477625002576044754861439307189875911957770722297269\ 127365840009630893296289725097984631185778357339553526670628683341222\ 179800672224971064029655723085468566526546006022122686584662976524189\ 679277675211381453870834486124773894995875790430641434242560016378644\ 4039359130261 One could also try other values for e, although they result in larger f. What is the best factoring code available to have a go at factoring the above? (I have been usign the demo pollard-rho factoring code which comes with ssh-1.2.26 in the gmp-2.0.2-ssh-2/demos directory). Anyone interested to give this a go, who has say got a few (hundred?) workstations already setup for another factoring challenge which they could divert to attack the above f3 (or f5, f7, etc). Course, if Toto is still at large, and Carl Johnson is not the only one with the key (and some messages on cypherpunks recently lend credence to this), he might trash this challenge by posting another signed message, or weaken it's value by posting a public key which proved could be shown to have been derived by this method. (Interestingly, I think merely posting a public key claiming to be the `real key' which we couldn't factor nor show to be a factor of f wouldn't prove that that key was any more legitimate than a key generated by a success on this challenge, all it would tend to show would be that the person who posted it had more compute power available than us!) Adam [1] -----BEGIN PGP SIGNED MESSAGE----- "Contrary to one famous philosopher, you're saying the medium is not the message," Judge Thomas Nelson said, alluding to the media theorist Marshall McLuhan. http://www.nytimes.com/library/cyber/week/120997encrypt-bernstein.html Bullshit! The bits and bytes of email encryption are a clear message that I wish to exercise my right to speak freely, without those who wish to do me harm invading my privacy. The death of strong encryption on the InterNet will be the global death of free speech on the InterNet. Accordingly, I feel it is necessary to make a stand and declare that I stand ready and willing to fight to the death against anyone who takes it upon themselves to try to imprison me behind an ElectroMagnetic Curtain. This includes the Ninth Distric Court judges, if they come to the conclusion that the government that they represent needs to electronically imprison their citizens 'for their own safety.' The problem: Criminals with a simple encryption program can scramble their data beyond even the government's ability to read it. http://www.zdnet.com/zdnn/content/zdnn/1208/261695.html Fuck the lame LEA pricks who whine about not being able to stop someone bringing in a planeload of drugs without being able to invade the privacy of every person on the face of the earth. Am I supposed to believe that I have knowledge of when and where major drug shipments are taking place, simply by virtue of hanging out as a musician, yet the LEA's are incapable of finding out the same information by being competent in their profession? Barf City... [I will shortly provide information for any LEA which wishes to prosecute me for my coming 'physical' death threat, on how to hunt me down like the filthy dog that I am.] "Why are you saying that the fact that [encryption] is functional takes it out of the First Amendment context?" Myron Bright, one of the judges, asked the Justice Department attorney, who was still in mid-sentence. He answered that the regulations were not aimed at suppressing speech, but only at the physical capacity of encryption to thwart government intelligence gathering. The Spanish language has the same "physical capacity." So does (:>), (;[), and {;-|). Likewise, BTW, FWIW, FYI, and my own personal favorite, YMMV (You Make Me Vomit? --or-- Your Mileage May Vary?). <-- Ambidextrous encryption. An-cay e-way pect-exay ig-pay atin-lay usts-bay of ildren-chay? Whispering also has the "physical capacity" to "thwart government intelligence gathering." When does the bullshit stop? When do we stop making the use of the Spanish language over the InterNet illegal? When do we stop making whispering, pig-latin, anagrams and acronyms illegal? When do we stop saying that our government is such a piece of crap that it is a danger to let its citizens communicate freely, in private, and share their private thoughts with one another? At one point Fletcher called the government's case "puzzling." http://www.news.com/News/Item/0,4,17114,00.html Only because her mom taught her that it was unladylike to say "Bullshit!" In arguments Monday, a Justice Department lawyer, Scott McIntosh, said the government's intent was to preserve the ability of intelligence agencies to eavesdrop on foreign governments and citizens. http://www.nytimes.com/library/cyber/week/120997encrypt-bernstein.html Let's see if I have this right... The U.S. government needs to destroy the right to free speech and right to privacy of its own citizens in order to infringe upon the human rights of the governments and citizens of other countries? Countries which already have strong encryption? Countries like Red China, which is currently engaged in encryption research with an American company who got permission to export much more diverse encryption material (after making a huge campaign donation to the Whitehouse) than Professor Bernstein will ever likely share with others? Apologies to Judge Fletcher, but that's not "puzzling." That's the same-old-same-old Bullshit! OFFICIAL 'PHYSICAL' DEATH THREAT!!! The pen is mightier than the sword. Thus, I prefer to wage my 'war to the death' against those who would stomp on my basic human rights *"in the interests of National Security"* with my electronic pen, on the InterNet, using encryption when I have reason to fear persecution by Facist, Nazi motherfuckers. [* ~~ TruthMonger Vernacular Translation ~~ "so that the government can maintain its authority over the citizens by use of force and violation of human rights, rather than going to all of the trouble of acting in a manner that will garner the citizens' respect."] I will continue to express my thoughts through the words I send electronically over the InterNet, both publically and privately. I will fight to the bandwidth death against anyone who wants to deny me my right to express my opinions and access the opinions of those who also wish to express their own opinions and share their true thoughts with their fellow humans. If the ElectronicMagnetic Curtain slams down around me, then I will have no choice but to continue my current fight in MeatSpace. And I am not alone... I will share the same 'DEATH THREAT!!!' with Judges Fletcher, Nelson and Bright that I have shared with the President and a host of Congressional and Senatorial representatives: "You can fuck some of the people all of the time, and all of the people some of the time, but you are going to end up in a body bag or a pine box before you manage to fuck all of the people all of the time." Am *I* going to whack you out? Maybe... I would prefer just dumping some tea in Boston Harbor, if that will get my message across in MeatSpace, but if it won't, then I guess I will have to take stronger action. There are undoubtedly a plethora of LEA's ready and willing to prosecute and imprison me for agreeing with Patrick Henry, who said, "Give me liberty, or give me death." The irony, of course, is that I do not pose a great danger to anyone but myself as long as I continue to have my human rights and my liberty unthreatened. The chances of me actually getting off of my fat butt and going out into the real world to whack out the enemies of freedom are probably pretty small (unless I run out of cigarettes and beer, and wouldn't have to make an extra trip). I fully understand that this does not lessen the potential of any LEA who gets a wild hair up their butt to throw a mountain of taxpayer resources into prosecuting me and imprisoning me for their own professional/political gain. However, if you are performing actions so outrageously against basic human rights and freedoms as to get me off of my lazy ass, then I am the least of your problems, because there undoubtedly are millions of people more functional than myself (who get out of the house and go further than the liquor store) who are less willing than myself to put up with increasingly heavy chains placed around their hands and feet 'in the interests of national security.' Feel free to have the Federales break down my door and imprison me for pointing out the obvious. After all, I fit the profile of a domestic terrorist--I quote the Constitution and the Bill of Rights, and I speak out against increasingly big government. But remember...it's the quiet ones you've got to watch... If you force everyone to 'be quiet', then you've got a world of trouble on your hands. Sincerly, John Gilmore ~~~~~~~~~~~~~~~~~~~~~~~~~~~ p.s. NOTICE TO LEA AGENTS IN NEED OF A CAREER BOOST! Yes, I'm just a troublemaking asshole, trying to get John Gilmore in trouble. However, if you want to go to the trouble of tracking me down, I will give you some hints, since it seems likely that anyone who has trouble finding a ton of cocaine at an airport might not be competent in CyberSpace, either. You might want to check with the Webmasters at the sites quoted above to see who has accessed their web sites this morning. The anonymous remailer I will be using is an open secret to CypherPunks around the world as a really bad attempt at disguising my true MeatSpace identity. This alone ought to be enough for some aggressive young LEA and/or federal prosecutor to earn themself some brownie-points, since I am a sorry enough son-of-a-bitch that they would not have much trouble convicting me in front of a jury of 'their' peers, assuming that they can make certain that I am not tried by a jury of my own peers. Bonus Points: I can also be tied into Jim Bell's Worldwide Conspiracy to assassinate government authorities, through my implementation of an Assassination Bot. (I am willing to 'rat out' Jim for two bottles of Scotch. If he is willing to rat _me_ out for less, then I guess it's just my hard luck, eh? <--that's another hint!) p.p.s. You can also charge me with use of 'conventional' encryption in the commission of a crime. Must be your lucky fucking day, eh? -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCVAwUBNI24Hs5WpAclQcU1AQFaggP8CPTVy8EAY3JbIG94frc3C70MW0hUznmp fRgBrq7m5tLGjX7fh3/s4fpTnQi+xUvRUroFETlR6KhM3srSy456wovpFlcLp7uc xk31cRPEroFhO9NRVBUjzToCj78iDvdGm9QXUwLctbbohpdId/KKLTAUM6//4mCB i/9oezfegWc= =4/6E -----END PGP SIGNATURE----- From ravage at EINSTEIN.ssz.com Fri Sep 18 16:59:07 1998 From: ravage at EINSTEIN.ssz.com (Jim Choate) Date: Sat, 19 Sep 1998 07:59:07 +0800 Subject: atheism (was: RE: Democracy... (fwd)) (fwd) Message-ID: <199809191325.IAA08217@einstein.ssz.com> Forwarded message: > From: pjm at spe.com > Date: Sat, 19 Sep 1998 11:24:32 +0200 > Subject: atheism (was: RE: Democracy... (fwd)) > Not all philosophies are religions. If we are talking philosophies of the range to include 'natural philosophy' (ie physics) then you are correct. Fortunately, this attempt at shifting the topic of discussion away from personal or individual philosophies relating to the relationship between individuals, God, and the cosmos won't work. This is called a straw-man. Pick an argument that you want to (dis)prove but don't know how. Then pick a similar but non-identical (or fail to prove the identity) which one knowns how to (dis)prove. Finaly claim that the second easier (since it is (dis)provable) problem is identical to the first. > Asserting so is an attempt > to make one or both of the terms meaningless. And trying to change the subject of discourse is as well. A philosophy is a set of beliefs, period. In this particular case we are discussing personal or individual philosophies and from definition and practice they are identical. Religion after all is nothing more than a set of beliefs and therefore falls under 'personal philosophy'. Just remember this, it's your ugly baby. > There are two forms of atheism (visit alt.atheism.moderated for > an unending discussion). "Strong" atheists state that they "believe > that god does not exist." "Weak" atheists state that they "do not > believe that god exists." Changing the side on which the 'do not' resides doesn't change the meaning. These two sentences are identical in content and meaning. I belive god does not exist I do not believe god exists or, ^(A) = (^A) > Do you believe in leprechauns, because there is no proof that > they don't exist? Do you believe in the Hindu pantheon? Whether I believe in them makes no difference to their existance (you really really need to quit taking drugs). This is the same sort of crap reasoning the UFO nut-cases partake in. They run around asking "Do you believe in aliens?" when the question that needs asking is "How do we prove aliens have been here?", and in many cases they take the two to be equivalent. Hindu pantheon is a different form of Pantheism that I practice. I don't agree with many of the points that Hindu, Aztec, Buddhist, New Age, etc. pantheist practice, it's too anthropocentric for my taste and in the case of New Age Pantheism (gag) they've simply given transcendance a new form. And I further believe that the Hindu practice of sweeping ants out of ones way and wearing a veil to inhibit bug inhalation is taking it too far the other way (though I respect and practice the spirit of their actions). Respect does not mean subserviance. > Without reason and logic, how do you propose to prove these > assertions? I'm not trying to prove anything, you are. I'm just blowing holes in your reasoning. > Reason and logic don't "constrain", they provide a > framework for discovery. This framework is unavailable to, and indeed > actively rejected by, believers in the supernatural. Any meaningful > definition of the word "inquiry" presupposes the use of logic. Ohhhh, supernatural is by definition in this discussion equivalent to transcendental. I'll say it again, there are two types of religion - those who believe transcendentalism exists (ie traditional religions) and those that don't (eg Pantheism). It is not reasonable nor logical to expect the natural rules of experience to be recognized by the supernatural. Now I can inquire into many things without using a particular type of logic (you keep writing as if there is only one form of logic - perhaps this is the root shortcoming in your reasoning). So trying to say that inquiry is equivalent to using logic is a misunderstanding of both inquiry and logic. The question that you are skirting around is: If God exists and created the universe, does this imply that it is constrained by that creation? You can answer that question with three answers: Yes Pantheism and some other forms of pagan religions No Traditional religions ? Agnostic (if you'd like to know, Nihilism (if you believe the question is irrelevant), etc. > All faith-based assertions are by definition irrational. Mystics > frequently speak of transcendence as if the word denotes a concept > with a particular meaning, but never provide a coherent definition. > Perhaps you'll surprise me? Transcendence is the belief that there is something more than the earthly veil. In other words, if you practice a transcendantal religion then by definition you believe in a ghost-in-the-machine of one form or another. If you like you can think of it as one set of religions believes there is purpose and reason in existance whereas others believe that it is all random dice (and yes that is a broad brush I'm painting with). ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From nobody at replay.com Fri Sep 18 17:03:27 1998 From: nobody at replay.com (Anonymous) Date: Sat, 19 Sep 1998 08:03:27 +0800 Subject: CHALLENGE? Toto/signature attack w. unpublished pub Message-ID: <199809191306.PAA04939@replay.com> What remailer is the alleged toto speaking of? > You might want to check with the Webmasters at the sites > quoted above to see who has accessed their web sites this > morning. The anonymous remailer I will be using is an open > secret to CypherPunks around the world as a really bad > attempt at disguising my true MeatSpace identity. This alone == "The same thing we do every night Pinkey, try to take over the WORLD!" - The brain _________________________________________________________ DO YOU YAHOO!? Get your free @yahoo.com address at http://mail.yahoo.com From rah at shipwright.com Fri Sep 18 17:26:26 1998 From: rah at shipwright.com (Robert Hettinga) Date: Sat, 19 Sep 1998 08:26:26 +0800 Subject: IP: Tougher laws are sought to seize cash Message-ID: --- begin forwarded text Delivered-To: ignition-point at majordomo.pobox.com X-Sender: believer at telepath.com Date: Thu, 17 Sep 1998 08:45:24 -0500 To: believer at telepath.com From: believer at telepath.com Subject: IP: Tougher laws are sought to seize cash Mime-Version: 1.0 Sender: owner-ignition-point at majordomo.pobox.com Precedence: list Reply-To: believer at telepath.com Source: Bergen (New Jersey) Record http://www.bergen.com/news/njmone199809154.htm Tougher laws are sought to seize cash Tuesday, September 15, 1998 By ADAM PIORE Washington Correspondent WASHINGTON -- Federal law enforcement officials on Monday unveiled a plan they say will help stop the flow of billions of dollars in drug money across the nation's borders every year. Hailed as a "major step forward" in the fight against money laundering, the Justice Department proposal would broaden the government's ability to seize the profits of such illicit activity as drug dealing. It now is illegal to try to leave the country with more than $10,000 in currency without reporting it to U.S. Customs officials. Violations are punishable by up to five years in prison and seizure of the money. But in June, the U.S. Supreme Court dealt a serious blow to efforts to seize the unreported cash, ruling in a precedent-setting case that such seizures often violate constitutional protections against "excessive fines." The new proposal is aimed at correcting the loopholes opened up in the June court decision. It would for the first time allow law enforcement officials to arrest people concealing currency before they even reach the border. It would allow the seizure of $10,000 or more at the nation's ports and highways -- hundreds of miles from any crossing -- if agents can prove that there is intent to smuggle the concealed money out of the country. But it goes beyond that, giving agencies tools they have not had in the fight to stop the flow of illegal drug profits out of the country, said Stefan D. Cassella, the assistant chief of the money-laundering and forfeiture section of the U.S. Department of Justice. "This is a major step forward to address a new problem," Cassella said. "We know that the covert movement of currency across borders is indicative and inherently related to criminal activity." Civil libertarians condemned the proposed law, which the Justice Department sent to Congress on Monday, because they said it would expand the ability of law enforcement agencies to seize currency and keep it. A series published in The Record this year revealed how New Jersey, with its sprawling seaport, international airport, lax laws, and proximity to New York and Philadelphia, had emerged as a hub for money laundering and currency smuggling over the past 15 years. Cassella said the decision to push for the more stringent laws was inspired in part by The Record's stories. In its letter to Congress, the Justice Department cited the series as evidence of the growing problem in currency smuggling. The proposed law would give officials the ability to go after a wider range of smuggling that has been difficult for them to stop. Every year, for instance, billions of dollars in illegal drug profits is smuggled across the border unchecked, crammed into washing machines, refrigerators, or hidden under false bottoms in suitcases and trucks bound for the border. Over the past nine months, customs inspectors have seized more than $11 million at the border that stretches from Texas to California. And at Port Newark, Customs agents seized $5.5 million in fiscal year 1997, the fourth-highest amount seized among all U.S. ports. Cassella said the Justice Department hopes its proposal will be offered as an amendment to money-laundering legislation being considered by the House. But several congressional staffers were skeptical that the proposal would be considered by this Congress, because of the controversy over civil forfeiture. Congress is slated to adjourn is less than a month. In addition, the new regulations, if passed, would likely face immediate legal challenges. In June, the U.S. Supreme Court overturned the seizure of $357,144 from a Hollywood, Calif., gas station owner. Federal officials seized Hosep Krikor Bajakajian's money after the Syrian immigrant tried to carry it out of the country without reporting it -- even though he was told of the federal reporting requirements by customs agents. A divided court ruled the fine was excessive because the only impact of Bajakajian's crime was to deprive the government of "information on a piece of paper." By creating a category of crime called "bulk cash smuggling," law enforcement officials hope to convince the Supreme Court that efforts to evade detection could have a direct impact on the "security and integrity" of the nation's borders, Cassella said. The crime would be punishable by up to five years in prison and forfeiture of the money involved. "Bulk cash smuggling is an inherently more serious offense than simply failing to file a customs report," Justice Department officials wrote in an explanation of the bill provided to Congress. "Because the constitutionality of forfeiture is dependent on the 'gravity of the offense' . . . it is anticipated that the full forfeiture of smuggled money will withstand constitutional scrutiny in most cases." Local prosecutors hailed the proposed change. "Clearly, it's an effort to convince the Supreme Court that Congress did view this as more than a mere reporting violation and that forfeiture of the smuggled money is appropriate," said Marion Percell, an assistant U.S. Attorney in Newark who specializes in money-laundering cases. Critics attacked the bill, calling it just another effort by overzealous law enforcement officials to expand seizure powers that deprive citizens of due process. Roger Pilon, director of the Center for Constitutional Studies at the Cato Institute, warned that civil asset forfeiture is subject to abuse by law enforcement authorities. "This is unbelievable," he said. "Everything that Justice does in this area is characterized as a 'major step.' But that's no justification. Since when is it a crime to take money out of the country? After all, whose money is it?" Rachel King, legislative counsel of the American Civil Liberties Union, agreed. "The problem is they have too much power to seize property," she said. "The laws need to go the other way. What they can do already is scary." Staff Writers Julie Fields and Thomas Zambito contributed to this article. Copyright � 1998 Bergen Record Corp. ----------------------- NOTE: In accordance with Title 17 U.S.C. section 107, this material is distributed without profit or payment to those who have expressed a prior interest in receiving this information for non-profit research and educational purposes only. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml ----------------------- ********************************************** To subscribe or unsubscribe, email: majordomo at majordomo.pobox.com with the message: (un)subscribe ignition-point email at address ********************************************** www.telepath.com/believer ********************************************** --- end forwarded text ----------------- Robert A. Hettinga Philodox Financial Technology Evangelism 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From sorens at workmail.com Fri Sep 18 17:42:48 1998 From: sorens at workmail.com (Soren) Date: Sat, 19 Sep 1998 08:42:48 +0800 Subject: [Fwd: IP: Tougher laws are sought to seize cash] Message-ID: <3603B645.8C3992F5@workmail.com> To: Robert Hettinga Subject: Re: IP: Tougher laws are sought to seize cash From: Soren Date: Sat, 19 Sep 1998 09:47:56 -0400 References: Robert Hettinga wrote: > ... Hailed as a "major step forward" in the fight against > money laundering, the Justice Department proposal > would broaden the government's ability to seize the > profits of such illicit activity as drug dealing. > They forgot to mention the biggest money laundering operation, in Washington D.C., From stugreen at realtime.net Fri Sep 18 18:32:39 1998 From: stugreen at realtime.net (Stu Green) Date: Sat, 19 Sep 1998 09:32:39 +0800 Subject: IP: Tougher laws are sought to seize cash (fwd) In-Reply-To: <199809191445.JAA08476@einstein.ssz.com> Message-ID: <3603C242.7D937C61@realtime.net> Jim, Et al, Recently I heard the retelling of a 'verbal memo' given contracted security folks at Miami International Airport concerning spotting people with 'excessive cash'. Besides the racist profiles and the cues of buying a ticket with cash, destinations were high on the list and Las Vegas was the most often mentioned destination for a 'good collar' (ie. cash confiscation). The feds are offering a reward of a percentage of what is confiscated to the informants, in this case ticket sellers, baggage handlers and local security providers (contractor and local police). Seems that bring more than 4 -5 K worth of green to gamble with is an excuse for confiscation with no charges ever being made. The operative mode here is an assumption that they'll snag some wise guys and they won't freak and try to regain their bucks....bad assumption and bad intentions. This is the kind of citizen vs. citizen activity that the East Germans and their Nazi mentors were master in establishing and effecting. The best way to destroy trust is to a profit incentive to poke your face into your neighbor's garbage can and report the droppings to the collectors of irrelavant information at the ministry of injustice. From tcmay at got.net Fri Sep 18 20:23:17 1998 From: tcmay at got.net (Tim May) Date: Sat, 19 Sep 1998 11:23:17 +0800 Subject: Oh my God... In-Reply-To: <002d01bde375$d5f31b80$7c7ecfc0@stewart.smallworks.com> Message-ID: (cypherpunks at toad.com replaced with cypherpunks at algebra.com) At 7:33 PM -0700 9/18/98, Jim Thompson wrote: >Forgive me if this has been covered on cypherpunks. I hang out on >coderpunks, >and this is far too political for that list. Please keep me Cc'd on any >discussion >on this topic. Thank you for slumming on our list. And thank you for reminding me to keep my lowly political stuff off of the "good" lists....I needed that reminder to keep my filth here on "cypherpunks." BTW, "toad.com" is not one of the distributed lists. I guess you've been so busy "writing code" that you are still ignorant of this transition. >If true, RSA is dirty, SDI is dirty, Robertson Stevens is dirty, and Ron >Brown, >Jim Bizdos, Al Gore, John Huang and Sanford Robertson are going to jail. > >http://www.worldnetdaily.com/smith/980915.comcs.html Well, if Ron Brown is put in jail they'll have to dig up the casket containing the couple of pounds of what they found of him when his plane hit that hillside near Sarajevo a couple of years ago. You'd have known this, and the rest of that well-reported story cited above, had you gotten off your "don't pollute the coderpunks" high horse and actually read some political stuff. Oh, and what code have you written lately? --Tim May (This space left blank pending determ. of acceptability to the gov't.) ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, ComSec 3DES: 831-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Licensed Ontologist | black markets, collapse of governments. From nobody at replay.com Fri Sep 18 21:26:05 1998 From: nobody at replay.com (Anonymous) Date: Sat, 19 Sep 1998 12:26:05 +0800 Subject: No Subject Message-ID: <199809191728.TAA24903@replay.com> -----BEGIN PGP SIGNED MESSAGE----- September 19, 1998, U.S. Medical Center for Federal Prisoners, Springfield, Missouri, not a Magic Circle. -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCVAwUBNgPkchp0s99tXiQlAQEoHQP+IX2GivNiJpIB3ryiu+bte0+YyJRTZDWB bbF/qRIGrOOVKpNxuu+riAz0oUxHW3xuooPmIVcR8O0tfXljrxyAvK4qdtPFWyr9 +PaE5clU7XdRqxiKGfao569W1vRPJW5vlmUm+/BHmRF1ADG/HqTy/EbivKEvZGcw UmrV65r+9ho= =wa8X -----END PGP SIGNATURE----- From AIMSX at aol.com Fri Sep 18 21:39:37 1998 From: AIMSX at aol.com (AIMSX at aol.com) Date: Sat, 19 Sep 1998 12:39:37 +0800 Subject: Larry Gilbert, AOLers, and the Hyper-real flamer Message-ID: wow.. you really do think I do all those things - spamming, mailbombing... and all that other huh? You really give me way to much credit, as I only use it for internet access, and access to a UNIX machine From nobody at replay.com Fri Sep 18 21:58:04 1998 From: nobody at replay.com (Anonymous) Date: Sat, 19 Sep 1998 12:58:04 +0800 Subject: Oh my God... Message-ID: <199809191800.UAA27494@replay.com> >And thank you for reminding me to keep my lowly political stuff off of the >"good" lists....I needed that reminder to keep my filth here on >"cypherpunks." Poor little Timmy, still crying boo-hoo because someone dared to set up another list than his little cypherpunks fiefdom. He loves to talk about freedom of association if it means that he doesn't have to be around "Coloreds". But he can't stand people setting up a forum to focus more on cryptography. What a hypocrite. > Well, if Ron Brown is put in jail they'll have to dig up the casket > containing the couple of pounds of what they found of him when his plane > hit that hillside near Sarajevo a couple of years ago. Gee, and I thought they'd found possible bullet holes in Ron Brown's head? Need more than a couple of pounds for that, wouldn't they? From rah at shipwright.com Fri Sep 18 22:08:58 1998 From: rah at shipwright.com (Robert Hettinga) Date: Sat, 19 Sep 1998 13:08:58 +0800 Subject: IP: Going Cashless: Bank ends ECash trial period Message-ID: --- begin forwarded text Delivered-To: ignition-point at majordomo.pobox.com X-Sender: believer at telepath.com Date: Sat, 19 Sep 1998 07:47:55 -0500 To: believer at telepath.com From: believer at telepath.com Subject: IP: Going Cashless: Bank ends ECash trial period Mime-Version: 1.0 Sender: ignition-point-request at majordomo.pobox.com Precedence: first-class Source: ComputerWorld http://www.computerworld.com/home/news.nsf/all/9809174ecash (Online News, 09/17/98 12:16 PM) Bank ends electronic cash trial By Mary Lisbeth D'Amico The sole U.S. bank to show interest in online payment via electronic cash this week abruptly ended its three-year trial of DigiCash, Inc.'s ECash software. Citing a new strategy and market conditions, St. Louis-based Mercantile Bank this week ended a trial that allowed customers to make purchases over the Internet with electronic coins, Mercantile spokeswoman Beth Fagen confirmed. The trial used ECash, an electronic cash software program created by Palo Alto, Calif.-based DigiCash. The bank was the sole U.S. client for DigiCash, which hopes to have another major U.S. trial in place by year's end, according to William Donahoo, DigiCash's vice president of business development. The trial brought together 5,000 customers with 300 Internet merchants. Customers gave the bank their credit-card information only once, then created electronic "coins" at the bank, allowing them to make small purchases -- or micropayments -- of goods over the Internet without having to enter a credit-card number each time. The buyer also remains anonymous to the merchant because the coins don't identify the customer. Mercantile inherited the ECash project when it purchased Mark Twain Bank in 1997, Fagen said. After reviewing its strategy, the bank decided to call a halt to the trial after it became apparent that few of the project's participants were Mercantile's core customers in the six Midwestern states where it operates, she explained. Fagen also cited the changing climate in the U.S. for Internet payments. When the trial was started in 1995, she said, "people were more fearful of using credit cards to pay for things over the Internet. Now that seems to have disappeared." Although Mark Twain was the first bank worldwide to try out ECash, its core business never was quite a match for the product, according to Donahoo. "But we are still bullish about our prospects for this market," Donahoo said, pointing out that automated teller machines took nearly 20 years to gain favor with consumers. DigiCash will concentrate on finding the right type of merchants for its U.S.-based projects, he said. In Europe, DigiCash has ECash projects in progress at Credit Suisse, the Bank of Austria and Deutsche Bank. Copyright � 1998 Computerworld, Inc. ----------------------- NOTE: In accordance with Title 17 U.S.C. section 107, this material is distributed without profit or payment to those who have expressed a prior interest in receiving this information for non-profit research and educational purposes only. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml ----------------------- ********************************************** To subscribe or unsubscribe, email: majordomo at majordomo.pobox.com with the message: (un)subscribe ignition-point email at address ********************************************** www.telepath.com/believer ********************************************** --- end forwarded text ----------------- Robert A. Hettinga Philodox Financial Technology Evangelism 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From rah at shipwright.com Fri Sep 18 22:20:00 1998 From: rah at shipwright.com (Robert Hettinga) Date: Sat, 19 Sep 1998 13:20:00 +0800 Subject: Stego-empty hard drives... In-Reply-To: <199809190501.HAA12423@replay.com> Message-ID: At 1:01 AM -0400 on 9/19/98, Anonymous wrote: > (Had this been a UK Customs 'inspection' of the contents of the disk, I > might have had to explain the half-gig of "noise" I have on the disk. > Only, it really is noise. Really.) This makes me think of something that I probably missed in the bowels of someone's long previous stego posting (um, stego^stego? :-)), how would you go about either: Stegoing an encrypted partition as "blank" hard drive space without actually writing over it unless you wanted to? or, even, Stegoing an encrypted partition as not even *there* at all? Doesn't seem like it would be too hard conceptually (hah!) and, if done, might actually defeat such Archie-look-up-the-dress as the British customsfolk are wont to do these days. Obviously, even if the partition were found, it would look, to sniffer programs, as if it were empty, right? :-). Cheers, Bob Hettinga ----------------- Robert A. Hettinga Philodox Financial Technology Evangelism 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From nobody at replay.com Fri Sep 18 22:44:34 1998 From: nobody at replay.com (Anonymous) Date: Sat, 19 Sep 1998 13:44:34 +0800 Subject: Larry Gilbert, AOLers, and the Hyper-real flamer Message-ID: <199809191846.UAA31551@replay.com> (Depreciated toad.com address replaced with algebra.com.) On Sat, 19 Sep 1998 AIMSX at aol.com wrote: > > wow.. you really do think I do all those things - spamming, mailbombing... and > all that other huh? No. Actually, we're convinced that you're just a lamer. Usually spamming and mailbombing goes along with that. > You really give me way to much credit, as I only use it for internet access, > and access to a UNIX machine You need 100 accounts on the same ISP for that? Your implied claims of being Internet savvy are pretty suspect considering that you haven't even figured out how to quote yet. Besides, all having 100 accounts usually means is that you installed a password sniffer on a university LAN or you ran crack on a passwd file. From Christopher.W.Thompson at NWS02.usace.army.mil Fri Sep 18 22:53:48 1998 From: Christopher.W.Thompson at NWS02.usace.army.mil (Thompson, Christopher W NWS) Date: Sat, 19 Sep 1998 13:53:48 +0800 Subject: A question from Seattle Message-ID: hey, I'm a 28 year old living in Seattle and I've been having quite the fantasy of watching and or participating in father/son activities...or big brother and little brother interaction. Do you have any suggestions where/who I might contact in the Seattle metro area? Thanks From aba at dcs.ex.ac.uk Fri Sep 18 22:58:27 1998 From: aba at dcs.ex.ac.uk (Adam Back) Date: Sat, 19 Sep 1998 13:58:27 +0800 Subject: TruthMonger key's password! In-Reply-To: <199809191728.TAA24903@replay.com> Message-ID: <199809191846.TAA24067@server.eternity.org> Anonymous writes on cpunks (blank subject field from nobody at replay.com earlier today). > -----BEGIN PGP SIGNED MESSAGE----- > > September 19, 1998, U.S. Medical Center for Federal > Prisoners, Springfield, Missouri, not a Magic Circle. > > -----BEGIN PGP SIGNATURE----- > Version: 2.6.2 > > iQCVAwUBNgPkchp0s99tXiQlAQEoHQP+IX2GivNiJpIB3ryiu+bte0+YyJRTZDWB > bbF/qRIGrOOVKpNxuu+riAz0oUxHW3xuooPmIVcR8O0tfXljrxyAvK4qdtPFWyr9 > +PaE5clU7XdRqxiKGfao569W1vRPJW5vlmUm+/BHmRF1ADG/HqTy/EbivKEvZGcw > UmrV65r+9ho= > =wa8X > -----END PGP SIGNATURE----- That one I can verify the signature of (unlike the 0x2541C535 key-id signed post which I proposed we try a signature attack on because of lack of public key), because I have on my keyring the secret key since adding the secret key to my key ring from this post which was made to cypherpunks [1] with headers below (look in the archives, or copied below): : From: nobody at REPLAY.COM (Anonymous) : To: cypherpunks at toad.com : Date: Tue, 23 Sep 1997 01:58:52 +0200 (MET DST) : Subject: Persistent Persona The key in that message was: Type Bits/KeyID Date User ID sec 1024/6D5E2425 2041/12/07 TruthMonger -----BEGIN PGP SECRET KEY BLOCK----- Version: 2.6.3i lQHgA4dN5oIAAAEEAM/3b3wHc1iQEmtk9NQhmrHmZmlCdZH4T3kf2APlwA/NRsfU pAa++0pBdgMMOr9QBMWNWuRuZriEUE/jH9cdMkgBeOrvsviFSe2wN074LrCZSugO 6KabPwokodYl8+R8xY5NC1pZUD4sYf49L6xOwpjiXukrRKqwABp0s99tXiQlAAUR ARwSOk76t7D7A/0n7XVeJ5qLKatxrzKZ1+U9PLhEeeQkknETkj9aFmRNrj/I4n/Y TgxKh74zK1/kM4y6bunTNU6+pBDPrvYJgqoq4kMlS3jXNdGBFn0Tw0j2klSZpXzA Tb593tKD66dztQXiYbYYhydQixUp22NwjruiIfwjFdtU7tOhKfLgZ+dGJQIAH40N 9Gpt3oSQ+ua6I1mOEYzWXdH8HdaNQKxGVRYVH71Wi2TpDLuZbbYq6RB9LDQ0VJO0 6DumKr1OSG32zda+kwIAvjPYd8xEOyCo2NJfL2ZUBh9/GC9nb9UTxdwFP7AFx0F7 DTA+prGb672ly3NAa7/gje2W4isd3NN+T6T13WHmcAH+MnnMDMclF/hNKrhR39aB 1ZvVEBh8yz8xWCm5BQOqp55KyJGgDY0kAcwqejE0PHV8dMG6TVteVvOu7D7GDFcB 4KXvtAtUcnV0aE1vbmdlcg== =HBLx -----END PGP SECRET KEY BLOCK----- which means that anyone can create such signatures. That PGP correctly copes with signatures made by keys it has only a private key for (and no public key) is something of a surprise -- PGP must be smart enough to use the private key if the public key isn't around on the keyring. (The public key is a subset of private key). Erk! just tried to create a signed file with that private key, and I didn't notice before when I commented on the posting of this key that key has a passphrase! It wouldn't be one of those John Young forwarded to the list from an anonymous source would it.... Holy smoke! Now we are getting somewhere, the person who remailed those passphrases to John Young knew that keys passphrase, and yet the key was posted back in Sep 97! John Young writes on cpunks: > This allegedly is forwarded from CJ, though from an unknown source > so think twice: > > "Passwords: sog, sog709, sog709cejCJP,sog709cjpCEJ, D'Shauneaux, > D'shauneaux, and others..." The passphrase was sog709. Try it and see. Check in the archives for yourself for that message, (subject 'Persistent Persona') and become paranoid! What is going on here? Is Toto still at large, drunk behind the keyboard? Is Toto not one person? Or have the IRS extracted Carl Johnson's passphrases from him and got busy playing mind-games with us? Adam [1] ====================================================================== Date: Tue, 23 Sep 1997 01:58:52 +0200 (MET DST) Subject: Persistent Persona To: cypherpunks at toad.com From: nobody at REPLAY.COM (Anonymous) -----BEGIN PGP MESSAGE----- Version: 2.6.2 lQHgA4dN5oIAAAEEAM/3b3wHc1iQEmtk9NQhmrHmZmlCdZH4T3kf2APlwA/NRsfU pAa++0pBdgMMOr9QBMWNWuRuZriEUE/jH9cdMkgBeOrvsviFSe2wN074LrCZSugO 6KabPwokodYl8+R8xY5NC1pZUD4sYf49L6xOwpjiXukrRKqwABp0s99tXiQlAAUR ARwSOk76t7D7A/0n7XVeJ5qLKatxrzKZ1+U9PLhEeeQkknETkj9aFmRNrj/I4n/Y TgxKh74zK1/kM4y6bunTNU6+pBDPrvYJgqoq4kMlS3jXNdGBFn0Tw0j2klSZpXzA Tb593tKD66dztQXiYbYYhydQixUp22NwjruiIfwjFdtU7tOhKfLgZ+dGJQIAH40N 9Gpt3oSQ+ua6I1mOEYzWXdH8HdaNQKxGVRYVH71Wi2TpDLuZbbYq6RB9LDQ0VJO0 6DumKr1OSG32zda+kwIAvjPYd8xEOyCo2NJfL2ZUBh9/GC9nb9UTxdwFP7AFx0F7 DTA+prGb672ly3NAa7/gje2W4isd3NN+T6T13WHmcAH+MnnMDMclF/hNKrhR39aB 1ZvVEBh8yz8xWCm5BQOqp55KyJGgDY0kAcwqejE0PHV8dMG6TVteVvOu7D7GDFcB 4KXvtAtUcnV0aE1vbmdlcg== =HBLx -----END PGP MESSAGE----- -----BEGIN PGP PUBLIC KEY BLOCK----- Version: 2.6.2 mQENAzOCm1EAAAEIANB5WCFbEjUhNaZ2cEWuh9xcP48QBixzJpxPqGc0Sogj9W1L ezM5GDF0tZp5ksNbWf5+ErNxXo0yOM7LjDl+sRrEmcbuTkjqPJxG/q4JZ7Al3/FF h1SFGWpQNz9BPewgHS8/Lp9Ywl+ELeau+FPrr/xmktYifBBaaPUTS5oNMhn4Ih0r yez6WFn6lRYz+FLsXchjkg+I22tC1aD6iKv/BxCM//GzJ8UNkE7Vx94jZxJ/0vqE 3msqN1coj99okoggWzR5xe/wcLjUjXBw4Z208zhKNEC1AemkJV5HSbztfOgpZOqX 4dwsSDREfFcerM3gusIv3Gz+oU5WPTNSVeg5/HkABRG0GVRydXRoTW9uZ2VyIDx0 bUBkZXYubnVsbD6JARUDBRAzgptRPTNSVeg5/HkBAXUeB/4y3/VlUzua8TVbAiTW KPXvqTq28XHrhNrTiDWXX7KaFmRyZC20OLbRNtJH1XJUeZv7yhxXkIO2jW6e1i95 MWcx0JAheNjdqKAdNFUVaqs6R2+ySAU7PtfbfVx/RUxsTW8jLfppI7ajTf3E9z3u nO6NpN/z74DO659tiwfNjT8YoRH3EEomSKNZ3yIGhbyTHv+FOrJs8sQ3jhqmFb37 nr0er1+BWi9Sr2LS7aK+iCK/ZKhUqaofkoo6S/M6nTWKU7RiDhvK0wm40Lassb83 z3NjwN2NNZDwCPYM3d12LjxWA70qljx/qsSRptvkDmnLKXnEUvTsnf9dErhpYLtg yGBFiQCVAwUQM4LW/7BfjJBm+4xlAQEbJAP/RsKZ/khOS+4nD7JfPnKMKMVjDOif x0enjzf7kW//GnMsi70yaYi6QeoT0YUYVNQ+wWwGUPgAejs2PLk1VIbn4GIvRU+1 Uj6xTTfHkIibUtvz7LtC/JmNafWSETDnJOlqszgzTnE0duDwZ83ISWdzHkhEXnfC BxcPay75u1zC6FQ= =j6da -----END PGP PUBLIC KEY BLOCK----- From ravage at EINSTEIN.ssz.com Fri Sep 18 23:14:26 1998 From: ravage at EINSTEIN.ssz.com (Jim Choate) Date: Sat, 19 Sep 1998 14:14:26 +0800 Subject: TruthMonger key's password! (fwd) Message-ID: <199809191941.OAA09260@einstein.ssz.com> Forwarded message: > Date: Sat, 19 Sep 1998 19:46:43 +0100 > From: Adam Back > Subject: TruthMonger key's password! Note the magic circle comment as a potential passphrase, he did say 'others'. > What is going on here? Is Toto still at large, drunk behind the > keyboard? Is Toto not one person? Or have the IRS extracted Carl > Johnson's passphrases from him and got busy playing mind-games with > us? Or more likely there is one or more persons who have an arrangement. ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From vznuri at netcom.com Fri Sep 18 23:27:23 1998 From: vznuri at netcom.com (Vladimir Z. Nuri) Date: Sat, 19 Sep 1998 14:27:23 +0800 Subject: IP: Pentagon may modify websites Message-ID: <199809191929.MAA03045@netcom13.netcom.com> From: Richard Sampson Subject: IP: Pentagon may modify websites Date: Wed, 16 Sep 1998 23:08:02 -0400 To: "ignition-point at majordomo.pobox.com" Pentagon may modify websites WASHINGTON, Sept. 16 (UPI) _ The Pentagon is reviewing its Internet policies to determine if there is too much information on its public access websites. The Defense Department and the four armed services operate several Internet websites. Internet users including newspaper reporters, high school students working on term papers and military history buffs visit them frequently to download photos, news releases, and other information. But Defense Department spokesman Kenneth Bacon said today that top Pentagon officials have become concerned that the information contained on those websites could be used by terrorists and others for illegal purposes. Bacon did not say what information officials are specifically concerned about or what caused them to begin reviewing the content of the department's websites. He did say, however, that no information contained on websites to date has been put to use by terrorists. ''This is more in the area of heading off a problem rather than reacting to one,'' he said. No date has been set for the website review to be completed. _- Copyright 1998 by United Press International. All rights reserved. _- By MIKE BILLINTON News provided by COMTEX. [!BUSINESS] [!GOVERNMENT] [!WALL+STREET] [!WORLD+AFFAIRS] [HIGH+SCHOOL] [INTERNET] [MILITARY] [NEWS] [NEWSGRID] [UPI] [WASHINGTON] -- ----------------------- NOTE: In accordance with Title 17 U.S.C. section 107, this material is distributed without profit or payment to those who have expressed a prior interest in receiving this information for non-profit research and educational purposes only. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml ----------------------- ********************************************** To subscribe or unsubscribe, email: majordomo at majordomo.pobox.com with the message: (un)subscribe ignition-point email at address ********************************************** www.telepath.com/believer ********************************************** From vznuri at netcom.com Fri Sep 18 23:27:26 1998 From: vznuri at netcom.com (Vladimir Z. Nuri) Date: Sat, 19 Sep 1998 14:27:26 +0800 Subject: IP: Tracking: DNA database in Okla. Message-ID: <199809191929.MAA03067@netcom13.netcom.com> From: believer at telepath.com Subject: IP: Tracking: DNA database in Okla. Date: Thu, 17 Sep 1998 08:54:13 -0500 To: believer at telepath.com Source: Tulsa World http://www.tulsaworld.com/News.htm DNA database helps make case By World's own Service 9/16/98 OKLAHOMA CITY -- A 1994 law creating a DNA database for Oklahoma law enforcement contributed to Monday's conviction in an Oklahoma City mass murder case, an author of the law said Tuesday. Danny Keith Hooks was found guilty Monday of the May 16, 1992, murders of five women in Oklahoma City. Jurors must now decide whether to sentence him to death. Hooks was first identified through genetic evidence collected at the crime scene. The arrest and conviction marked one of the first major cases involving the Oklahoma State Bureau of Investigation's DNA database and lab since it became operational in 1994, said Rep. James Dunegan, D-Calera. Under the law, blood samples are collected from certain convicts, and OSBI technicians analyze and type the genetic markers. That information is then stored in a database. The law also enlarged the bureau's DNA laboratory, Dunegan said. The Oklahoma City mass killing had remained unsolved for five years. Oklahoma City police records showed that until Hooks was arrested last year, more than 700 reports had been written on the case, 8,000 people had been fingerprinted and more than 400 blood samples had been analyzed in the case. The Oklahoma State Bureau of Investigations ran unidentified DNA from blood at the crime scene through several states' databases of criminals' genetic profiles, said Kym Koch, a spokeswoman for the OSBI. While at an out-of-state national conference of DNA criminalists in 1996, the head of the OSBI's DNA lab asked experts from California to analyze the unknown DNA, Koch said. It matched Hooks' genetic profile, proving he had been at the crime scene. Prosecutors said Hooks must have been cut while he was killing his victims. Hooks had served time in a California prison on a rape conviction. Law enforcers were able to trace the DNA samples found at the murder scene to Hooks because he had to submit a DNA sample to California corrections officials before his release there. Hooks was convicted of killing the women during a sexual attack. He was arrested last year in California. Koch said roughly half of the states have their own DNA databases. Copyright 1996, World Publishing Co. All rights reserved. ----------------------- NOTE: In accordance with Title 17 U.S.C. section 107, this material is distributed without profit or payment to those who have expressed a prior interest in receiving this information for non-profit research and educational purposes only. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml ----------------------- ********************************************** To subscribe or unsubscribe, email: majordomo at majordomo.pobox.com with the message: (un)subscribe ignition-point email at address ********************************************** www.telepath.com/believer ********************************************** From vznuri at netcom.com Fri Sep 18 23:27:29 1998 From: vznuri at netcom.com (Vladimir Z. Nuri) Date: Sat, 19 Sep 1998 14:27:29 +0800 Subject: IP: School bans `no rules' T-shirt Message-ID: <199809191929.MAA03078@netcom13.netcom.com> From: believer at telepath.com Subject: IP: School bans `no rules' T-shirt Date: Thu, 17 Sep 1998 09:25:30 -0500 To: believer at telepath.com Source: St. Paul, Minnesota Pioneer Planet News http://www.pioneerplanet.com/news/wis_docs/010832.htm Published: Thursday, September 17, 1998 School bans `no rules' T-shirt ASSOCIATED PRESS WAUKESHA, WIS. A fifth grader was ordered to turn his T-shirt inside-out because it carried the message ``No Rules,'' which the principal said promoted disruptive behavior. But the youth's mother said Saratoga Elementary School principal Dale Heinen overstepped his bounds and that there was no harm in wearing such shirts, which depict cartoon characters and carry the slogan, ``Outta my way. No Rules.'' Heinen made Cody Wilhelm wear the shirt inside-out so no one could read its message. ``School guidelines talk about things that are disruptive and can lead to disruption,'' Heinen said. ``If they are portraying that in what they wear . . . we don't want kids reflecting that attitude or promoting that type of attitude.'' Mary Wilhelm said her son's T-shirt was not disruptive and that parents should have the right to dress their children with any clothes they want to as long as they do not promote sex, drugs, alcohol, tobacco or illegal activities. She said her son went to school last year wearing one of the ``No Rules'' T-shirts and also wore a T-shirt depicting ``Joe Camel,'' a cartoon character formerly used to promote Camel cigarettes. School officials did not object, she said. ``He should have never worn that Joe Camel shirt, I agree, but that dealt with smoking,'' Wilhelm said. ``This is different. I don't want to have the principal tell me what I can and can't do with my kid.'' �1998 PioneerPlanet / St. Paul (Minnesota) Pioneer Press - All Rights Reserved copyright information ----------------------- NOTE: In accordance with Title 17 U.S.C. section 107, this material is distributed without profit or payment to those who have expressed a prior interest in receiving this information for non-profit research and educational purposes only. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml ----------------------- ********************************************** To subscribe or unsubscribe, email: majordomo at majordomo.pobox.com with the message: (un)subscribe ignition-point email at address ********************************************** www.telepath.com/believer ********************************************** From vznuri at netcom.com Fri Sep 18 23:27:44 1998 From: vznuri at netcom.com (Vladimir Z. Nuri) Date: Sat, 19 Sep 1998 14:27:44 +0800 Subject: IP: Tougher laws are sought to seize cash Message-ID: <199809191929.MAA03056@netcom13.netcom.com> From: believer at telepath.com Subject: IP: Tougher laws are sought to seize cash Date: Thu, 17 Sep 1998 08:45:24 -0500 To: believer at telepath.com Source: Bergen (New Jersey) Record http://www.bergen.com/news/njmone199809154.htm Tougher laws are sought to seize cash Tuesday, September 15, 1998 By ADAM PIORE Washington Correspondent WASHINGTON -- Federal law enforcement officials on Monday unveiled a plan they say will help stop the flow of billions of dollars in drug money across the nation's borders every year. Hailed as a "major step forward" in the fight against money laundering, the Justice Department proposal would broaden the government's ability to seize the profits of such illicit activity as drug dealing. It now is illegal to try to leave the country with more than $10,000 in currency without reporting it to U.S. Customs officials. Violations are punishable by up to five years in prison and seizure of the money. But in June, the U.S. Supreme Court dealt a serious blow to efforts to seize the unreported cash, ruling in a precedent-setting case that such seizures often violate constitutional protections against "excessive fines." The new proposal is aimed at correcting the loopholes opened up in the June court decision. It would for the first time allow law enforcement officials to arrest people concealing currency before they even reach the border. It would allow the seizure of $10,000 or more at the nation's ports and highways -- hundreds of miles from any crossing -- if agents can prove that there is intent to smuggle the concealed money out of the country. But it goes beyond that, giving agencies tools they have not had in the fight to stop the flow of illegal drug profits out of the country, said Stefan D. Cassella, the assistant chief of the money-laundering and forfeiture section of the U.S. Department of Justice. "This is a major step forward to address a new problem," Cassella said. "We know that the covert movement of currency across borders is indicative and inherently related to criminal activity." Civil libertarians condemned the proposed law, which the Justice Department sent to Congress on Monday, because they said it would expand the ability of law enforcement agencies to seize currency and keep it. A series published in The Record this year revealed how New Jersey, with its sprawling seaport, international airport, lax laws, and proximity to New York and Philadelphia, had emerged as a hub for money laundering and currency smuggling over the past 15 years. Cassella said the decision to push for the more stringent laws was inspired in part by The Record's stories. In its letter to Congress, the Justice Department cited the series as evidence of the growing problem in currency smuggling. The proposed law would give officials the ability to go after a wider range of smuggling that has been difficult for them to stop. Every year, for instance, billions of dollars in illegal drug profits is smuggled across the border unchecked, crammed into washing machines, refrigerators, or hidden under false bottoms in suitcases and trucks bound for the border. Over the past nine months, customs inspectors have seized more than $11 million at the border that stretches from Texas to California. And at Port Newark, Customs agents seized $5.5 million in fiscal year 1997, the fourth-highest amount seized among all U.S. ports. Cassella said the Justice Department hopes its proposal will be offered as an amendment to money-laundering legislation being considered by the House. But several congressional staffers were skeptical that the proposal would be considered by this Congress, because of the controversy over civil forfeiture. Congress is slated to adjourn is less than a month. In addition, the new regulations, if passed, would likely face immediate legal challenges. In June, the U.S. Supreme Court overturned the seizure of $357,144 from a Hollywood, Calif., gas station owner. Federal officials seized Hosep Krikor Bajakajian's money after the Syrian immigrant tried to carry it out of the country without reporting it -- even though he was told of the federal reporting requirements by customs agents. A divided court ruled the fine was excessive because the only impact of Bajakajian's crime was to deprive the government of "information on a piece of paper." By creating a category of crime called "bulk cash smuggling," law enforcement officials hope to convince the Supreme Court that efforts to evade detection could have a direct impact on the "security and integrity" of the nation's borders, Cassella said. The crime would be punishable by up to five years in prison and forfeiture of the money involved. "Bulk cash smuggling is an inherently more serious offense than simply failing to file a customs report," Justice Department officials wrote in an explanation of the bill provided to Congress. "Because the constitutionality of forfeiture is dependent on the 'gravity of the offense' . . . it is anticipated that the full forfeiture of smuggled money will withstand constitutional scrutiny in most cases." Local prosecutors hailed the proposed change. "Clearly, it's an effort to convince the Supreme Court that Congress did view this as more than a mere reporting violation and that forfeiture of the smuggled money is appropriate," said Marion Percell, an assistant U.S. Attorney in Newark who specializes in money-laundering cases. Critics attacked the bill, calling it just another effort by overzealous law enforcement officials to expand seizure powers that deprive citizens of due process. Roger Pilon, director of the Center for Constitutional Studies at the Cato Institute, warned that civil asset forfeiture is subject to abuse by law enforcement authorities. "This is unbelievable," he said. "Everything that Justice does in this area is characterized as a 'major step.' But that's no justification. Since when is it a crime to take money out of the country? After all, whose money is it?" Rachel King, legislative counsel of the American Civil Liberties Union, agreed. "The problem is they have too much power to seize property," she said. "The laws need to go the other way. What they can do already is scary." Staff Writers Julie Fields and Thomas Zambito contributed to this article. Copyright � 1998 Bergen Record Corp. ----------------------- NOTE: In accordance with Title 17 U.S.C. section 107, this material is distributed without profit or payment to those who have expressed a prior interest in receiving this information for non-profit research and educational purposes only. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml ----------------------- ********************************************** To subscribe or unsubscribe, email: majordomo at majordomo.pobox.com with the message: (un)subscribe ignition-point email at address ********************************************** www.telepath.com/believer ********************************************** From vznuri at netcom.com Fri Sep 18 23:28:03 1998 From: vznuri at netcom.com (Vladimir Z. Nuri) Date: Sat, 19 Sep 1998 14:28:03 +0800 Subject: IP: Huge Philly Terrorist Drill Yesterday Message-ID: <199809191929.MAA03089@netcom13.netcom.com> From: believer at telepath.com Subject: IP: Huge Philly Terrorist Drill Yesterday Date: Thu, 17 Sep 1998 09:32:52 -0500 To: believer at telepath.com Source: Chicago Tribune http://chicagotribune.com/news/nationworld/article/0,1051,SAV-9809170173,00. html HUGE SIMULATED TERRORIST ATTACK AIMED AT PUTTING CITY ON GUARD From Tribune News Services September 17, 1998 PHILADELPHIA, PENNSYLVANIA -- The Army on Wednesday gave Philadelphia's law-enforcement and rescue crews a daylong taste of what it might be like if terrorists unleashed deadly Sarin nerve gas during a civic luncheon for 1,500 people. Sirens shattered the calm of Philadelphia's Fairmount Park as hundreds of police, firefighters and federal troops rushed to the aid of city workers acting out their parts as victims of the attack. "You can't predict an Oklahoma City. You can't predict what happened in Tokyo. And you can't predict what happened in New York," Army Col. Richard Breen shouted over the roar of fire engines. "It's better to be proactive and train people so that a city like Philadelphia can take . . . care of its citizens if, God forbid, something like this really were to occur." The drill was part of a Defense Department program to train cities to cope with chemical, biological and nuclear terrorism. The exercise, the biggest yet to be staged by the Army Chemical and Biological Defense Command, involved beat officers, bomb-disposal experts, hazardous-material teams, firefighters, ambulance crews, National Guardsmen, federal emergency managers, FBI agents, the Coast Guard and the American Red Cross. Organizers refused to say how many people took part. "We would not want to broadcast . . . just what our personnel and equipment strengths would be to meet this type of emergency," a city official said. Later this month in a similar exercise, the Army plans to simulate another Sarin attack on a music concert at RFK Stadium in Washington. ----------------------- NOTE: In accordance with Title 17 U.S.C. section 107, this material is distributed without profit or payment to those who have expressed a prior interest in receiving this information for non-profit research and educational purposes only. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml ----------------------- ********************************************** To subscribe or unsubscribe, email: majordomo at majordomo.pobox.com with the message: (un)subscribe ignition-point email at address ********************************************** www.telepath.com/believer ********************************************** From vznuri at netcom.com Fri Sep 18 23:28:04 1998 From: vznuri at netcom.com (Vladimir Z. Nuri) Date: Sat, 19 Sep 1998 14:28:04 +0800 Subject: IP: Terrorism is Shifting Threat to U.S. Message-ID: <199809191929.MAA03111@netcom13.netcom.com> From: believer at telepath.com Subject: IP: Terrorism is Shifting Threat to U.S. Date: Thu, 17 Sep 1998 17:36:29 -0500 To: believer at telepath.com Source: USIA http://www.usia.gov/current/news/latest/98091706.plt.html?/products/washfile /newsitem.shtml 17 September 1998 U.S. OFFICIALS SEE TERRORISM AS A SHIFTING THREAT TO NATION (State Department, congressional experts outline views) (700) By Ralph Dannheisser USIA Congressional Correspondent Washington -- A State Department official and a congressman outlined the changing face of terrorism before a business group, and warned that it poses increasing concerns for Americans at home and abroad. Gordon Gray, director for regional affairs in State's counterterrorism office and Representative Jim Saxton, a New Jersey Republican, were among the speakers at a briefing for business leaders September 17 sponsored by Equity International, Inc. Gray told the group that "the good news is the decline in state terrorism." But, he quickly added, "the bad news is the same thing -- the decline in state terrorism." That seeming contradiction comes into play, Gray said, because "the decline in state sponsorship poses new problems, as we see more and more loosely knit organizations" like that headed by Saudi Arabian businessman Usama bin Ladin -- groups that by their nature are harder to get at. Bin Ladin is thought to have been behind the recent bombing of U.S. embassies in Kenya and Tanzania. Gray portrayed a mixed picture with respect to terrorist activity. On the one hand, he said, "last month's bombings at the two U.S. embassies and in Northern Ireland "painfully reinforce the dangers posed by terrorists," whose "attacks are becoming far more lethal in recent years," -- even as the critical infrastructure in our increasingly sophisticated society "becomes that much more vulnerable." But at the same time, Gray observed, "There are some positive signs." For example, he reported, the total number of terrorist incidents in 1996 and 1997 fell to a 25-year low. "It's important that we not exaggerate what the actual threat is. That's exactly what terrorists want to do" to intimidate their foes, he said. Gray cited four pillars of U.S. policy with respect to terrorism: -- a strict refusal to grant concessions to terrorists; -- a determination to apply the rule of law; -- steps to help friendly countries increase their capabilities to combat terrorism, and -- a continuing effort to put pressure on state sponsors of terrorism as well as the terrorists themselves. Would-be terrorists must be convinced that "our memories are long, our capabilities are strong," he said. Saxton, chairman of the House Task Force on Terrorism and Unconventional Warfare, told the audience of business executives there has been a distinct change in the use of terrorism in the decade of the 1990s. The United States demonstrated to foes, most notably in the Gulf War, that "our conventional capability was rather overwhelming," and so "the same group of nations with the same long term agenda had to find different ways to carry out and achieve their objectives," he said. He named Iran, Iraq, Libya, Sudan, Pakistan and North Korea as "hotbeds of international terrorist activity." And, Saxton said, it is "an unfortunate fact of life" that many terrorist nations "are beginning to avail themselves of technology that we generally refer to as weapons of mass destruction." A real threat now exists of attacks on American cities, perhaps using nuclear devices, he warned. While most Americans outside Washington have not paid much attention to the threat, it is "something we have to do for our own survival," he said. Saxton rejected the notion that bin Ladin is operating independently. "Bin Ladin is a puppet....He is paid big money to carry out acts of terrorism by the leaders of Iran, Iraq, Syria, Pakistan, Sudan, Libya," he declared. Asked why Pakistan is not on the State Department's list of terrorist states, he responded, "I can tell you they're on our (the task force's) list. We believe they're a major sponsoring state. We believe that they are one of the more dangerous sponsoring states." But the Department has resisted efforts to classify the country as such, he noted. Saxton contended that state sponsors of terrorism are spending more than $500 million a year on "groups like Hamas and the Islamic Jihad" -- organizations that he said get their funding from drug traffic, counterfeiting and "contributions from Islamist fundamentalist groups around the world" in addition to direct government payments. ----------------------- NOTE: In accordance with Title 17 U.S.C. section 107, this material is distributed without profit or payment to those who have expressed a prior interest in receiving this information for non-profit research and educational purposes only. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml ----------------------- ********************************************** To subscribe or unsubscribe, email: majordomo at majordomo.pobox.com with the message: (un)subscribe ignition-point email at address ********************************************** www.telepath.com/believer ********************************************** From vznuri at netcom.com Fri Sep 18 23:28:12 1998 From: vznuri at netcom.com (Vladimir Z. Nuri) Date: Sat, 19 Sep 1998 14:28:12 +0800 Subject: IP: ID proposal raises privacy concerns Message-ID: <199809191929.MAA03100@netcom13.netcom.com> From: believer at telepath.com Subject: IP: ID proposal raises privacy concerns Date: Thu, 17 Sep 1998 17:30:47 -0500 To: believer at telepath.com Source: Fox News - AP ID proposal raises privacy concerns 2.15 p.m. ET (1816 GMT) September 17, 1998 WASHINGTON (AP) � Lawmakers raised loss-of-privacy objections Thursday to a proposal that would use Social Security numbers to help curb the number of illegal immigrants who unlawfully get government benefits. The proposal by the National Highway Traffic Safety Administration would require federal agencies to accept, as proof of identity, a driver's license that conforms to certain standards. A Social Security number would be among the requirements. Rep. David McIntosh, R-Ind., said the measure "appears to create a de facto national ID card'' for all Americans. "With a Social Security number, anyone can find out almost anything about an individual on the Internet, including where he or she lives,'' said McIntosh, who chairs the House Government Reform and Oversight's subcommittee on national economic growth. "This technology gives stalkers and abusers easy access to their victims.'' During a committee hearing on the proposal, Celene Cross described how someone fraudulently used her name and Social Security number to obtain credit cards and rack up more than $17,000 in charges. Cross said she has spent three years trying to clear her credit history but problems continue to arise, and "I have just quit applying for credit altogether.'' Marvin Young, another panel witness, told lawmakers how a former roommate used his Social Security number to assume his identity and open more than 40 charge cards. "I've worked hard and never made a late payment in my life, but this other guy has just messed up everything for me,'' Young said. In a statement submitted to the committee, the National Highway Traffic Safety Administration said its proposal is intended to "prevent the use of state driver's licenses and other identification documents by illegal immigrants seeking to obtain benefits under federal programs.'' � 1998 Associated Press. All rights reserved. ----------------------- NOTE: In accordance with Title 17 U.S.C. section 107, this material is distributed without profit or payment to those who have expressed a prior interest in receiving this information for non-profit research and educational purposes only. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml ----------------------- ********************************************** To subscribe or unsubscribe, email: majordomo at majordomo.pobox.com with the message: (un)subscribe ignition-point email at address ********************************************** www.telepath.com/believer ********************************************** From adam at homeport.org Fri Sep 18 23:40:43 1998 From: adam at homeport.org (Adam Shostack) Date: Sat, 19 Sep 1998 14:40:43 +0800 Subject: SecDef on Crypto, Privacy In-Reply-To: <199809171833.OAA01552@camel14.mindspring.com> Message-ID: <19980919153245.A25309@weathership.homeport.org> The UNited States has long given far too much emphasis to gadget based intelligence. Theres little conflict between my privacy and a spy in bin laden's organization. Its unfortunate that senior officials are so taken with national technical means, even in the wake of their utter failure to catch nuclear test preperations in two countries, and missle construction in a third. Adam On Thu, Sep 17, 1998 at 02:26:27PM -0400, John Young wrote: | Excerpt from DoD transcription of Secretary of Defense Cohen's | remarks at the Council on Foreign Relations, New York City, | September 14, 1998: | | [Begin] | | Let me say one other thing about terrorism. We in this country | much recognize the tension which will exist as you ask us, and | we will ask all successor administrations, to protect us. And | you say, how do you protect someone against terrorists? It means | increased intelligence. It means increased intelligence, having | greater capability on the ground or from national technical | sources to find out who is planning and plotting what at what | place and what time. | | To do that is going to put us in somewhat of a direct conflict | with rights to privacy, something that we hold very dear in this | country. So the more intelligence-gathering responsibilities that | any administration is going to have, there's going to come a point | of tension and, indeed, friction between how much are you willing | to give up in order to be secure. Those are the kind of unpleasant | choices that are going to be manifesting themselves in the near | future. We haven't really faced up to it yet. We're starting to | see some of that conflict at least intellectually develop when you | see the manufacturers of software who don't like the fact that the | law enforcement, the FBI, the Justice Department wants to have some | method of getting into encrypted technology. | | You say, "Wait a minute, that's my right of privacy. I'm a | businessman or woman. I want to be able to send information out | over those -- those airwaves and have them completely protected." | Our Justice Department says, "Wait a minute, you want us to protect | you. But you're allowing criminal elements, terrorists and others | -- organized crime, drug cartels -- to encrypt their | telecommunications to the point where don't know what's going on. | And then something is going to happen, and you'll say, where were you?" | | So those are the kinds of tensions that are going to continue to exist. | But we're going to have to have more intelligence to effectively deal | with terrorism in the future. | | [End excerpt] | | Full transcript: | | http://jya.com/wsc091498.htm (49K) -- "It is seldom that liberty of any kind is lost all at once." -Hume From nobody at replay.com Fri Sep 18 23:53:03 1998 From: nobody at replay.com (Anonymous) Date: Sat, 19 Sep 1998 14:53:03 +0800 Subject: about hacking win95 passwords Message-ID: <199809191946.VAA03649@replay.com> David Parkinson wrote: > > hello, > > my name is david parkinson > > i have taken a document of an ftp on how to hack win95 passwords > > your email address was on it. in the part where it says here is a > > guick hack and then this is what it shows C source snipped. > i have no idea what that means and how it can help me hack win95 > > passwords. > > if u could help we with this it would be greatly appreciated Go to a bookstore and buy an introductory book on C programming. It might cost as much as $50, but it is more than worth your while if you are planning on messing with cryptography and cracking like this. Once you have the book, read it and then try to analyze the source code. If you are dealing with and using Windows, you will need a C compiler. Cygnus has a free Win32 C compiler out as I understand it, and Microsoft and Borland both have C compilers out for a few hundred bucks each. If you are dealing with UNIX, there is tons of source and free development utilities out there. From nobody at replay.com Sat Sep 19 00:10:01 1998 From: nobody at replay.com (Anonymous) Date: Sat, 19 Sep 1998 15:10:01 +0800 Subject: Stego-empty hard drives... Message-ID: <199809192012.WAA05755@replay.com> Robert Hettinga wrote: > At 1:01 AM -0400 on 9/19/98, Anonymous wrote: > > (Had this been a UK Customs 'inspection' of the contents of the disk, I > > might have had to explain the half-gig of "noise" I have on the disk. > > Only, it really is noise. Really.) > > This makes me think of something that I probably missed in the bowels of > someone's long previous stego posting (um, stego^stego? :-)), how would you > go about either: > > Stegoing an encrypted partition as "blank" hard drive space without > actually writing over it unless you wanted to? > > or, even, > > Stegoing an encrypted partition as not even *there* at all? > > > Doesn't seem like it would be too hard conceptually (hah!) and, if done, > might actually defeat such Archie-look-up-the-dress as the British > customsfolk are wont to do these days. > > Obviously, even if the partition were found, it would look, to sniffer > programs, as if it were empty, right? :-). Once they realize people are doing this, they will begin taking hashes or some other record of the blank space. The next time you are scanned by customs, they pull the record and compare the previous "blank" space with the current "blank" space. If they don't match, you're suspect. They still cannot prove that you're carrying hidden data. They ask you if you know what stego is. They ask you if you have hidden data on your drive. If you say yes, they demand to see it. If you say no, they say "Okay, then it should be no problem if we push the wipe button on our program, should it?" If they start doing that they have still won, because now you are not carrying the data across the border or the data is destroyed as you cross the border. From rdl at MIT.EDU Sat Sep 19 00:37:04 1998 From: rdl at MIT.EDU (Ryan Lackey) Date: Sat, 19 Sep 1998 15:37:04 +0800 Subject: ArcotSign (was Re: Does security depend on hardware?) In-Reply-To: <000d01bde407$01dc4a00$0300a8c0@sjl4120> Message-ID: <199809192038.QAA29964@denmark-vesey.MIT.EDU> [from a discussion of tamper-resistant hardware for payment systems on dbs at philodox.com, a mailing list dedicated to digital bearer systems, where Scott Loftesness, of DigiCash and Arcot Systems, mentioned ArcotSign.] You mentioned the URL for Arcot, and I looked at the site. It seems rather lacking in technical details, and makes a very strong claim -- that it can provide tamper resistance in software on a hardware/OS/etc. platform which is generally hostile (a general purpose computer). I noticed that there are some big name cryptographers signed on as advisors -- Hellman and Schneier, who make some pretty glowing comments about the product. I'm not generally swayed by anything but mathematics, physics, and logic when it comes to cryptography and security, despite generally agreeing with the analyses of those cryptographers. I can see a couple of ways you could approximate real security using untrusted hardware -- either a one time password system retained by the user (I've investigated this in the past, and it generally ends up being a hardware token or a printed book of codes), or a remote system like Kerberos where there exist out of band key protection mechanisms, or it's not real security. I'd love to be convinced otherwise, particularly if the technology will be available for others to license. I also noticed that the system is patent pending -- this would seem to rule out the existing hardware token/one time pad system, or the Kerberos-style central authentication server releasing security credentials when presented with a passphrase system, as there are decades of prior art in each encompassing all reasonable variations. I guess this means it's something new and interesting -- I'm sure everyone would be interested in details. Of course, in any system where all you do is authenticate yourself to a remote system, but you're not provided with a link directly between the user and the remote authority guaranteeing Confidentiality, Integrity, and Authentication, you can't really make any claims other than that the user has authenticated herself to some server -- any transactions the user could do are subject to a man in the middle attack, so while the user has successfully authenticated themselves to a remote server, and signed that *some* transaction is acceptable, there's really no legal assurance that the user has signed *any particular transaction*. This is far weaker than the promise of trusted hardware, where you could have a guarantee that as long as the protocol hasn't been violated, the user has authorized a *particular* transaction. This may be acceptable for authenticating access to an online retail banking web site, or corporate information, but it would not be sufficient for an actual payment system (DBS, account based, or other). Always interested in learning something new which would chance my assumptions, Ryan rdl at mit.edu From mix at anon.lcs.mit.edu Sat Sep 19 00:58:09 1998 From: mix at anon.lcs.mit.edu (lcs Mixmaster Remailer) Date: Sat, 19 Sep 1998 15:58:09 +0800 Subject: IP: School bans `no rules' T-shirt Message-ID: <19980919210002.13986.qmail@nym.alias.net> This is more evidence of government trying to indoctrinate children. We have the Pledge of Sheepegience, students encouraged to pressure anyone who doesn't conform, school uniforms, clear backpacks, metal detectors, kids being expelled for having asprin, and now students being "free" to wear anything with a message, so long as it's a government-approved message. On Sat, 19 Sep 1998, Vladimir Z. Nuri wrote: > From: believer at telepath.com > Subject: IP: School bans `no rules' T-shirt > Date: Thu, 17 Sep 1998 09:25:30 -0500 > To: believer at telepath.com > > Source: St. Paul, Minnesota Pioneer Planet News > http://www.pioneerplanet.com/news/wis_docs/010832.htm > > Published: Thursday, September 17, 1998 > > School bans `no rules' T-shirt > > ASSOCIATED PRESS > > WAUKESHA, WIS. > > A fifth grader was ordered to turn his T-shirt inside-out because it > carried the message ``No Rules,'' which the principal said promoted > disruptive behavior. What difference does it make? Schools aren't teaching kids to read anyway. Obviously, they're still learning. I suggest that we ban all literacy right now! It allows people to read disruptive texts! Fahrenheit 451 forever! Ra ra ra! > But the youth's mother said Saratoga Elementary School principal Dale > Heinen overstepped his bounds and that there was no harm in wearing such > shirts, which depict cartoon characters and carry the slogan, ``Outta my > way. No Rules.'' One would think that the fact that it's being worn by a fifth grader, and that it has cartoon characters on it would tend to make it more of a joke than anything else. > > Heinen made Cody Wilhelm wear the shirt inside-out so no one could read its > message. I guess that the kids of today aren't smart enough to read backwards either. > > ``School guidelines talk about things that are disruptive and can lead to > disruption,'' Heinen said. ``If they are portraying that in what they wear > . . . we don't want kids reflecting that attitude or promoting that type of > attitude.'' Yes. You only want them to promote attitudes which cover the government seal of approval. > Mary Wilhelm said her son's T-shirt was not disruptive and that parents > should have the right to dress their children with any clothes they want to > as long as they do not promote sex, drugs, alcohol, tobacco or illegal > activities. Oh, I get it. "Freedom for me, but not for thee." She's basically bitching because she wasn't given the decision about what rights to abridge. The funny thing about these people hating sex is that they do it, and if people don't do it the species dies. The downright sad thing about the "illegal activities" comment is that just about everything is illegal now, but she's too stupid to realize it. > She said her son went to school last year wearing one of the ``No Rules'' > T-shirts and also wore a T-shirt depicting ``Joe Camel,'' a cartoon > character formerly used to promote Camel cigarettes. School officials did > not object, she said. Wait! I thought Mary Wilhelm said that "parents should have the right to dress their children with any clothes they want to as long as they do not promote sex, drugs, alcohol, TOBACCO..." > ``He should have never worn that Joe Camel shirt, I agree, but that dealt > with smoking,'' Wilhelm said. As opposed to "illegal activities." Well, at least as the school claims. > ``This is different. I don't want to have the principal tell me what I can > and can't do with my kid.'' But you want to be able to tell everybody else what they can and can't do with their's. People like this disgust me. That includes the principal and the mother. From tomw at netscape.com Sat Sep 19 01:13:07 1998 From: tomw at netscape.com (Tom Weinstein) Date: Sat, 19 Sep 1998 16:13:07 +0800 Subject: Questions for Magaziner? In-Reply-To: Message-ID: <36041E82.F4F072ED@netscape.com> > Arnold G. Reinhold wrote: > > One question I'd like asked is whether the US Gov will approve 56-bit RC-4 > for export on the same terms as 56-bit DES. That would allow export > versions of web browsers to be upgraded painlessly, making international > e-commerce 64 thousand times more secure than existing 40-bit browsers. > (56-bit DES browsers would require every merchant to upgrade their SSL > servers and introduce a lot of unneeded complexity.) Actually, it wouldn't be any easier to deploy 56-bit RC4 than DES. Either would require roughly the same changes to both clients and servers. -- What is appropriate for the master is not appropriate| Tom Weinstein for the novice. You must understand Tao before | tomw at netscape.com transcending structure. -- The Tao of Programming | From nobody at remailer.ch Sat Sep 19 01:21:40 1998 From: nobody at remailer.ch (Anonymous) Date: Sat, 19 Sep 1998 16:21:40 +0800 Subject: Clinton's fake apologies (fwd) Message-ID: <19980919212126.20210.qmail@hades.rpini.com> Jim Choate wrote: > > nobody at remailer.ch wrote: > > Subject: Re: Clinton's fake apologies (fwd) > > > Presumably he should lie to protect the state. > > Then don't take the oath: > > To tell the truth, the whole truth, and nothing but the truth. > ... > > So lieing per se isn't the problem. > > No, it's the fact that he took an oath to tell the truth and didn't. > > > Murky water > > for impeachment, methinks. > > Then you don't think very well. > What? To tell a lie is one thing, but if you preface it with "I'm telling the truth", then that is really really bad? I still think you're drawing a very fine line. I'm honoured to draw an ad hominem before revealing that I'm on AOL. -- an anonymous aol32 user. From nobody at replay.com Sat Sep 19 01:29:30 1998 From: nobody at replay.com (Anonymous) Date: Sat, 19 Sep 1998 16:29:30 +0800 Subject: A question from Seattle Message-ID: <199809192123.XAA11533@replay.com> On Sat, 19 Sep 1998, Thompson, Christopher W NWS sent to the Cypherpunks list, a haven for the freedom loving, alot of cryptographers, and those of non-Freeh thinking: > > hey, I'm a 28 year old living in Seattle and I've been having quite the > fantasy of watching and or participating in father/son activities...or big > brother and little brother interaction. Do you have any suggestions > where/who I might contact in the Seattle metro area? > > Thanks > > You can start with your CO and the FBI. I'm forwarding this to them for your convenience. It's all part of the service. From aba at dcs.ex.ac.uk Sat Sep 19 01:44:59 1998 From: aba at dcs.ex.ac.uk (Adam Back) Date: Sat, 19 Sep 1998 16:44:59 +0800 Subject: Toto knows how to make a 0xdeadbeef attack? Message-ID: <199809192107.WAA25895@server.eternity.org> As a result of my trawl through my cypherpunks archive last week looking for publically posted private keys by Toto et al, I grepped out a selection of encrypted messages sent to the list. I thought I'd have a go at decrypting these with the selection of passphrases John Young posted earlier today, in case any were encrypted with the publically posted keys, or with a conventional encryption key. I came across this post [1] posted in 5 Sep 97 which contains this encrypted message, and "challenge" to decrypt it. Now if you try to decrypt it, it says you need key 0xE6A9C799, the public key for which is on the key servers. However keyids are actually stored as 64 bits, internally to PGP messages, but only the least significant 32 bits are displayed by PGP normally. I use pgpacket to look at things and it gives you all 64 bits, the message has keyid: 0xAA33463CE6A9C799 however the key I got off the keyserver [2] has keyid: 0xAA33063CE6A9C799 which differs by 0x400000000000 or one bit. That would require knowing how to create a 0xdeadbeef key or at least use software to do this, if it is available. Unless the bit flip is part of the "challenge". Who knows. Toto did allude to hacking skills, though largely claimed ignorance. I wonder if this was feigned, or if there are other Totos who are doing the key hacks etc. eg this challenge out of bureau42.ml.org remailer. Toto is a one man computer crypto forensics persons full-employment insurance! -- the amount of stuff posted to the list with various passwords, keys, etc. The IRS guys must be either hiring some one who knows crypto, or are going to be seriously confused at this point. Then there's the use of S-Tools, they must be going boggle eyed guessing passphrases for S-Tools for all the images ever posted anonymously, or pseudonymously to the list. One wonders almost if this was his aim. Any hints Toto(s)? Firstly I haven't got the private key(s) for 0xAA33[0|4]63CE6A9C799, and secondly, what's the deal with the bit flips/0xdeadbeef attacks? My september forward secret key is below [3]. It is authenticated by my high security key, and 12 days time or so, the private key gets wiped. Adam [1] ====================================================================== Date: Fri, 5 Sep 1997 17:31:53 GMT From: bureau42 Anonymous Remailer Comments: This message did not originate from the Sender address above. It was remailed automatically by anonymizing remailer software. Please report problems or inappropriate use to the remailer administrator at . Subject: EFF $10,000,0000 Challenge To: cypherpunks at toad.com Sender: owner-cypherpunks at Algebra.COM Precedence: bulk X-Mailing-List: cypherpunks at algebra.com X-List-Admin: ichudov at algebra.com X-Loop: cypherpunks at algebra.com The Electronic Forgery Foundation is proud to announce a major breakthrough in encryption technology -- Forged Encryption. We are offering a prize of $10,000,000.00 for anyone who can correctly decipher the following Forged Encryption message. -----BEGIN PGP MESSAGE----- Version: PGP for Personal Privacy 5.0 MessageID: od2CIT3fELE7K6bkIkKGJBj0MPUJ2TT8 hQCMA6ozRjzmqceZAQQAh02x0Dxer5vzZiSJ+v7bnMZQdgp425z5OH0NF/f/mXXc vInw+UsuTXqWNEV5rEQKYjU3qHoe6suCz5f9hEEnOIBacsD28pYU4ahkGOCTuTY6 N3xKrtDRqLPInB8PY7Kfd56jjQsVVRKmJBwXqHbPax4YyUB6ZbKKvSPiuUsAAQSl BAH3CFNKcmYjf+VtpjAVOpDNM/PMm1e6m33rZ01Sq6pXC0TTabCf7hkWscet0PCL VX0l1Zw5IKaFqo+pZ3EICRMF6HQrc30G7L9TFeKr//3YsO3/bC4VBgNQHA0qf2nD ldxAsTGPlRthBTxrzE0LjeOKi/pQOLXQMPQUwEIaL9rncjFgniplFoL6Nj0guJvW VvS+gxth8hpeWss7WlFFioV0vShsS/lahA+eg/9nVy8ken8pr4m484w2vwoiSdce CarVigVaRh6tCgh0jub7CHuDFg== =Q9+G -----END PGP MESSAGE----- The EFF doesn't have a copy of the correct answer locked away in a secret underground cave in Tibet, for verification, because the above Forged Encryption message is just a bunch of crap we typed in pretty much at random. Does the government want to keep your private key in escrow? Give them a copy of your EFF private key. Hell, give them _two_ copies, in case one is corrupted.{;>) Smile when you give them to the government agent. Ask him how his day has been. Offer him some coffe, and ask about his family. Tell him you will send him a Christmas card with another copy of your EFF private key, just in case the government misplaces the copies you gave them. Put your hand over your heart, salute the flag, and sing "God Bless America" as the government agent leaves. Then fart. Use the EFF Forged Encryption sofware regularly, to send messages with Subject:'s like "The Plot Against the PREZ," "Confirmation of the date of our armed assault," "The Nuke has arrived." Keep a copy of your EFF Forged Encryption secret key in a directory named "Off the Pigs." Most importantly, never reveal in your private email to others that you are a deaf, dumb and blind quadraplegic who has been homebound since birth. That way, the outrageous claims that government agents make against you in their secret deposition for a warrant to kick in your door and terrorize you will look all the more foolish during your trial. We at the Electronic Forgery Foundation realize that some of you wise guys are thinking that, for $10 million, it is well worth your while to write a program that will decipher the above message into something meaningful. Well, knock yourself out, dudes, but if you think that known forgers couldn't possibly be lying about the $10 million, then go directly to http://www.clueserver/fucking_idiot, do not pass GO and do not collect $200. --------------------------------------------------------------------- This message is copyrighted under the auspices of the Electronic Forgery Foundation. Any misquoting, misrepresentation, or other abuse of this message would be greatly appreciated. Hell, you can tell people you wrote it, if you want to. We don't really care. --------------------------------------------------------------------- [2] (long)keyid 0xAA33063CE6A9C799 (Toto ) -----BEGIN PGP PUBLIC KEY BLOCK----- Version: 5.0 Comment: PGP Key Server 0.9.3-db2test mQCNAzMs140AAAEEAL1CAoB5pd97hIOoT6L0v05Ov8nw0unf0db6NXZ91EJAyq9p DoPGJl7Z6m5McIsNI2DrCEEt7KYdt0ZIGcqqK2gmCePYI0oQOFj+jznI3jKXg1k2 R+ngk+cUn21EfrNXFGPk1Tuc1/3Qib6cX6BZRJvvz1FNYNt/zqozBjzmqceZAAUR tBtUb3RvIDx0b3RvQHNrLnN5bXBhdGljby5jYT6JAJUDBRAzgrFaG9qyus40wB0B AeagA/47sR2GW3y/e3z63ZHqvZwsrNZabNtVsLU6QoEfomfOc0ViI+RY3w5dAjQI 62zCSj/DXaLEwYGNbqVcwjlos5STdoxFqRHpHf6hLCZSNjUaIqY19n0U0qTs6Hw4 WuRURrbMLJYVEgiZpRynmMPnwQ+1USQ1MV6MevboXeJ08lHoDYkAlQIFEDM9HqMi iRpDQSB+5QEBHJYD/0/VRUy8EAZdjjzx/82+zUJmen9rRI3EQtd+kzInP9V13ZG5 qFFihznQJukXX9A53g9l4RbZo1P+yHF+bdD3OnEbPIWDL/+0Rd3DZp53N1Pigw6A MGoyvNzYt83zNaoXlxYksBIirBusiSbJlHotQLGYTv1aaBGVAYAd8zDALdYtiQA/ AwUQM4KBc4I3FG4quJ9UEQLr0QCdFQDsbIKVKU6f5olwRSACnq/YtJoAnig/jD9Q c8CVTPsw++ok1kWZeqXViQCVAwUQM4J+6pfboLn8NWjNAQGTigQAnrFZ8OiAguWq i1LsClKo0t9y+Ly98EPnpBt2FgQN9/Z8PSZjPqEn9AJk7Z5TBhGJNXBmkULiuNA9 zvGTsRM0S7Oi6/WFUcL9rio6gMsxTnDythGaFa5YDQXgXtFxqcjsojGhe922KFnV i4xxatO9vm9Zo3JaNAK8zvg2rIrd7VSJAJUDBRAzgn8PsF+MkGb7jGUBAYbmBACV tqTdmo9Zu/e9hpEL1FQXnp1qzKilzchxf+9/mBmbCy6O/QKVkdUTptkYMVyUHh0q 1KJV4caZIx3vQyeRsK7Fe5vex38LzN9lcP99lOE9Y8nns1bwaiUONe1McWEtkEkG SMi3FaIxRCb4f5ENjRV8EzydQbHD5+Pyp0+gw9LuXIkBFQMFEDOC1g34yQH5HnUh EwEBoHAH/RDpelRJCSEtRC7upHwGbfuZL3RhlgXomiOL5plSn2i2El7hm1k1UKcG UHvcz1ni2deWRK/qLle9xN8wXIjZMATWJLfeSoSpZoq8yFKdN+r2fkpwyN4h6hmb SI0DBm73eiO7cIRgxszpQDnI5uhTp083JUX/dtFlBMtr/XsIBfg6PN6pYYIAZ1cn pqkKHHFpdJe3+/AIHzw53nJUKm8EX+Bui1EOfljB63U6oP+Q1F3Wo0C1PaN/9Hbo 3IkVSLC1i3JUQwjh0moFuB+ZeLUFTxBwp+F2Y1AcvQT6JJW529WPTXOvfT2/+wU7 uVaynaHMum8snzPWMr5v0dQbq+6+OPU= =leOK -----END PGP PUBLIC KEY BLOCK----- [3] Type Bits/KeyID Date User ID pub 2048/86B519BD 1998/09/10 Adam Back (FS key, Sep 98) -----BEGIN PGP PUBLIC KEY BLOCK----- Version: 2.6.3i mQENAzX3ILwAAAEIAL368F4iaAlWFsXFUXdgSttJaHpjcLXmqZP93FlhQRyhSco6 6wyTWEa0UQ25ynf/r/sh4Z7/xjD+HSUUCnpLDJnN9143JUO1UbDIGTq3vC+uKJjr 1OnZQMI0SOrpdUUvbz9zyC2Zsj+CACGbX+sFpecT/XxMpSeEbfoNoy5+AWjB7eIa 27qloHFGRZrDfFvewaSybck21PGVEwkTrpBQ4Yf1RGDod+Xe079jq79uZNNDgnTN UaFXFS0BmH0nJmjWE5/QkNsgy0aPuFcR65TKn54Fj7e82g1ScEYlwS3iRBuebpAU pH81flyI4qr9dvBatcpQXut+PxXT+mQxbIa1Gb0ABRO0LUFkYW0gQmFjayA8YWJh QGRjcy5leC5hYy51az4gKEZTIGtleSwgU2VwIDk4KYkBFQMFEDX3IQ0+e8qoKLJF UQEBhH4H/3u1USAlPwbGPMfMwZwBU4uCm6EPf03LKgtGa/elSn8nvrSbRrvLVdnQ aQWJBQpLegUkDlrd0LG9guGdaEJxJ3pZteeaDuC9WeHJWBuUbiyrNooTk7QGeVM1 9yTAW9zaHW/NpXSYL45XfHYuYrKiX50gAY+CSc3rE4Ei++R0gTAwRnS9JkKqsdzP CJThyy+ppteG5d7aw8L26AQQGUvcZKR3wTvGpGAfU6bZo1gmvnloSYelbxvUfkq2 ybHBZWXj7iBRPwTT6przBVp3DaCm8/gOzUBxvJZkoDsbf/iVBX/Qf8sVGq/86ksB /JmE7cAVNveJ+a9wx4kTNVmjP7Aciao= =vpQX -----END PGP PUBLIC KEY BLOCK----- From hallam at ai.mit.edu Sat Sep 19 01:55:03 1998 From: hallam at ai.mit.edu (Phillip Hallam-Baker) Date: Sat, 19 Sep 1998 16:55:03 +0800 Subject: Questions for Magaziner? In-Reply-To: Message-ID: <003c01bde417$497a3b50$0100000a@goedel.socrates.co.uk> > Okay, so the short precis on Magaziner's answer to my question about > encryption controls, foriegn or domestic, is he's agin it. > > He says that controlling foriegn encryption is impossible, and controlling > domestic encryption is, at the very least, unconstitutional. This is way beyond what I expected. If I had expected him to go beyond what he said at the MIT Media in Transition forum earlier this year I would have made every effort to attend. Essentially at MIT I tried to put words in his mouth by stating what I knew he had said in private and adding that if he agreed then Freeh would insist that one or the other of them go. He was not at that time able to say anything more, although he did not leap to the opportunity to push the Freeh line. > He says that the reason the administration's encryption policy is so > convoluted is that the law enforcement and the "economic" > encryption camps, > anti, and pro, evidently, is that the two sides are at loggerheads. This statement in and of itself is not the type of thing I would expect unless either Magaziner is planning to jump ship or he knows that he can get away with it without retribution. If it is the latter it would indicate that Freeh has very much less influence than he did 6 months ago. Not exactly a ringing endorsement of our position but something that can be used against spokesmen for the FBI party line. All in all I would prefer allowing the crypto export laws to time out, becomming progressively less relevant until they disappear than have bills appear in Congress. However good the bill that goes into congress the result will be at best a compromise. Phill From tjunker at phoenix.net Sat Sep 19 01:55:42 1998 From: tjunker at phoenix.net (Thomas Junker) Date: Sat, 19 Sep 1998 16:55:42 +0800 Subject: Going Cashless: Bank ends ECash trial period Message-ID: <199809192137.QAA24495@sneety.insync.net> Paul Gillin Editor in Chief Computerworld Dear Paul: The Computerworld article in Online News, 09/17/98 12:16 PM, Bank ends electronic cash trial By Mary Lisbeth D'Amico http://www.computerworld.com/home/news.nsf/all/9809174ecash is a good example of today's low standards in journalistic accuracy. Ms. D'Amico failed utterly to comprehend what Mark Twain Bank's Digicash program was. She wrote: Customers gave the bank their credit-card information only once, then created electronic "coins" at the bank, allowing them to make small purchases -- or micropayments -- of goods over the Internet without having to enter a credit-card number each time. Ms. D'Amico evidently confused the Digicash program with other, dissimilar Internet transaction mechanisms that are substitutes for passing credit card information over the public Internet. In fact, the Digicash program HAS NOTHING TO DO WITH CREDIT CARDS OR CREDIT PURCHASES. Is that clear enough? Digicash provided the means to move money on deposit with Mark Twain Bank into an electronic "purse," from which it could be spent with merchants equipped with Digicash software. No credit. No credit cards. No necessarily "small" purchases. Ms. D'Amico's profound leap of misunderstanding misinforms and misleads readers. It also rather completely vacates the presumably explanatory comment she attributes to the Bank's new owner's representative, Beth Fagen: Fagen also cited the changing climate in the U.S. for Internet payments. When the trial was started in 1995, she said, "people were more fearful of using credit cards to pay for things over the Internet. Now that seems to have disappeared." Had Ms. D'Amico understood the nature of Digicash, she may have questioned Ms. Fagen about the apparent non sequitur. If Digicash had nothing to do with making credit transactions "safer," why would decreasing public fear of using credit cards on the Internet have anything to do with Mercantile's decision to abruptly discontinue the Digicash program?  The key fact completely overlooked, the one thing that distinguished the Digicash program from all the look-alike credit-card protection schemes, was the anonymity of the purchaser. Ms. D'Amico mentions it in passing as if it were merely a curiosity. In this increasingly fishbowl world, online purchases, particularly of intangibles such as information, are subject to tracking and record keeping that is clearly, demonstrably, becoming a danger to the privacy and well- being of the online public. It is to be expected that products and services such as offered by Digicash will find an increasingly enthusiastic market as the private and governmental abuses of information gathered on line become more widespread and more widely known. Digicash, by the way, was never considered a true "micropayment" system. Micropayment refers to the facility of trivially making and accepting payments as small as 1/100th, even 1/1,000th of one cent. No such systems have yet been fielded, and no credit card system can come anywhere close to the low transaction cost required to permit micropayments for access to Web pages, articles, or the use of minor online services such as HTML verifiers, graphic button builders, etc. It is only a matter of time before such systems become available, and they will likely be both anonymous and unrelated to credit cards. Ms. D'Amico will no doubt report the advent of such systems as yet another advance in the use of credit cards on the Internet. But then, Computerworld is the outfit that used to heavily promote the idea of trade unions for programmers and data entry clerks, the "Certified Data Processor" program, and trumpeted the release of virtual memory by IBM some ten years after it had been fielded by Burroughs Corp. Mitigating that last, the same issue of Computerworld carried a small, back-pages article about Burroughs' virtual memory, with a picture of staff at a B-5000 site celebrating the anniversary with a birthday cake bearing ten candles. Regards, Thomas Junker tjunker at phoenix.net http://www.phoenix.net/~tjunker/wang.html The Unofficial Wang VS Information Center From hallam at ai.mit.edu Sat Sep 19 01:55:47 1998 From: hallam at ai.mit.edu (Phillip Hallam-Baker) Date: Sat, 19 Sep 1998 16:55:47 +0800 Subject: Questions for Magaziner? In-Reply-To: Message-ID: <003d01bde417$4b30ec00$0100000a@goedel.socrates.co.uk> > "With all the demands from Governent to escrow keys, what steps are being > taken to protect the these keys and/or backdoors from misuse from people > within the Government and those outside of the Government?" > > "Would you use escrowed cryptography for your private communications? Who > would you trust to hold those keys?" We have an answer to this one, unfortunately drowned by the various sex scandals of assorted congressional chairmen (and other sex scandal trivia). Mr Freeh recently testified that he wanted access to private communications and was immediately contradicted by the Vice President who stated that Freeh was expressing a personal opinion and not administration policy. Whitehouse spin or a sign that Freeh is loosing his grip? Freeh's attempts to ingratiate himself with the republican party have done him no favours of late. Phill From nobody at replay.com Sat Sep 19 02:20:56 1998 From: nobody at replay.com (Anonymous) Date: Sat, 19 Sep 1998 17:20:56 +0800 Subject: IDEA(tm) weakness? Message-ID: <199809192204.AAA15005@replay.com> Title: Privacy Page Privacy � How private is your electronic communication ? [taken from the PGP FAQ] You should encrypt your e-mail for the same reason that you don't write all of your correspondence on the back of a post card. E-mail is actually far less secure than the postal system. With the post office, you at least put your letter inside an envelope to hide it from casual snooping. Take a look at the header area of any e-mail message that you receive and you will see that it has passed through a number of nodes on its way to you. Every one of these nodes presents the opportunity for snooping. Encryption in no way should imply illegal activity. It is simply intended to keep personal thoughts personal. Do you trust your mail servers/gateways/virtual redirects ? With the increasing use of virtual email accounts which allow you to keep the same email address no matter if you change jobs, ISPs, etc, the opportunity for snooping increases. Is PGP secure ? PGP uses acombination of IDEA, RSA and MD5. RSA is used to allow the transfer of session keys and MD5 is used to generate a unique message digest from the passphrase for generating the IDEA key and signatures. IDEA is the core algorithm used to encrypt the actual message. Thus the security of IDEA is also means the security of PGP . Is IDEA secure ? The IDEA algorithm (patented by ASCOM) is the core algorithmm used in PGP. It is based on a rotating 128 bit key split into 16 bit segments. The algorthm converts 64 bits of data at a time using the following operations '+', '^' (exclusive-or) and '*'. The formulas are : 64 bit data => D1, D2, D3 and D4 (all 16 bits) => K1,K2,K3....rotating extra 25 bits after all 128 bits are used There are 2 phases in each round and 8 rounds in total + 1 final round of just phase 1. Phase 1: R1 = D1 * K1 R2 = D2 + K2 R3 = D3 + K3 R4 = D4 * K4 Phase 2: E1 = R1 xor (((R2 xor R4) + ((R3 xor R1) * K5)) * K6) E2 = R3 xor (((R2 xor R4) + ((R3 xor R1) * K5)) * K6) E3 = R2 xor ((((R2 xor R4) + ((R3 xor R1) * K5)) * K6) + ((R3 xor R1) * K5)) E4 = R4 xor ((((R2 xor R4) + ((R3 xor R1) * K5)) * K6) + ((R3 xor R1) * K5)) Given a large random data message (ie 1000 samples - 64*1000 = 8Kb file). The distribution of the above operations can be used to break the key. ie both the '+' and the '^' operations give an even distribution but the '*' operator gives a biased distribution towards '0'. Distribution (where '*' has a bias towards 1 of a) R1 = a R2 = even R3 = even R4 = a (a5 & a6 are the bias for K5 and K6) E1 = (bias a5) * (bias a6) E2 = (bias a5) * (bias a6) E3 = (bias a5) - (2 * (bias a5) * (bias a5) * (bias a6)) + ((bias a5) * (bias a6)) = (bias a5) * (1 + (bias a6) - (2*(bias a5)*(bias a6))) E4 = (bias a5) - (2 * (bias a5) * (bias a5) * (bias a6)) + ((bias a5) * (bias a6)) = (bias a5) * (1 + (bias a6) - (2*(bias a5)*(bias a6))) Also as the '*' operator is biased towards its own bit for the result '1' - approx (60% to 100% depending on bit position). [Working from the low bit upwards will provide an even greater approximation as then you would have the relevant Key bits against a random data. ie for 1st bit, it is 100% dependant on the bit for a '1',...] eg using a simple 3x3 matrix on second bit, gives (only demonstrating the ratio): ���� if K bit is 1 => bias a ~ (2/8), if K bit is 0 => bias a ~(1/8) ==> We can determine when : K5=0 and K6=0 as (bias a5) and (bias a6) will be at their highest ==> E1 & E2 are highest K5=1 and K6=1 as (bias a5) and (bias a6) are at their lowest ==> E1 & E2 are Lowest To determine between K5=0,K6=1 and K5=1,K6=0. K5 can be determined by check with E3 & E4 as they are both equal to : (bias a5) * (1 + (bias a6) - (2*(bias a5)*(bias a6)))� => directly relate to (bias a5) => K5 =>When K5=0, both E3 & E4 will be low. => When K5=1, both E3 & E4 will be high. � The Key rotation start bits are : Phase K1 K2 K3 K4 K5 K6 1 0 16 32 48 64 80 2 96 112 25 41 57 73 3 89 105 121 9 50 66 4 82 98 114 2 18 34 5 75 91 107 123 11 27 6 43 59 100 116 4 20 7 36 52 68 84 125 13 8 29 45 61 77 93 109 final 22 38 54 70 n/a n/a � Working backwards with these distributions you can deduce the key. ie work out K5 (93..108) and K6 (109..124) from its distribution pattern [using just the distributions for E2 & E3, as E1 & E4 have had the '*' operation applied in the final phase], then with K5 and K6 work out K1..K4 (22..85). You now have the key values for K1 to K6 !!!. Modify the Samples such they are back a phase and repeat (ie for each sample work backwards using known K1..K6 to find the E1..4 values). MAJOR ASSUMPTION : Assume that a large random sample provides a close to� even distribution at the end of each phase (For E2 & E3) such that the bias (ie a5 & a6) used to determine E2 and E3 are the only significant factors. Reasoning : If the distribution is not even, then it is very much easier to break (ie only the key values can cause the change in distribution pattern => know the pattern, know the key). I have developed a program which does just this (NOTE: not tested with real PGP data, as I have not had the time to investigate how the PGP file is structured, ie where the IDEA code starts and ends). It is available under a copyleft license similar to GNU. The Java Source code can be found at : [Application will not be released until beginning of 1999 when enough people are aware of the potential problem, and solutions are widely available - thus the threat to the general users privacy is kept to a minimal. Software houses which would like a delay in the release of this application so as to provide a solution should email: SGOSHA33 at mailexcite.com with their request] � What can we do ? The above crack works because there is a large sample involved. If however you pre-encrypted the file such that you got your pre-encrypted file and a key file, where this key file is small and contains only the key required to open the pre-encrypt file. You then PGP the two files, this would make it much harder to break as the key file cannot be broken from the sampling technique descibed above. I have developed an application which does just that. It is available under a copyleft license similar to GNU. The Java source code can be found here : kiss.zip To run the application you will need Java installed on your machine. Place the files in a directory named KISS. The command line is : java KISS.kiss e ����������� - encrypt java KISS.kiss d ����������� - decrypt (do not add the kiss extension to the filename) After encryption you will get 2 files. The '.kiss' file is the encrypted file and the '.lips' file contains the key used to encrypt the file. You should then encrypt both files with PGP. � What is in the pipeline for the future ? Task 1 The above 'kiss' pre-encryption is not 100% safe from non-bruteforce cracking !! As the majority of files encrypted are text messages which are based mainly on the characters 'a' to 'z' thus the Ascii codes of the characters are of the form � 011xxxxx. From this you can see that the rotating distribution as used above will tend toward '1'. Thus with enough samples they can deduce the key with the simple equation. KeyValue xor 1 = CommonValue ==> KeyValue = !CommonValue To prevent this my next application (codename Stable) will be a stabiliser program which will ensure that the distribution of the data has an even distribution. Target Release Date : 30/9/98. Task 2 The integration of both 'kiss' and 'stable'. Target Release Date : 15/10/98. Task 3 Port of both kiss and stable to C/C++ (for speed and also for Task 4). [Wrote Kiss and Stable in Java to test the speed of Java and also how it handled bit manipulation operations]. Target Release Date : 31/10/98. Task 4 Integration with PGP to provide uses with a much easier encryption method. Target Release Date : 31/11/98. Author : SGOSHA33 Return to Albert's Home Page. From aba at dcs.ex.ac.uk Sat Sep 19 02:38:04 1998 From: aba at dcs.ex.ac.uk (Adam Back) Date: Sat, 19 Sep 1998 17:38:04 +0800 Subject: CHALLENGE? Toto/signature attack w. unpublished public key In-Reply-To: <199809191948.VAA03878@replay.com> Message-ID: <199809192228.XAA26533@server.eternity.org> Anonymous writes: > > So next we would like to solve: > > > > s ^ e mod n = m > > > > or in other words find e, k and n st: > > > > s ^ e - m = k * n > > In addition it has to be that n is the right length based on the "s" > padding. This limits it to an 8 bit range, in this case 1024-1031 > bits. The constraint I gave was that log(n) = 1024. Bear in mind that the msbyte of s = 0x08, so we know that n > s, and I think we know that n < 2^1024 also based on the s padding from the signature. So based on this n would be in the range 1020 - 1024 bits, right? > If you make n be a product of a bunch of small primes, so that you > can make signatures with it, then a third party can detect this and > know it is bogus. He has to factor your n to determine that it is bogus though? This would imply that he had more compute than you do. (Not unreasonable threat model mind). > Also, this approach won't match the keyid of the original signature. Agree. Weak counterpoint is that the keyid is not authenticated, though if IRS have a key, they know it's keyid, and if that keyid is the one posted (unauthenticated inside the armor 0xCE56A4072541C535), this tips the probability of authorship towards the key they have. This though is perhaps not incontroverible proof, if one posits that Toto or unknown others were trying to create a complicated mess for people to confuse themselves analysing. Evidence suggests that this was/is the case: there are other messages, for example one with a signature with what is perhaps a 0xdeadbeef attack against a key on the keyservers, with the same 32 bit keyid, but a 64 bit key id differing by 1 bit. Another key which almost but not quite makes sense to PGP (a few bits twiddled). Plus lots of still undecrypted encrypted messages posted to the list, plus possibly stegoed images posted (one image was posted together with a password which was also publically posted together with instructions for recovering using S-TOOLS4.ZIP (a stego package for windows), and lots of other anonymously and pseudonymously posted images.) (One of the encrypted keys which passphrases were forwarded to the list for just today had been posted to the list over a year ago -- Carl Johnson couldn't have posted the passphrase because he is incarcerated). > Another approach is to generate an n such that the discrete logarithm > is solvable mod n. Then you can solve for e in s^e = m mod n, with > the base of the discrete log being s. Doing this you can match the > keyid and size of n without too much difficulty. Yes! Excellent. This construct (discrete logs over composite modulus to allow the same operation) is used by the identity based crypto people. The trap door is not that good, because 512 bit discrete logs are as you suggest rather expensive to compute. > Unfortunately e will not be small; it will be about the same size as n. > There are one or two keys on the public keyring which have large e's, > apparently generated by hacked versions of pgp. Some people feel > safer with random e than a small e. So this could perhaps be accepted. It's not a hacked version of PGP, I've generated such keys myself also: it is just a lesser documented feature of pgp2.x, (pgp -kg 1024 768) would give you a 1024 bit n and a 768 bit e). > (OTOH given two keys that both sign the same message, one with a small > e and one with a large one, it is obvious that the first is the legit > one and the second is the cloned one.) Not so obvious with the other key tinkering which has been going on here. It seems likely that Toto et al were purposefully trying to sow confusion, and seem to delight in leaving little clues to people trying to understand it looks like this strategy has been operational for over a year now (some of the encrypted messages which passphrases were forwarded to the list for just today had been posted to the list over a year ago -- Carl Johnson couldn't have posted the passphrase because he is incarcerated). > Unfortunately with a 1024 bit RSA modulus it is not going to be > feasible to solve 512 bit discrete logs using a reasonable amount > of effort. However by using more factors in the RSA modulus it should > become practical. The number of factors needed will depend on how much > resources you have to work on the discrete log. Resources available: one low end pentium based linux PC? :-) Just that the attack is clearly feasible is interesting though a demonstration would be perhaps more convincing to less technically aware IRS people. The biggest resource overhead is implementing that lot though, unless there exist packages or libraries which already do most of it for you. > Once you have your n and e you can sign other messages with the key. > The n looks OK from outside because the fact that it has more than two > factors is not detectable, as long as its factors are not too small. > Actually there may be a way of distinguishing n's with two factors from > n's with more, check into this. > > Also check into whether n's of this form can be factored via a p-1 > factoring attack. It may be that making the discrete log easy also makes > the modulus factorable. I think the answer to that is yes. In connection with previous discussions of implementing forward secrecy using identity based crypto (search archives for cypherpunks / coderpunks /cryptography for posts with Subject: non-interactive forward secrecy / identity based crypto ) another Anonymous describes some of the identity based crypto papers on this topic, which suggests another method of being able to compute discrete logs mod composite n. : Maurer describes an alternative set of parameters as well. Rather than : choosing small primes for the discrete logs, larger primes with a : special form are used which make the problem easy. This is based on the : Pohlig-Hellman discrete log algorithm, which applies when p-1 has all small : factors. The problem is that there also exists a p-1 factoring algorithm : which works when p-1 has all small factors. However the former algorithm : costs the square root of the size of the factors, while the later takes : work proportional to the size of the factors themselves. This gives a : window where the discrete log can be done but the factoring will fail. : : For this embodiment, Maurer suggests a modulus which is the product of : two primes, each 100 digits (333 bits) in length. This will produce : a 666 bit modulus. Have each of the primes be such that (p-1)/2 is a : product of several 13-15 digit (43-50 bit) primes. So it could be done, I think, and in such a way that you have lower cpu overhead than the attacker trying to prove one key more likely than the other. Adam From aba at dcs.ex.ac.uk Sat Sep 19 02:38:11 1998 From: aba at dcs.ex.ac.uk (Adam Back) Date: Sat, 19 Sep 1998 17:38:11 +0800 Subject: (fwd) Re: CHALLENGE? Toto/signature attack w. unpublished public key In-Reply-To: <199809191052.LAA19676@server.eternity.org> Message-ID: <199809192139.WAA26471@server.eternity.org> [I thought I posted the post Anonymous is replying to to cypherpunks & cryptography. He however seems to have followed up to coderpunks.] Here [1] is a suggestion from Anonymous which sounds technically good, an improvement over my approach to finding additional keys capable of signing the message, it shows that quite plausibly one could generate another key which could have signed the message in question. Hope Carl Johnson can get a technical expert with enough smarts to understand the below, and express this if it is necessary. Adam [1] Forwarded message from coderpunks: ====================================================================== Date: Sat, 19 Sep 1998 21:48:07 +0200 From: Anonymous Comments: This message did not originate from the Sender address above. It was remailed automatically by anonymizing remailer software. Please report problems or inappropriate use to the remailer administrator at . Subject: Re: CHALLENGE? Toto/signature attack w. unpublished public key To: coderpunks at toad.com Sender: owner-coderpunks at toad.com Precedence: bulk A very interesting problem... Adam Back writes: > This post discusses the possibility of generating a RSA public key n, > and e given a signature s on a message m creating using an unknown > (unpublished) n and e. A message and signature whose validity has > some bearing on a current IRS investigation is given as a target for > an attack if such an attack is feasible. > [...] > So next we would like to solve: > > s ^ e mod n = m > > or in other words find e, k and n st: > > s ^ e - m = k * n In addition it has to be that n is the right length based on the "s" padding. This limits it to an 8 bit range, in this case 1024-1031 bits. There are two approaches here. First, the one you are doing: try different e values and factor s^e - m until you find one which looks like it could be a plausible k * n. The problem is that n is supposed to be the product of two large primes, and if it is, you won't be able to factor it. So you might be able to create a public key which looks reasonable, but you can't create a private key which does, one which is a multiple of two large primes. If you make n be a product of a bunch of small primes, so that you can make signatures with it, then a third party can detect this and know it is bogus. Also, this approach won't match the keyid of the original signature. Another approach is to generate an n such that the discrete logarithm is solvable mod n. Then you can solve for e in s^e = m mod n, with the base of the discrete log being s. Doing this you can match the keyid and size of n without too much difficulty. Unfortunately e will not be small; it will be about the same size as n. There are one or two keys on the public keyring which have large e's, apparently generated by hacked versions of pgp. Some people feel safer with random e than a small e. So this could perhaps be accepted. (OTOH given two keys that both sign the same message, one with a small e and one with a large one, it is obvious that the first is the legit one and the second is the cloned one.) If you know the factorization of the size of the exponentiation group mod n, and all the factors are small enough, you can solve the discrete log problem mod n. You solve the discrete log separately for each factor and then combine the results. With an RSA modulus, the group order is LCM(p-1,q-1), or equivalently (p-1)(q-1)/GCD(p-1,q-1). If you were able to solve discrete logs mod p-1 and q-1 then you could solve discrete logs mod n. Unfortunately with a 1024 bit RSA modulus it is not going to be feasible to solve 512 bit discrete logs using a reasonable amount of effort. However by using more factors in the RSA modulus it should become practical. The number of factors needed will depend on how much resources you have to work on the discrete log. Once you have your n and e you can sign other messages with the key. The n looks OK from outside because the fact that it has more than two factors is not detectable, as long as its factors are not too small. Actually there may be a way of distinguishing n's with two factors from n's with more, check into this. Also check into whether n's of this form can be factored via a p-1 factoring attack. It may be that making the discrete log easy also makes the modulus factorable. From rivest at theory.lcs.mit.edu Sat Sep 19 02:46:02 1998 From: rivest at theory.lcs.mit.edu (Ron Rivest) Date: Sat, 19 Sep 1998 17:46:02 +0800 Subject: Questions for Magaziner? // taxing crypto Message-ID: <199809192221.SAA13345@swan> Hi Bob -- I feel mis-quoted and/or mis-represented in your note (below) stating that "Magaziner mirrored Rivest's offer to tax encryption products to pay for increased law enforcement technology support". While I do feel that some measure of appropriate balance may be accomplished by increasing the budget of the FBI and other law-enforcement to help them compensate for whatever increased difficulties they encounter because of the widespread use of encryption, I do not recall ever suggesting that the revenues for such increased budgets be raised by specifically taxing encryption products, and I don't really think that is a sensible approach. We don't tax glove manufacturers to raise funds for the FBI fingerprint lab! Any such funding should come out of general revenues, not by further complicating the tax code. Cheers, Ron ------- Start of forwarded message ------- Return-Path: X-Sender: rah at pop.sneaker.net In-Reply-To: Date: Fri, 18 Sep 1998 16:44:07 -0400 To: "Arnold G. Reinhold" , cypherpunks at cyberpass.net, cryptography at c2.net, dcsb at ai.mit.edu From: Robert Hettinga Subject: Re: Questions for Magaziner? Sender: owner-cryptography at c2.net Okay, so the short precis on Magaziner's answer to my question about encryption controls, foriegn or domestic, is he's agin it. He says that controlling foriegn encryption is impossible, and controlling domestic encryption is, at the very least, unconstitutional. He says that the reason the administration's encryption policy is so convoluted is that the law enforcement and the "economic" encryption camps, anti, and pro, evidently, is that the two sides are at loggerheads. Magaziner mirrored Rivest's offer to tax encryption products to pay for increased law enforcement technology support, but, hey, he's a liberal democrat, he's supposed to tax us to death without thinking about the economic, and, of course privacy consequences of raising the price of encryption. So, all in all, he got a round of foot-stomping applause from this bunch on his pro-encryption stance, because, evidently, being a payments technology forum, he was preaching to the choir. Something I found out when I was doing my own speech yesterday. I should realize that anyone building a payment system knows that digital commerce is financial cryptography, after all. :-) Cheers, Bob Hettinga - ----------------- Robert A. Hettinga Philodox Financial Technology Evangelism 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' ------- End of forwarded message ------- From mixmaster at remail.obscura.com Sat Sep 19 03:00:30 1998 From: mixmaster at remail.obscura.com (Mixmaster) Date: Sat, 19 Sep 1998 18:00:30 +0800 Subject: A personal response to your email to sixdegrees Message-ID: <0d7ffbebaef4f88290c8cf8607ef5329@anonymous> BW1015 DEC 05,1997 4:06 PACIFIC 07:06 EASTERN ( BW)(PROFILE/MACROVIEW-COMM) Corporate Profile for Macroview Communications Corp., dated Dec. 5, 1997 Business Editors NEW YORK--(BUSINESS WIRE)--Dec. 5, 1997--The following Corporate Profile is available for inclusion in your files. News releases for this client are distributed by Business Wire and also become part of the leading databases and online services, including all of the leading Internet-based services. Published Date: December 5, 1997 Company Name: MacroView Communications Corp/sixdegrees Address: 90 William Street, 3rd Floor New York, N.Y. 10038 Main Telephone Number: 212-583-1234 Internet Home Page Address (URL): www.sixdegrees.com Chief Executive Officer: Andrew Weinreich Investor Relations Contact: Shoshana Zilberberg Business number: 212-583-1234 X628 Public Relations Contact: Shoshana Zilberberg Business number: 212-583-1234 X628 Industry: Internet/WWW Company description: MacroView Communications Corp., developer of sixdegrees, is in the business of creating Web-based products which help individuals build their own virtual communities based on their personal and professional relationships. sixdegrees, located on the Web at http://www.sixdegrees.com, allows members to uncover the power of their greatest natural resource - the people they know. Inspired by the theory that every person in the world is connected to every other person through a path of no more than six relationships, sixdegrees offers several proprietary applications, all of which help members leverage their own trusted network of contacts. Since its launch in January of 1997, sixdegrees members have been able to make new contacts quickly and easily, gain valuable help and information and communicate directly with their own growing virtual community, all within the confines of the sixdegrees property. As of December 1997, there were over 250,000 sixdegrees members who had listed over 930,000 contacts in the sixdegrees database. --30--cvw/ny* CONTACT: Macroview Communications Corp. Shoshana Zilberberg Director of Marketing & Communciations shoshana at sixdegrees.com KEYWORD: NEW YORK INDUSTRY KEYWORD: COMPUTERS/ELECTRONICS COMED INTERACTIVE/MULTIMEDIA/INTERNET PROFILE: YES URL: http://www.sixdegrees.com From nobody at remailer.ch Sat Sep 19 03:06:51 1998 From: nobody at remailer.ch (Anonymous) Date: Sat, 19 Sep 1998 18:06:51 +0800 Subject: Clinton's fake apologies (fwd) Message-ID: <19980919231520.21440.qmail@hades.rpini.com> On 19 Sep 1998, Anonymous wrote: > > nobody at remailer.ch wrote: > > > Subject: Re: Clinton's fake apologies (fwd) > > > > > Presumably he should lie to protect the state. > > > > Then don't take the oath: > > > > To tell the truth, the whole truth, and nothing but the truth. > > > ... > > > > So lieing per se isn't the problem. > > > > No, it's the fact that he took an oath to tell the truth and didn't. > > > > > Murky water > > > for impeachment, methinks. > > > > Then you don't think very well. > > > > What? To tell a lie is one thing, but if you preface it with "I'm telling the truth", > then that is really really bad? I still think you're drawing a very fine line. Well, kind of. If some public figure comes up before the nation and says quietly "I did not have sex with Brenda the Barber," that's one thing. If the same public figure goes under oath and then lies, it's another. In the first case, he's exercising freedom of speech, though there could be some argument as to whether somebody in a public office has the right to lie like that. In the second case, he's trying to throw a wrench in the justice system. It wouldn't be as bad if somebody like Jim or I lied under oath, but this guy is the chief executive of the United States. He's basically Top Cop, and his administration doesn't hesitate to press charges against people who commit all sorts of victimless crimes. > I'm honoured to draw an ad hominem before revealing that I'm on AOL. > > -- an anonymous aol32 user. Actually, the amazing thing is that you're from AOL. You're coherent, you quote, and you know how to use a remailer. One in a million. ;) From ravage at EINSTEIN.ssz.com Sat Sep 19 03:19:35 1998 From: ravage at EINSTEIN.ssz.com (Jim Choate) Date: Sat, 19 Sep 1998 18:19:35 +0800 Subject: Clinton's fake apologies (fwd) Message-ID: <199809192343.SAA10957@einstein.ssz.com> Forwarded message: > From adam at rpini.com Sat Sep 19 16:40:18 1998 > Date: 19 Sep 1998 21:21:26 -0000 > Message-ID: <19980919212126.20210.qmail at hades.rpini.com> > From: Anonymous > Subject: Re: Clinton's fake apologies (fwd) > > Then don't take the oath: > > > > To tell the truth, the whole truth, and nothing but the truth. > What? To tell a lie is one thing, but if you preface it with "I'm telling the truth", > then that is really really bad? I still think you're drawing a very fine line. Of course it's different if you preface your lie with "I swear to tell the truth, the whole truth, and nothing but the truth". The oath is voluntary and therefore if broken no claim for duress, only intentional misdirection, can explain such actions. ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From athena at cyberpass.net Sat Sep 19 03:40:15 1998 From: athena at cyberpass.net (Pallas Anonymous Remailer) Date: Sat, 19 Sep 1998 18:40:15 +0800 Subject: A personal response to your email to sixdegrees Message-ID: BW1015 DEC 05,1997 4:06 PACIFIC 07:06 EASTERN ( BW)(PROFILE/MACROVIEW-COMM) Corporate Profile for Macroview Communications Corp., dated Dec. 5, 1997 Business Editors NEW YORK--(BUSINESS WIRE)--Dec. 5, 1997--The following Corporate Profile is available for inclusion in your files. News releases for this client are distributed by Business Wire and also become part of the leading databases and online services, including all of the leading Internet-based services. Published Date: December 5, 1997 Company Name: MacroView Communications Corp/sixdegrees Address: 90 William Street, 3rd Floor New York, N.Y. 10038 Main Telephone Number: 212-583-1234 Internet Home Page Address (URL): www.sixdegrees.com Chief Executive Officer: Andrew Weinreich Investor Relations Contact: Shoshana Zilberberg Business number: 212-583-1234 X628 Public Relations Contact: Shoshana Zilberberg Business number: 212-583-1234 X628 Industry: Internet/WWW Company description: MacroView Communications Corp., developer of sixdegrees, is in the business of creating Web-based products which help individuals build their own virtual communities based on their personal and professional relationships. sixdegrees, located on the Web at http://www.sixdegrees.com, allows members to uncover the power of their greatest natural resource - the people they know. Inspired by the theory that every person in the world is connected to every other person through a path of no more than six relationships, sixdegrees offers several proprietary applications, all of which help members leverage their own trusted network of contacts. Since its launch in January of 1997, sixdegrees members have been able to make new contacts quickly and easily, gain valuable help and information and communicate directly with their own growing virtual community, all within the confines of the sixdegrees property. As of December 1997, there were over 250,000 sixdegrees members who had listed over 930,000 contacts in the sixdegrees database. --30--cvw/ny* CONTACT: Macroview Communications Corp. Shoshana Zilberberg Director of Marketing & Communciations shoshana at sixdegrees.com KEYWORD: NEW YORK INDUSTRY KEYWORD: COMPUTERS/ELECTRONICS COMED INTERACTIVE/MULTIMEDIA/INTERNET PROFILE: YES URL: http://www.sixdegrees.com From howree at cable.navy.mil Sat Sep 19 03:50:23 1998 From: howree at cable.navy.mil (Reeza!) Date: Sat, 19 Sep 1998 18:50:23 +0800 Subject: Clinton's fake apologies (fwd) In-Reply-To: <19980919212126.20210.qmail@hades.rpini.com> Message-ID: <3.0.5.32.19980920095224.0086a600@205.83.192.13> At 09:21 PM 9/19/98 -0000, Anonymous wrote: > >What? To tell a lie is one thing, but if you preface it with "I'm telling the truth", >then that is really really bad? I still think you're drawing a very fine line. > >I'm honoured to draw an ad hominem before revealing that I'm on AOL. > >-- an anonymous aol32 user. > It was prefaced with "...to tell the truth, the whole truth, and nothing but the truth...". Straighten out your head, you seem to be a few neurons short of a functional synapse. Reeza! The world was on fire,,, but no one could save me but you... Strange what desire ,,will make foolish people do..... (to the back beat) This world is only gonna break your heart.... ==C.I.== From nobody at replay.com Sat Sep 19 05:13:53 1998 From: nobody at replay.com (Anonymous) Date: Sat, 19 Sep 1998 20:13:53 +0800 Subject: Repost in text: IDEA(tm) weakness Message-ID: <199809200116.DAA28107@replay.com> [INLINE] Privacy [INLINE] How private is your electronic communication ? [taken from the PGP FAQ] You should encrypt your e-mail for the same reason that you don't write all of your correspondence on the back of a post card. E-mail is actually far less secure than the postal system. With the post office, you at least put your letter inside an envelope to hide it from casual snooping. Take a look at the header area of any e-mail message that you receive and you will see that it has passed through a number of nodes on its way to you. Every one of these nodes presents the opportunity for snooping. Encryption in no way should imply illegal activity. It is simply intended to keep personal thoughts personal. Do you trust your mail servers/gateways/virtual redirects ? With the increasing use of virtual email accounts which allow you to keep the same email address no matter if you change jobs, ISPs, etc, the opportunity for snooping increases. Is PGP secure ? PGP uses acombination of IDEA, RSA and MD5. RSA is used to allow the transfer of session keys and MD5 is used to generate a unique message digest from the passphrase for generating the IDEA key and signatures. IDEA is the core algorithm used to encrypt the actual message. Thus the security of IDEA is also means the security of PGP . Is IDEA secure ? The IDEA algorithm (patented by ASCOM) is the core algorithmm used in PGP. It is based on a rotating 128 bit key split into 16 bit segments. The algorthm converts 64 bits of data at a time using the following operations '+', '^' (exclusive-or) and '*'. The formulas are : 64 bit data => D1, D2, D3 and D4 (all 16 bits) => K1,K2,K3....rotating extra 25 bits after all 128 bits are used There are 2 phases in each round and 8 rounds in total + 1 final round of just phase 1. Phase 1: R1 = D1 * K1 R2 = D2 + K2 R3 = D3 + K3 R4 = D4 * K4 Phase 2: E1 = R1 xor (((R2 xor R4) + ((R3 xor R1) * K5)) * K6) E2 = R3 xor (((R2 xor R4) + ((R3 xor R1) * K5)) * K6) E3 = R2 xor ((((R2 xor R4) + ((R3 xor R1) * K5)) * K6) + ((R3 xor R1) * K5)) E4 = R4 xor ((((R2 xor R4) + ((R3 xor R1) * K5)) * K6) + ((R3 xor R1) * K5)) Given a large random data message (ie 1000 samples - 64*1000 = 8Kb file). The distribution of the above operations can be used to break the key. ie both the '+' and the '^' operations give an even distribution but the '*' operator gives a biased distribution towards '0'. Distribution (where '*' has a bias towards 1 of a) R1 = a R2 = even R3 = even R4 = a (a5 & a6 are the bias for K5 and K6) E1 = (bias a5) * (bias a6) E2 = (bias a5) * (bias a6) E3 = (bias a5) - (2 * (bias a5) * (bias a5) * (bias a6)) + ((bias a5) * (bias a6)) = (bias a5) * (1 + (bias a6) - (2*(bias a5)*(bias a6))) E4 = (bias a5) - (2 * (bias a5) * (bias a5) * (bias a6)) + ((bias a5) * (bias a6)) = (bias a5) * (1 + (bias a6) - (2*(bias a5)*(bias a6))) Also as the '*' operator is biased towards its own bit for the result '1' - approx (60% to 100% depending on bit position). [Working from the low bit upwards will provide an even greater approximation as then you would have the relevant Key bits against a random data. ie for 1st bit, it is 100% dependant on the bit for a '1',...] eg using a simple 3x3 matrix on second bit, gives (only demonstrating the ratio): if K bit is 1 => bias a ~ (2/8), if K bit is 0 => bias a ~(1/8) ==> We can determine when : K5=0 and K6=0 as (bias a5) and (bias a6) will be at their highest ==> E1 & E2 are highest K5=1 and K6=1 as (bias a5) and (bias a6) are at their lowest ==> E1 & E2 are Lowest To determine between K5=0,K6=1 and K5=1,K6=0. K5 can be determined by check with E3 & E4 as they are both equal to : (bias a5) * (1 + (bias a6) - (2*(bias a5)*(bias a6))) => directly relate to (bias a5) => K5 =>When K5=0, both E3 & E4 will be low. => When K5=1, both E3 & E4 will be high. The Key rotation start bits are : Phase K1 K2 K3 K4 K5 K6 1 0 16 32 48 64 80 2 96 112 25 41 57 73 3 89 105 121 9 50 66 4 82 98 114 2 18 34 5 75 91 107 123 11 27 6 43 59 100 116 4 20 7 36 52 68 84 125 13 8 29 45 61 77 93 109 final 22 38 54 70 n/a n/a Working backwards with these distributions you can deduce the key. ie work out K5 (93..108) and K6 (109..124) from its distribution pattern [using just the distributions for E2 & E3, as E1 & E4 have had the '*' operation applied in the final phase], then with K5 and K6 work out K1..K4 (22..85). You now have the key values for K1 to K6 !!!. Modify the Samples such they are back a phase and repeat (ie for each sample work backwards using known K1..K6 to find the E1..4 values). MAJOR ASSUMPTION : Assume that a large random sample provides a close to even distribution at the end of each phase (For E2 & E3) such that the bias (ie a5 & a6) used to determine E2 and E3 are the only significant factors. Reasoning : If the distribution is not even, then it is very much easier to break (ie only the key values can cause the change in distribution pattern => know the pattern, know the key). I have developed a program which does just this (NOTE: not tested with real PGP data, as I have not had the time to investigate how the PGP file is structured, ie where the IDEA code starts and ends). It is available under a copyleft license similar to GNU. The Java Source code can be found at : [Application will not be released until beginning of 1999 when enough people are aware of the potential problem, and solutions are widely available - thus the threat to the general users privacy is kept to a minimal. Software houses which would like a delay in the release of this application so as to provide a solution should email: SGOSHA33 at mailexcite.com with their request] What can we do ? The above crack works because there is a large sample involved. If however you pre-encrypted the file such that you got your pre-encrypted file and a key file, where this key file is small and contains only the key required to open the pre-encrypt file. You then PGP the two files, this would make it much harder to break as the key file cannot be broken from the sampling technique descibed above. I have developed an application which does just that. It is available under a copyleft license similar to GNU. The Java source code can be found here : kiss.zip To run the application you will need Java installed on your machine. Place the files in a directory named KISS. The command line is : java KISS.kiss e - encrypt java KISS.kiss d - decrypt (do not add the kiss extension to the filename) After encryption you will get 2 files. The '.kiss' file is the encrypted file and the '.lips' file contains the key used to encrypt the file. You should then encrypt both files with PGP. What is in the pipeline for the future ? Task 1 The above 'kiss' pre-encryption is not 100% safe from non-bruteforce cracking !! As the majority of files encrypted are text messages which are based mainly on the characters 'a' to 'z' thus the Ascii codes of the characters are of the form 011xxxxx. From this you can see that the rotating distribution as used above will tend toward '1'. Thus with enough samples they can deduce the key with the simple equation. KeyValue xor 1 = CommonValue ==> KeyValue = !CommonValue To prevent this my next application (codename Stable) will be a stabiliser program which will ensure that the distribution of the data has an even distribution. Target Release Date : 30/9/98. Task 2 The integration of both 'kiss' and 'stable'. Target Release Date : 15/10/98. Task 3 Port of both kiss and stable to C/C++ (for speed and also for Task 4). [Wrote Kiss and Stable in Java to test the speed of Java and also how it handled bit manipulation operations]. Target Release Date : 31/10/98. Task 4 Integration with PGP to provide uses with a much easier encryption method. Target Release Date : 31/11/98. Author : SGOSHA33 Return to Albert's Home Page. [INLINE] From nobody at replay.com Sat Sep 19 05:17:52 1998 From: nobody at replay.com (Anonymous) Date: Sat, 19 Sep 1998 20:17:52 +0800 Subject: Going Cashless: Bank ends ECash trial period Message-ID: <199809200120.DAA28658@replay.com> Thomas Junker writes: > Fagen also cited the changing climate in the U.S. for Internet > payments. When the trial was started in 1995, she said, "people > were more fearful of using credit cards to pay for things over > the Internet. Now that seems to have disappeared." > >Had Ms. D'Amico understood the nature of Digicash, she may have >questioned Ms. Fagen about the apparent non sequitur. If Digicash >had nothing to do with making credit transactions "safer," why would >decreasing public fear of using credit cards on the Internet have >anything to do with Mercantile's decision to abruptly discontinue the >Digicash program? This seems clear enough. Digicash was competing with credit cards as a payment system. One of its advantages was that you didn't have to send your credit card number across the net. As fear of transferring credit card numbers declined, Digicash lost this advantage. From jya at pipeline.com Sat Sep 19 05:46:55 1998 From: jya at pipeline.com (John Young) Date: Sat, 19 Sep 1998 20:46:55 +0800 Subject: CJ Update Message-ID: <199809200148.VAA28141@camel7.mindspring.com> >From Alia Johnson , CJ's sister, today: I'm writing to say that CJ has arrived at the Springfield Medical Referral Center, where he will be held for a month or more (the phone says U.S. Medical Center for Federal Prisoners) for "examination". Here is the address: Carl E. Johnson Register # 05987-196 U.S. Medical Center for Federal Prisoners P.O. Box 4000 Springfield, Missouri 65801 Also, to my delight, I received a letter from him today. He sounds okay. CJ in his letter asks for physical mailing addresses for some of the cypherpunks (no one specifically) so that he can send you things to post since I will be travelling. [End Alia] --------- We'll be happy to digitize and/or post any mail from CJ folks want to share, anonymous and/or encrypted always welcome: Fax: 212-799-4003 Vox: 212-873-8700 Snail: John Young 251 West 89th Steet, Suite 6E New York, NY 10024 We've put all our PGP keys at: http://jya.com/jya-keys.txt And a bunch of keys for the wild bunch of Totos: http://jya.com/totos-keys.htm From support at findmail.com Sat Sep 19 06:44:01 1998 From: support at findmail.com (eGroups.com Help) Date: Sat, 19 Sep 1998 21:44:01 +0800 Subject: Please Verify to Complete Your eGroups.com Registration Message-ID: <19980920024852.8835.qmail@findmail.com> Thank you for requesting an eGroups.com account. To complete your registration, you MUST ENTER the following number into the Web form at http://www.egroups.com/register?email=cypherpunks%40cyberpass.net&vid=22118666 (equivalent to the form on your browser). Number: 22118666 This step ensures that only you can control your e-mail subscriptions. If you have any questions, please visit http://www.egroups.com/info/help.html Thanks! Sincerely, The eGroups.com Team From vznuri at netcom.com Sat Sep 19 06:44:44 1998 From: vznuri at netcom.com (Vladimir Z. Nuri) Date: Sat, 19 Sep 1998 21:44:44 +0800 Subject: IP: [FP] Ohio gets Computerized Fingerprint System Message-ID: <199809200246.TAA11955@netcom13.netcom.com> From: "ScanThisNews" Subject: IP: [FP] Ohio gets Computerized Fingerprint System Date: Fri, 18 Sep 1998 19:34:28 -0500 To: ignition-point at majordomo.pobox.com ====================================================================== SCAN THIS NEWS ------------------------------------------------- http://www.ag.ohio.gov/pressrel/livescan.htm FOR IMMEDIATE RELEASE July 25, 1997 Attorney General Betty Montgomery Brings New Technology to Ohio Law Enforcement Montgomery Gives Computerized Fingerprint Systems Free of Charge to Help in the Fight Against Crime Columbus -- In an effort to assist local law enforcement and improve Ohio�s criminal history records, Attorney General Betty D. Montgomery today announced that 23 law enforcement agencies in Ohio will be receiving Live-Scan systems at no cost to the agencies. Through federal grants and money from the Attorney General�s budget, Live-Scan computerized fingerprint identification systems have been purchased and are being distributed to law enforcement agencies across the state. The agencies that send the most fingerprint cards to the Ohio Bureau of Criminal Identification and Investigation (BCI) were chosen to receive Live-Scan. Montgomery was joined by representatives from several law enforcement agencies that will be receiving Live-Scan systems and local public officials in announcing this new technology being given to more than 20 law enforcement agencies. "I want to thank the Attorney General�s Office for this modernized equipment, which will help law enforcement�s advancement in building the bridge to the 21st century, with technology in crime fighting," said Franklin County Sheriff Jim Karnes. Live-Scan provides high-quality electronic fingerprint images through state-of-the-art computer imaging. Most Ohio law enforcement agencies rely on the traditional form of using ink to slowly roll each individual fingerprint onto cards. With Live-Scan, fingers are placed directly onto a scanner without having to use ink. The image is stored electronically, and copies of the card can be printed at any time. This new system will give law enforcement consistently higher quality fingerprints to use for processing and identification. These new systems will also electronically send the fingerprint cards to BCI. This will be an important step in ensuring the quality of Ohio�s criminal history records. BCI will now be able to receive records in a more timely fashion and virtually eliminate the possibility of records being lost or not sent. The systems will assist local law enforcement by cutting-down on the number of hours needed to process fingerprint cards by eliminating the timely duplicative process of fingerprinting. The Live-Scan systems will be linked late this fall to BCI�s Automated Fingerprint Identification System (AFIS). AFIS is a computer system that holds the fingerprint images and criminal history records of more than 1.2 million criminals in Ohio. With Live-Scan, law enforcement agencies will be able to quickly search AFIS for matches to their fingerprint cards. This will be extremely useful if someone with a prior record tries to give an alias or refuses to disclose his or her name. The agency can scan the suspect�s fingerprints and check them against the database at BCI for a match. "Here�s the bottom line: This technology will allow police to identify criminals faster and more accurately than anything even dreamed of just years ago," Montgomery said. The Live-Scan systems were purchased for almost $1.1 million from Identix Inc. of California. Ohio is joining the Federal Bureau of Investigation, the Bureau of Alcohol, Tobacco, and Firearms, the U.S. Marshal, and numerous other federal agencies, states, and cities that have also purchased Live-Scan systems from Identix Inc. Each system retails for $70,000 but the Attorney General was able to negotiate a purchase price for a much lower cost of $44,220. Law enforcement agencies that already have Live-Scan systems and meet requirements of the National Institute of Standards and Technology will be connected with Ohio�s AFIS as part of the contract with Identix Inc. The contract also allows any local law enforcement agency to purchase a Live-Scan system within the next year at the same price negotiated by the Attorney General. Attorney General Montgomery also announced that her office plans to purchase additional Live-Scan systems in the beginning of next year to be distributed to more law enforcement agencies across the state. -30- Below is the list of agencies receiving Live-Scan systems: Cleveland Police Department Cuyahoga County Sheriff�s Office Clermont County Sheriff�s Office Delaware County Sheriff�s Office Franklin County Sheriff�s Office Clark County Sheriff�s Office Pickaway County Sheriff�s Office Miami Township Police Department Columbiana County Sheriff�s Office Lake County Sheriff�s Office Licking County Sheriff�s Office Mahoning County Sheriff�s Office Highland County Sheriff�s Office Boardman Police Department Elyria Police Department Allen County Sheriff�s Office Lorain Police Department Coshocton County Sheriff�s Office Whitehall Police Department Miamisburg Police Department Springdale Police Department Kent Police Department Medina County Sheriff�s Office ======================================================================= Don't believe anything you read on the Net unless: 1) you can confirm it with another source, and/or 2) it is consistent with what you already know to be true. ======================================================================= Reply to: ======================================================================= To subscribe to the free Scan This News newsletter, send a message to and type "subscribe scan" in the BODY. Or, to be removed type "unsubscribe scan" in the message BODY. For additional instructions see www.efga.org/about/maillist.html ----------------------------------------------------------------------- "Scan This News" is Sponsored by S.C.A.N. Host of the "FIGHT THE FINGERPRINT!" web page: www.networkusa.org/fingerprint.shtml ======================================================================= ********************************************** To subscribe or unsubscribe, email: majordomo at majordomo.pobox.com with the message: (un)subscribe ignition-point email at address ********************************************** www.telepath.com/believer ********************************************** From vznuri at netcom.com Sat Sep 19 06:44:47 1998 From: vznuri at netcom.com (Vladimir Z. Nuri) Date: Sat, 19 Sep 1998 21:44:47 +0800 Subject: IP: [BioWeekly_Email] Announcement Message-ID: <199809200246.TAA11966@netcom13.netcom.com> From: Bioweekly Special Announcement Subject: IP: [BioWeekly_Email] Announcement Date: Fri, 18 Sep 1998 18:17:12 -0500 To: ignition-point at majordomo.pobox.com We thought you might be interested in some recent announcements regarding Banking on Biometrics =9298 which is just around the corner. The conference is on October 12-14, 1998 in Dallas, Texas, US. New speakers recently added include: Randall Fowler, CEO, Identix Corp.;=20 Frank Smead, SpeakerKey Marketing Manager, ITT Industries;=20 Other outstanding presenters include:=20 Jim Wayman, US National Biometric Test Center John Woodward, Attorney and Biometric Legal Consultant Jeremy Newman, President, PenOp Corp.=20 Adam Backenroth, Chase Manhattan Bank Dr. Joseph Atick, CEO, Visionics Corp. Colleen Madigan, SafLINK Corp. Gail Koehler, Purdue Empl. Fed. Credit Union James O=92Dell, CUNA Mutual Insurance Group Robert Van Naarden, Sensar, Inc.=20 Michelle Roberts, Texas Bankers Association Ray Findley, Pres., American Card, Inc.=20 Chris Olsen-Potter, Identicator, Inc. Raj Nanavati, International Biometric Group Judith Markowitz, J.Markowitz Consultants Ron Beyner, T-NETIX, Inc.=20 Francis Declercq, Keyware Corp. Mike Grimes, Miros Corp.=20 =3D=3D> GET YOUR FREE REGISTRATION THROUGH OUR GROUP DISCOUNT PROGRAM Connect with Southwest Airlines to get your lowest possible airline rates to Dallas =85.. but better yet, register two of your clients, business associates, customers, prospects, friends or family and attend the conference FREE. You can register three persons for the price of two - and that third person could be YOU. Conference registration is $490. =20 Our group discount is excellent for any company wanting to send a group of employees for an employee training program. Registration fees drop to $350 each for 4-5 persons, $300 each for 6-10 persons and to $260 each for over 10 registrants. =3D=3D> BIOMETRIC VIDEO TAKING SHAPE The first biometric infomercial is taking shape and will be available during and after the conference. If you register NOW, you=92ll get a free copy at the conference. If you want a copy later, we=92ll be glad to sell you one. Suggested cost (still pending) is $125. =3D=3D> NEED MORE INFORMATION ON BIOMETRICS There will be biometric consultants at the conference who will be glad to answer your questions and provide you with more information.=20 =3D=3D> VISIT THE CONFERENCE WEB SITE FOR MORE DETAILS AND RESERVATION INFORMATION -=20 http://www.biodigest.com or call Linda Bikoff - (202) 337-0023, Email - Lbikoff at aol.com. ********************************************** To subscribe or unsubscribe, email: majordomo at majordomo.pobox.com with the message: (un)subscribe ignition-point email at address ********************************************** www.telepath.com/believer ********************************************** From vznuri at netcom.com Sat Sep 19 06:44:54 1998 From: vznuri at netcom.com (Vladimir Z. Nuri) Date: Sat, 19 Sep 1998 21:44:54 +0800 Subject: IP: Hackers-turned-consultants see business boom Message-ID: <199809200247.TAA12056@netcom13.netcom.com> From: believer at telepath.com Subject: IP: Hackers-turned-consultants see business boom Date: Sat, 19 Sep 1998 11:53:29 -0500 To: believer at telepath.com Source: Fox News - AP On guard now, hackers-turned-consultants see business boom 11.00 a.m. ET (1501 GMT) September 19, 1998 By Chris Allbritton, Associated Press NEW YORK (AP) � The hacker calling himself Mudge pushed his long hair back, scratched his beard and stared at the computer screen. He knew there was something wrong with the data traffic he was watching, but what was it? A week earlier, Mudge and his fellow hackers in their hangout known as the L0pht � pronounced "loft'' � had acquired some software that was supposed to let computers talk to each other in code. But as Mudge watched the data he realized someone else was doing the same and maybe even decoding it, which shouldn't happen. "So you are saying that you're using DES to communicate between the computers?'' Mudge recalled asking representatives of the software maker. Yes, they said, they were using DES, a standard encryption method that for years was considered virtually uncrackable. But this wasn't DES, thought Mudge. It's almost as if... Whoa. He blinked and felt the adrenaline kick in. This wasn't secure at all. In fact, the encoding was only slightly more complex than the simple cyphers kids did in grade school � where "A'' is set to 1, "B'' is set to 2, and so on. The company was selling this software as a secure product, charging customers up to $10,000. And yet, it had a security hole big enough to waltz through. Instead of exploiting this knowledge, Mudge confronted the company. "You realize there isn't any secure or 'strong' encoding being used in your communications between the computers, don't you?'' he asked. "Well...'' "And that you claimed you were using DES to encrypt the data,'' he pressed. "That will go in the next revision.'' Mudge is a "real'' hacker � one who used to snoop around the nation's electronic infrastructure for the sheer love of knowing how it worked. His kind today are sighted about as often as the timberwolf, and society has attached to them the same level of legend. Like the wolf, they were once considered a scourge. Law enforcement and telecommunication companies investigated and arrested many of them during the late 1980s and early '90s. Today, many elite hackers of the past are making a go at legitimate work, getting paid big bucks by Fortune 500 companies to explore computer networks and find the weak spots. And none too soon. The void left by the old hackers has been filled by a new, more destructive generation. So today, Mudge � who uses a pseudonym like others in the hacker community, a world where anonymity keeps you out of trouble � wears a white hat. As part of L0pht, the hacker think tank, he and six comrades hole up in a South End loft space in Boston and spend their evenings peeling open software and computer networks to see how they work. When they find vulnerabilities in supposedly secure systems, they publish their findings on the World Wide Web in hopes of embarrassing the companies into fixing the problems. A recent example: They posted notice via the Internet of a problem that makes Lotus Notes vulnerable to malicious hackers. A Lotus spokesman said the company was aware of the flaw but it was extremely technical and unlikely to affect anyone. The hackers at L0pht have made enemies among industry people, but they command respect. They were even called to testify before the U.S. Senate Committee on Governmental Affairs in May. Why do they publish what they find? "If that information doesn't get out,'' Mudge replies, "then only the bad guys will have it.'' The "bad guys'' are the hacker cliche: secretive teen-age boys lurking online, stealing credit card numbers, breaking into Pentagon systems, and generally causing trouble. One of L0pht's members, Kingpin, was just such a cad when he was younger, extending his online shenanigans to real-world breaking and entering. Today, L0pht keeps him out of mischief, he said. "We're like midnight basketball for hackers,'' said Weld Pond, another member. Malicious hacking seems to be on the rise. Nearly two out of three companies reported unauthorized use of their computer systems in the past year, according to a study by the Computer Security Institute and the FBI. Another study, from Software AG Americas, said 7 percent of companies reported a "very serious'' security breach, and an additional 16 percent reported "worrisome'' breaches. However, 72 percent said the intrusions were relatively minor with no damage. American companies spent almost $6.3 billion on computer security last year, according to research firm DataQuest. The market is expected to grow to $13 billion by 2000. Government computers are vulnerable, too. The Defense Department suffered almost 250,000 hacks in 1995, the General Accounting Office reported. Most were detected only long after the attack. This is why business booms for good-guy hackers. Jeff Moss, a security expert with Secure Computing Inc., runs a $995-a-ticket professional conference for network administrators, where hackers-cum-consultants mingle with military brass and CEOs. "I don't feel like a sellout,'' said Moss, who wouldn't elaborate on his hacking background. "People used to do this because they were really into it. Now you can be into it and be paid.'' News reports show why such services are needed: � Earlier this month, hackers struck the Web site of The New York Times, forcing the company to shutter it for hours. Spokeswoman Nancy Nielsen said the break-in was being treated as a crime, not a prank. The FBI's computer crime unit was investigating. � This spring, two California teen-agers were arrested for trying to hack the Pentagon's computers. Israeli teen Ehud Tenebaum, a k a "The Analyzer,'' said he mentored the two on how to do it. The two Cloverdale, Calif., youths pleaded guilty in late July and were placed on probation. � Kevin Mitnick, the only hacker to make the FBI's Ten Most Wanted list, was arrested in 1995, accused of stealing 20,000 credit card numbers. He remains in prison. A film called "TakeDown,'' about the electronic sleuthing that led to Mitnick's capture, is in the works. Comments protesting Mitnick's prosecution were left during the hack of the New York Times Web site. � In 1994, Vladimir Levin, a graduate of St. Petersburg Tekhnologichesky University, allegedly masterminded a Russian hacker gang and stole $10 million from Citibank computers. A year later, he was arrested by Interpol at Heathrow airport in London. "Lemme tell ya,'' growled Mark Abene one night over Japanese steak skewers. "Kids these days, they got no respect for their elders.'' Abene, known among fellow hackers as Phiber Optik, should know. He was one of those no-account kids in the 1980s when he discovered telephones and computers. For almost 10 years, he wandered freely through the nation's telephone computer systems and, oh, the things he did and saw. Celebrities' credit reports were his for the taking. Unlimited free phone calls from pilfered long-distance calling card numbers. Private phone lines for his buddies, not listed anywhere. And the arcane knowledge of trunk lines, switches, the entire glory of the network that connected New York City to the rest of the world. But Abene's ticket to ride was canceled in January 1994, when, at age 22, he entered Pennsylvania's Schuylkill Prison to begin serving a year-and-a-day sentence for computer trespassing. The FBI and the Secret Service described him as a menace. The sentencing judge said Abene, as a spokesman for the hacking community, would be made an example. � 1998 Associated Press. All rights reserved. ----------------------- NOTE: In accordance with Title 17 U.S.C. section 107, this material is distributed without profit or payment to those who have expressed a prior interest in receiving this information for non-profit research and educational purposes only. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml ----------------------- ********************************************** To subscribe or unsubscribe, email: majordomo at majordomo.pobox.com with the message: (un)subscribe ignition-point email at address ********************************************** www.telepath.com/believer ********************************************** From vznuri at netcom.com Sat Sep 19 06:45:10 1998 From: vznuri at netcom.com (Vladimir Z. Nuri) Date: Sat, 19 Sep 1998 21:45:10 +0800 Subject: IP: Pentagon curbs Web content Message-ID: <199809200246.TAA12023@netcom13.netcom.com> From: believer at telepath.com Subject: IP: Pentagon curbs Web content Date: Sat, 19 Sep 1998 07:43:45 -0500 To: believer at telepath.com Source: ComputerWorld http://www.computerworld.com/home/news.nsf/all/98091838dod (Online News, 09/18/98 01:07 PM) Pentagon curbs Web content By Sharon Machlis Top Pentagon officials are scouring military Web sites to see if too much information is being made public -- data that could potentially help the country's enemies. Some observers fear that listing members of specific military units could help terrorists find revenge targets, for example, particularly after an operation such as the recent missile strikes in Afghanistan and the Sudan. "Basically, the military does stupid things," said Ira Winkler, a former analyst at the National Security Agency and author of the books Corporate Espionage and Through the Eyes of the Enemy. "The military does not exercise good operational security when it comes to their Web sites ... There's no valid reason for a military unit to have a Web site," Winkler said. Deputy Defense Secretary John Hamre and the military's Joint Staff have been checking for Web postings such as building plans, research and development efforts and "personnel information that could perhaps provide too much information," said Defense Department spokesman Kenneth Bacon, in a statement. A more formal, militarywide policy on what should and shouldn't be put on the Web is in the works, added department spokesman Susan Hansen. Winkler said it is ill-advised to post things such as personnel lists or commanders' biographies -- which often include family information -- on the Web. He also recommended against companies posting similar information about corporate officers. In fact, some companies already restrict the data they post about personnel and even product pricing -- although the concern is less about terrorists and more about competitors. "We're in the process now, as I believe many private companies are, of trying to sort out what the right balance is between providing useful information and providing more information than is necessary," Bacon said. Copyright � 1998 Computerworld, Inc. ----------------------- NOTE: In accordance with Title 17 U.S.C. section 107, this material is distributed without profit or payment to those who have expressed a prior interest in receiving this information for non-profit research and educational purposes only. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml ----------------------- ********************************************** To subscribe or unsubscribe, email: majordomo at majordomo.pobox.com with the message: (un)subscribe ignition-point email at address ********************************************** www.telepath.com/believer ********************************************** From vznuri at netcom.com Sat Sep 19 06:45:20 1998 From: vznuri at netcom.com (Vladimir Z. Nuri) Date: Sat, 19 Sep 1998 21:45:20 +0800 Subject: IP: Use of SWAT Teams on the Rise Message-ID: <199809200247.TAA12067@netcom13.netcom.com> From: believer at telepath.com Subject: IP: Use of SWAT Teams on the Rise Date: Sat, 19 Sep 1998 12:11:32 -0500 To: believer at telepath.com Source: Charlotte (N.Carolina) Observer http://www.charlotte.com/observer/local/pub/031225.htm Published Saturday, September 19, 1998 SWAT team approach less risky, police say Use of squads on rise around region, nation By LEIGH DYER Staff Writer Across the country, police departments are using SWAT teams to deal with high-risk situations like the Sept. 4 drug raid that ended with a Charlotte man dead. Court papers said police were looking for evidence of drug dealing, but they found no drugs in the Mayfair Avenue home. Charlotte-Mecklenburg police say the paramilitary-style squad reduces the risks to officers and the public in dangerous situations. But some critics say using the SWAT team for search warrants is too heavy-handed. Records show the Charlotte-Mecklenburg team is used sparingly. Last year, SWAT officers were involved in 14 of the 441 warrants served by Charlotte-Mecklenburg police. Of 251 warrants executed from January to Aug. 31, SWAT team members served 15. Of the 29 raids before Charles Irwin Potts' death, one resulted in minor injuries. Potts' death is the first shooting during a search warrant since the team organized in 1992. It's less clear how often the team succeeds in finding what it's after. In almost every raid, the team reports either an arrest or a seizure of weapons or drugs. But they don't always seize the goods they were looking for. The Sept. 4 raid netted three guns and gambling equipment -- but no evidence of the cocaine dealing an informant told them they'd find. Maj. Piper Charles, who is in charge of the Charlotte-Mecklenburg team, said that when the team is used is not based on the likelihood of finding drugs. Instead, it's based on the likelihood of facing armed resistance. ``The primary purpose is to save lives,'' said Charles. ``A successful mission is one in which absolutely no one gets hurt.'' More scrutiny SWAT calls range from negotiation with hostage-takers to quelling riots to raids for guns, drugs or evidence of other criminal activity. The 42-member Charlotte-Mecklenburg Special Weapons and Tactics team uses special equipment, including heavy body armor and laser-sighted guns. The duty is part time. Team members are also assigned to other regular patrol duties. Nationally, the increased use of SWAT teams has drawn praise from those who say their tactics are safer than traditional law--enforcement methods. But Peter Kraska, a criminology professor at Eastern Kentucky University who has tracked SWAT teams, said they have a downside. ``Often when you see them in a neighborhood piling out of a vehicle . . . it gives the community an impression they're kind of under siege,'' he said. Regionally, SWAT teams have become more active in counties including Gaston, Union and Cabarrus in recent years. Sgt. Jeff Eisenhour, commander of the Gaston County Police SWAT team, said most operations go more smoothly with such a well-trained team, rather than regular patrol officers. ``The biggest advantage is the training,'' he said. ``Everybody knows what everyone is doing.'' The Potts shooting has put the methods and policies of the SWAT team under a microscope, said Charlotte-Mecklenburg's Charles. Those methods include the use of ``flash-bangs,'' a diversionary device thrown into a room to stun and distract occupants with a bang and bright lights while SWAT team members storm in. ``My position is that you're not going to find a safer way to do it,'' Charles said. As SWAT teams grow in popularity, they have encountered more questions about their use. In Fitchburg, Mass., west of Boston, civil libertarians criticized a SWAT team after its members arrested a group of young men in 1993 for lingering on a sidewalk. And in Louisville, Ky., family members of a man killed in a SWAT raid in March 1997 sued, challenging the police procedures. The suit alleges that a flash-bang may have disoriented the man so much he didn't realize he was pointing his gun at police officers. The suit is pending. In Charlotte-Mecklenburg, though, officers say the devices may have saved lives many times, including during a raid on Jan. 22 when a suspect dropped a gun after a flash-bang went off. ``I have heard that sometimes people are not properly using their SWAT teams,'' said Roy House, an instructor at Central Piedmont Community College who conducts regional SWAT training. ``That's a leadership problem.'' House, who is also a reserve member of the Charlotte-Mecklenburg team, believes the benefits of the teams outweigh any criticism. ``I would think it's better to go in there and be a little heavy-handed than to go in there and be outnumbered . . . or outgunned,'' he said. ----------------------- NOTE: In accordance with Title 17 U.S.C. section 107, this material is distributed without profit or payment to those who have expressed a prior interest in receiving this information for non-profit research and educational purposes only. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml ----------------------- ********************************************** To subscribe or unsubscribe, email: majordomo at majordomo.pobox.com with the message: (un)subscribe ignition-point email at address ********************************************** www.telepath.com/believer ********************************************** From vznuri at netcom.com Sat Sep 19 06:45:25 1998 From: vznuri at netcom.com (Vladimir Z. Nuri) Date: Sat, 19 Sep 1998 21:45:25 +0800 Subject: IP: Crypto Controls Threaten Human Rights Message-ID: <199809200246.TAA11944@netcom13.netcom.com> From: believer at telepath.com Subject: IP: Crypto Controls Threaten Human Rights Date: Fri, 18 Sep 1998 17:06:43 -0500 To: believer at telepath.com Source: OneWorld Magazine http://www.oneworld.org/news/today/index.html Crypto Controls Threaten Human Rights Vienna conference warned against restricting free expression (New York, September 18, 1998) -- Human Rights Watch today urged an international conference on technology, now meeting in Vienna, not to expand controls on encryption technologies. The organization said that cryptographic products are critical to the ability of human rights defenders around the world to transmit sensitive information without detection by repressive governments. The conference is reviewing the 1996 Wassenaar Arrangement, an international agreement signed by 30 countries to govern the proliferation of military technology. Dissidents and human rights organizations under repressive regimes frequently use encryption technologies to share information. Encryption has the power to authenticate the identity of these authors to their partners abroad, while protecting their identity from despots at home. The United States has adopted relatively restrictive encryption policies, which prohibit the global dsitribution of software used to encrypt text. In particular, Washington has outlawed the export of the most popular software among human rights activists, Pretty Good Privacy (PGP), although the Wassenaar Arrangement explicitly exempts crypto-software, like PGP, that is widely available in the public domain. Human Rights Watch warned the other participants in the Vienna conference not to incorporate such restrictive policies into the Wassenaar Arrangement, or to further limit the global distribution, development, or use of strong encryption hardware or software. "Encryption is more than a shield for human rights activists," said Jagdish Parikh, associate online researcher at Human Rights Watch. "Coded language is still language, and it must be protected as a basic human right to free expression." Parikh noted that the right to free expression is set forth in Article 19 of the International Covenant on Civil and Political Rights, to which most members of Wassenaar Arrangement are party. Human Rights Watch said that encryption is also an important bulwark against violations of privacy in an age where computerization and data banks enable the collection of huge amounts of personal information about individuals. Moreover, international law requires states not only to refrain from arbitrary interference with privacy, but to affirmatively protect its citizens from such attacks. "The sorts of countries most eager to ban the use of encryption, such as China and Iran, are not known for respecting freedom of speech," said Parikh. "Using encryption should not subject an individual to criminal sanction, any more than using Pig Latin or Swahili does." Many human rights activists around the world would be spared retaliation and abuse if crypto-software were more widely available, Parikh said. ----------------------- NOTE: In accordance with Title 17 U.S.C. section 107, this material is distributed without profit or payment to those who have expressed a prior interest in receiving this information for non-profit research and educational purposes only. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml ----------------------- ********************************************** To subscribe or unsubscribe, email: majordomo at majordomo.pobox.com with the message: (un)subscribe ignition-point email at address ********************************************** www.telepath.com/believer ********************************************** From vznuri at netcom.com Sat Sep 19 06:45:41 1998 From: vznuri at netcom.com (Vladimir Z. Nuri) Date: Sat, 19 Sep 1998 21:45:41 +0800 Subject: IP: "Bioarmageddon" Message-ID: <199809200246.TAA12000@netcom13.netcom.com> From: believer at telepath.com Subject: IP: "Bioarmageddon" Date: Sat, 19 Sep 1998 06:56:14 -0500 To: believer at telepath.com Source: New Scientist http://www.newscientist.com/nsplus/insight/bioterrorism/bioarmageddon.html Bioterrorism Special Report: Bioarmageddon By Debora MacKenzie Sooner or later there is going to be a biological attack on a major city. Are we prepared to deal with it? Not a chance, says Debora MacKenzie It begins with a threat. A terrorist group declares that unless its demands are met within 48 hours, it will release anthrax over San Francisco. Two days later, a private plane flies across the Bay, spreading an aerosol cloud that shimmers briefly in the sunlight before disappearing. Scenario one: thousands are killed in the panic as 2 million people flee the city. Another 1�6 million inhale anthrax spores. Antibiotics are rushed in, but the hospitals are overwhelmed and not everyone receives treatment. Most of the country's limited stock of anthrax vaccine has already been given to soldiers. Emergency crews provide little help as there are only four germ-proof suits in the whole city. More than a million of the Bay Area's 6.5 million residents die. Scenario two: in the two days before the attack, citizens seal their doors and windows with germ-proof tape. They listen to the radio for instructions, their gas masks, drugs and disinfectants ready. Few panic. When sensors around the city confirm that the cloud contains anthrax spores, hospitals receive the appropriate antibiotics and vaccines. Trained emergency teams with germ-proof suits and tents set up in the places where automated weather analyses show the deadly cloud will drift. With advance preparation and rapid response only 100,000 people die. A terrorist who plans to drop anthrax over San Francisco tomorrow can count on causing the murder and mayhem described in the first scenario--at least according to the simulation that generated these scenarios last year. The question facing policy makers now is: how do we move toward the second scenario? That terrorists may someday turn to biological weapons is no longer a matter of debate (see "All fall down", New Scientist, 11 May 1996, p 32). "Terrorism has changed," says Brad Roberts of the US government-backed Institute for Defense Analyses in Virginia. "Traditional terrorists wanted political concessions," he says. "But now, some groups say their main aim is mass casualties. That makes biological weapons appealing." Terrorists would have little trouble getting their hands on the technology. Hearings in South Africa in June revealed that the apartheid government produced terrorist weapons containing anthrax, Salmonella and cholera. Soviet scientists who have prepared weapons-grade anthrax and smallpox are known to have emigrated, possibly to well-funded terrorist groups like the one run by Osama bin Laden in Afghanistan. Even small groups such as the Aum Shinrikyo sect in Japan have been able to cook up vats of Salmonella or botulin, the toxin that causes botulism. With bioweapons so readily available, how can governments protect us from a terrorist armed with anthrax, smallpox or plague? In May, scientists, policy makers and security experts gathered in Stockholm to discuss how to limit the devastation of a biological attack on civilians. Until now, most biological defence strategies have been geared to protecting soldiers on the battlefield rather than ordinary people in cities. The situations are quite different, and novel technologies are needed for civilian defence. Suppose a commuter stumbled across a time bomb filled with anthrax on an underground railway platform. Until this year, no police force in the world had any way to disarm such a device safely. One novel solution that attracted attention at Stockholm was a tent full of antiseptic foam. Researchers at Irvin Aerospace in Fort Erie, Ontario, have developed a dome-shaped tent made of ultratough Mylar that can be filled with a stiff foam--the exact composition of which is a closely guarded secret--that kills germs and also neutralises chemical weapons. Once covered by the foam-filled tent, the bomb can be safely detonated. But what if germs are already in the air? The protective suits and masks used by most emergency services don't have seals tight enough to exclude microorganisms, making them useless against biological attacks, says Jack Sawicki, a former fireman who now works for Geomet Technologies near Washington DC. And the lack of standards for gas masks sold to civilians in most countries makes it as likely that a mask will suffocate you as save you, he says. The suits developed for the military do work--their tight joints and zippers keep bugs out--but they are too pricey for the average fire department. Both Geomet and Irvin Aerospace are about to market civilian bio-suits. In the meantime, other companies are designing protective gear that actually kills pathogens. Molecular Geodesics in Cambridge, Massachusetts, for example, is developing a suit made of a tough, sponge-like polymer that traps bacteria and viruses, which are then destroyed by disinfectants incorporated into the fabric. Stealthy attack None of this gear will do any good, however, if the emergency services do not know there has been an attack. And an assault may not be obvious. A terrorist might not use a weapon that goes off with a dramatic bang, or even produces an obvious cloud of germs. The first hint of a biological attack may be a sudden cluster of sick people. Even that will be missed unless someone is watching. And few are. In the US, financial cutbacks have crippled programmes to track disease outbreaks, natural or deliberate. Some could be either, such as food poisoning caused by Escherichia coli O157 or Salmonella. Medical agencies fear that the extra money requested by President Bill Clinton this spring as part of an anti-terrorist initiative will not be enough to create an adequate surveillance network. In Europe, disease surveillance is only beginning to be organised on the continent-wide scale needed to track a biological emergency. But in addition to monitoring infected people, Nicholas Staritsyn of the State Research Centre for Applied Microbiology near Moscow says that more effort should be made to find out which bugs live where. For example, a particular variety of anthrax may occur naturally in South Africa, but not in Canada. Having access to such information could help authorities to distinguish between natural outbreaks and deliberate attacks. Even when infected people start turning up at local hospitals, early diagnosis of their illness might not be easy, says Steve Morse, who heads the US programme on new diagnostic technologies run by the Defense Advanced Research Projects Agency (DARPA). The first symptoms of anthrax, plague and many other potential agents of bioterrorism resemble those of flu: headaches, fevers, aching muscles, coughing. What's more, some of these symptoms might be brought on by panic attacks, which are likely to be widespread among people who have just been told that they are the victims of a biological attack. One answer discussed in Stockholm would be for hospitals to have the type of high-tech detectors being developed to identify airborne pathogens on the battlefield. With a detector at each bedside, doctors could pick out the volatile molecules released by damaged lung membranes at a very early stage of infection and instantly tell whether a patient was a victim of a biological attack, says Mildred Donlon, head of environmental detection research at DARPA. Eventually, DARPA would like to develop a detector that weighs no more than 2 kilograms, can identify as few as two particles of 20 different biological agents in a sample of air, costs less than $5000 and does not give false negatives. Such detectors could be deployed around cities to give early warning of airborne disease. In the meantime, researchers led by Wayne Bryden at Johns Hopkins University in Baltimore are working on revamping the traditional laboratory workhorse, the mass spectrometer, for use in the field or in hospitals. They've reduced this unwieldy piece of equipment to a suitcase-sized machine that can distinguish between, say, Shigella, which causes dysentery, and Salmonella. A shoebox-sized version, says Bryden, could be ready in five years. Other researchers are experimenting with devices that would not seem out of place in an episode of Star Trek: Voyager. Tiny electronic chips that contain living nerve cells may someday warn of the presence of bacterial toxins, many of which are nerve poisons. Like a canary in a coal mine, the neurons on the chip will chatter until something kills them. "Anything that stops it singing is immediate cause for alarm," says Donlon. While the "canary on a chip" could detect a broad range of toxins, other devices are designed to identify specific pathogens. One prototype consists of a fibre-optic tube lined with antibodies coupled to light-emitting molecules. In the presence of plague or anthrax bacteria, or the toxins botulin or ricin, the molecules light up. Outwitting our defences Devices based on antibodies are far from foolproof. First, you need to have the correct antibodies--not easy when you consider the vast number of pathogens you'd need to include, and their ever-changing repertoire of surface proteins. "And even the right antibodies can identify only what is on the outside of a particle," Donlon points out. Bugs can be encapsulated in gels or biological polymers to foil antibodies, or normally harmless bacteria engineered to carry nasty genes. "I want to know what is on the inside," she says. To do this, DARPA-funded researchers are developing identification techniques based on RNA analysis. Unlike DNA, which is now used to identify unknown organisms, RNA is plentiful inside cells and need not be amplified before identification begins. And messenger RNA molecules reveal not only what a microorganism is, but what toxins it is making. Once the biological agent has been identified, how do you combat it? Vaccinating people before they are exposed is one answer. This is the strategy the military is betting on. Last year, the US military launched a programme to develop vaccines against potential biological weapons. It will create jabs for diseases for which none exist, such as Ebola, and improve existing vaccines--including the 30-year-old anthrax vaccine being given to 2�4 million American soldiers. But vaccines are no cure-all. An attacker need only generate a germ that sports different antigens to those used in a vaccine to render that vaccine ineffective. Plus, as bioterrorists get more sophisticated, they will develop novel, possibly artificial, pathogens against which conventional vaccines will be useless, predicts Morse. To get around these problems, DARPA is looking at ways of developing vaccines quickly enough for them to be created, mass-produced and distributed after an attack. The first step, which many researchers including those in the fast-paced field of genomics are now working on, involves speeding up DNA sequencing so that an unknown pathogen's genes could be detailed in a day. The resulting sequences could then be the basis for developing an instant DNA vaccine. Making the vaccine is only half the problem, however. Soldiers can be ordered to take shots, but immunising the rest of the population is another matter. Civilians are unlikely to volunteer for the dozens of vaccinations that would be necessary to protect them against every conceivable biological threat. An attack would make many change their minds, but in such circumstances there might not be enough to go around. Although Clinton has called for the stockpiling of vaccines, the US has only 5 million doses of smallpox vaccine--not enough to contain a hypothetical attack, says Ken Berry, president of the American Academy of Emergency Physicians. Ken Alibek, the former second-in-command of the Soviet germ warfare programme who revealed earlier this year that the Soviets had weaponised tonnes of smallpox, argues that it is short-sighted to put too much effort into developing vaccines. Instead, says Alibek, who is now at the Batelle Institute in Virginia, researchers should concentrate on ways to treat victims of biological weapons. Today's antibiotics may be useless because germs could be equipped with genes for resistance to all of them. Russian scientists have already created such a strain of anthrax (This Week, 28 February, p 4). For any treatment to be effective amid the potential chaos of a bioterrorist attack, speed will be of the essence. At the Stockholm meeting, researchers reported their efforts to develop drugs that work against a wide variety of infections and so can be used even before definitive diagnosis. Some are trying to take advantage of recently identified similarities in the way many pathogens produce disease to develop broad-spectrum drugs. For example, Ebola, anthrax and plague all kill their victims by inducing a widespread inflammatory reaction similar to toxic shock syndrome. A team in Cincinnati is testing an anti-inflammatory drug that could stop all of them. Another gang of bacteria--including plague, Salmonella, Shigella and Pseudomonas aeruginosa (one of the bacteria that can cause pneumonia and meningitis)--relies on very similar proteins to latch onto human cells and inject toxins. Drugs that block this system might save people from all these germs, �ke Forsberg of the Swedish Defence Research Establishment in Ume� told the meeting. The trouble with all these new anti-bioweapon gizmos, gadgets and medicines is that it's far from certain that they would be available in time to shield the first major city targeted for a bioterrorist attack. At the moment, the US is one of the few countries taking the bioterrorist threat seriously. Sweden, France and Israel have trained emergency teams and stockpiled gas masks. Other countries do not seem concerned. "The threat of bioterrorism has not seized our European friends," says Mike Moodie of the Chemical and Biological Arms Control Institute, a think-tank near Washington DC. "They feel it's too improbable." Perhaps they should reconsider. Berry, who helped run the doomsday simulations that ravaged San Francisco, says: "Security experts are not asking if a biological attack on a civilian population is going to happen, but when." >From New Scientist, 19 September 1998 � Copyright New Scientist, RBI Limited 1998 ----------------------- NOTE: In accordance with Title 17 U.S.C. section 107, this material is distributed without profit or payment to those who have expressed a prior interest in receiving this information for non-profit research and educational purposes only. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml ----------------------- ********************************************** To subscribe or unsubscribe, email: majordomo at majordomo.pobox.com with the message: (un)subscribe ignition-point email at address ********************************************** www.telepath.com/believer ********************************************** From vznuri at netcom.com Sat Sep 19 06:46:08 1998 From: vznuri at netcom.com (Vladimir Z. Nuri) Date: Sat, 19 Sep 1998 21:46:08 +0800 Subject: IP: IRS official predicts Y2K snafus Message-ID: <199809200246.TAA11933@netcom13.netcom.com> From: believer at telepath.com Subject: IP: IRS official predicts Y2K snafus Date: Fri, 18 Sep 1998 12:20:40 -0500 To: believer at telepath.com Source: Government Executive Magazine http://www.govexec.com/dailyfed/0998/091798n1.htm September 17, 1998 DAILY BRIEFING IRS official predicts Y2K snafus By Nancy Ferris nferris at govexec.com The new chief information officer at the IRS is predicting there will be tax processing problems in the upcoming filing season because of the agency's speeded-up program to fix year 2000 bugs in its computer systems. CIO Paul J. Cosgrave, speaking today at a luncheon meeting of the Association for Federal Information Resources Management, said 98 percent of the IRS's software will be fixed by early next year, when the 1998 filing season begins. But, he added, "there will be some problems" because not all of the fixes will be perfect. Asked afterward how serious the problems would be, Cosgrave said it was too early to tell. The agency is working hard to minimize their effect, he added. The good news, he said, is that when the century change actually occurs on Dec. 31, 1999, the IRS will have put its Y2K problems behind it. "We're a year early," he said. The agency is spending close to $1 billion on Y2K fixes. Cosgrave, a well-known consultant, was brought in to help the IRS straighten out its troubled systems modernization program and build new systems to support the reorganized agency. He said the IRS will exercise more central control over information technology and try to standardize the systems environment. "Today we have 17 e-mail systems in the IRS," he said by way of example. The reorganization announced by IRS Commissioner Charles Rossotti will replace the service's current regional structure with four new units serving specific groups of customers. That change, combined with the systems modernization program, will lead to new job responsibilities for many IRS employees, Cosgrave said. The agency will move some headquarters functions to field offices and move some back office employees to customer service jobs. But because it can't relocate many of the affected workers, it plans to "use more remote assignment work," where employees in one location work for managers in another, Cosgrave said. The IRS also will dramatically increase its investment in employee training, from $3.5 million this year to $11 million two years from now. ----------------------- NOTE: In accordance with Title 17 U.S.C. section 107, this material is distributed without profit or payment to those who have expressed a prior interest in receiving this information for non-profit research and educational purposes only. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml ----------------------- ********************************************** To subscribe or unsubscribe, email: majordomo at majordomo.pobox.com with the message: (un)subscribe ignition-point email at address ********************************************** www.telepath.com/believer ********************************************** From vznuri at netcom.com Sat Sep 19 06:56:03 1998 From: vznuri at netcom.com (Vladimir Z. Nuri) Date: Sat, 19 Sep 1998 21:56:03 +0800 Subject: IP: [Spooks] CIA Losing Its Best Operatives Message-ID: <199809200247.TAA12088@netcom13.netcom.com> From: Bridget973 at aol.com Subject: IP: [Spooks] CIA Losing Its Best Operatives Date: Sat, 19 Sep 1998 21:43:13 EDT To: ignition-point at majordomo.pobox.com Subject: [Spooks] CIA Losing Its Best Operatives Date: Wed, 16 Sep 1998 22:51:13 -0500 From: Bob Margolis To: Spooks WASHINGTON (AP) -- The CIA is pumping money and people into recruiting efforts to battle a trend that the agency's departing inspector general says has sapped the clandestine service of its most experienced hands. Agency officials outlined Tuesday initiatives that CIA Director George Tenet announced internally last month to increase pay, provide hiring bonuses and shorten the waiting time for job offers. ``There are plenty of headhunters out there ready to pounce on strong candidates,'' Tenet told agency employees in his announcement. ``To delay is to lose.'' The program is intended to combat a problem outlined in an op-ed article by outgoing CIA Inspector General Fred Hitz who said the CIA's Directorate of Operations, the clandestine spy service, is losing its best people amid organizational drift and declining morale. ``The picture is not encouraging,'' said Hitz, the CIA's chief watchdog from 1990 until this year. Writing in an op-ed article in The Washington Post, Hitz said the Directorate of Operations ``has been shrinking in size and capability since the end of the Cold War.'' A recent study showed departures from the agency due to attrition ``involved high-quality officers the agency could not afford to lose,'' Hitz wrote. The number of CIA employees is classified, but the Federation of American Scientists, a Washington-based group that follows intelligence matters, estimates it has shrunk from more than 20,000 to about 16,000 since the Cold War. The clandestine service is estimated at several thousand. Agency and congressional officials said the critique may be outdated as the CIA pumps new money and energy into recruiting. But one knowledgeable congressional staffer said the problem got so bad that an entire incoming class of operatives -- perhaps a few dozen recruits -- had to be canceled for lack of money. Hitz pointed to the difficulty of recruiting in a booming economy and to low morale as a result of ``the lack of a clear mission'' at CIA. ``Nobody worth his or her salt is going to join an organization that has lost faith in itself, is confused about its mission and is trapped in the sclerosis of a middle-aged bureaucracy,'' he said. Rep. Porter Goss, R-Fla., chairman of the House Intelligence Committee and a former CIA clandestine operative, said an instinct to blame the CIA every time a risky intelligence venture fails is taking its toll. ``With so many unyielding critics, the CIA has become gun-shy,'' Goss said. Sen. Bob Kerrey, D-Neb., vice chairman of the Senate Intelligence Committee, said Hitz has been a leading critic of the clandestine service and may himself be partly to blame for low morale. Still, Kerrey agreed recruitment is a serious agency problem. Sen. Richard Shelby, R-Ala., the committee chairman, said the CIA must focus more clearly on defining its mission and outlining how it will use field operatives to combat terrorism, weapons proliferation and drug trafficking. In recent months, the House and Senate Intelligence Committees have pushed for more money for the CIA's so-called human intelligence efforts, including its field operatives. -=-=- AP NEWS The Associated Press News Service Copyright 1998 by The Associated Press All Rights Reserved --- Submissions should be sent to spooks at qth.net To unsubscribe, send "unsubscribe spooks" to majordomo at qth.net -- bridget973 at aol.com Black Helicopters on the Horizon: http://members.xoom.com/bridget973 ********************************************** To subscribe or unsubscribe, email: majordomo at majordomo.pobox.com with the message: (un)subscribe ignition-point email at address ********************************************** www.telepath.com/believer ********************************************** From vznuri at netcom.com Sat Sep 19 06:56:06 1998 From: vznuri at netcom.com (Vladimir Z. Nuri) Date: Sat, 19 Sep 1998 21:56:06 +0800 Subject: IP: Killed by Police? Keep it Secret Message-ID: <199809200247.TAA12034@netcom13.netcom.com> From: believer at telepath.com Subject: IP: Killed by Police? Keep it Secret Date: Sat, 19 Sep 1998 10:12:07 -0500 To: believer at telepath.com Source: Rocky Mountain News http://www.insidedenver.com/news/0919secr1.shtml Secrecy pushed in killings by police But critics say names of officers should always be made public By Kevin Vaughan Rocky Mountain News Staff Writer A move is afoot in Colorado to keep the names of police officers who shoot people secret. A Greeley judge this week ruled that the public has no right to know which officers shot and killed four people over the past two years. "That seems like sort of the ultimate double standard to me, because I can shoot and kill someone in my house in self-defense, and my name will be open as a matter of public record," said Chris Cobler, managing editor of the Greeley Tribune. The paper had sued the Greeley Police Department, the Weld County Sheriff's Department and the district attorney's office to obtain the officers' names. At least one legislator praised Weld District Judge Jonathan Hays' Wednesday ruling. "I am strongly opposed to releasing the names of those officers that have not been found accountable, or found guilty, in a shooting," said state Sen. Ken Arnold, R-Westminster. Arnold spent 28 years with the Colorado State Patrol before becoming a lawmaker. The State Patrol and most other Colorado police agencies release the names of officers involved in shootings -- some agencies immediately, others in weeks or months. But newspaper editors and the American Civil Liberties Union worry that the disclosure practice may soon end because of the ruling. In Aurora, Police Chief Vern Saint Vincent has refused to identify two officers who killed a gunman in a domestic dispute a week ago, citing the same legal provisions the Greeley judge used. Saint Vincent said his decision is temporary, and he plans to identify the officers after investigating threats against them. But he may change his mind. He said he expects his officers to lobby for secrecy and that he'll consider it. "There simply can't be a right to privacy for someone with the full authority of a law enforcement officer who has used deadly force against a citizen," said Tom Kelley, an attorney for the Colorado Press Association. "You could make the argument that anyone accused of a crime has a right to privacy, which I don't think anyone would take very seriously." At issue is the interpretation of two state laws governing the release of public records and criminal-justice documents. The laws spell out what the public has a right to see. Hays ruled that police shootings are not "official actions" as defined by the Criminal Justice Records Act. As such, they fall under an area of the law that allows police and sheriff's departments to withhold information that is "contrary to the public interest." Identifying the officers, Hays wrote, "plays no significant, positive role in the functioning of the criminal-justice process." But one of the state's top cops doesn't see it that way. "I just have this problem with the idea that that should be a blanket policy," said Pat Ahlstrom, executive director of the state Department of Public Safety. "We don't see it that way. They're public officers, and the act of using force and deadly force is subject to public scrutiny." The department oversees the State Patrol and the Colorado Bureau of Investigation. A check of other law enforcement agencies in the Denver area found that all routinely release the names of officers in shootings. "There's really no reason for us not to release the names," said Adams County sheriff's Sgt. Mike Kercheval. Different agencies have different rules about when the names are released. For some, it comes within 24 hours of a shooting. Others wait longer. Lakewood, for example, withholds the name of an officer involved in a shooting until the investigation is finished. "It is the same procedure that is afforded any citizen in Lakewood that is investigated in a shooting," police spokeswoman Lynn Kimbrough said. "For us, it is not a matter of 'if.' It is simply a matter of 'when."' Cobler said the Tribune has no plan to appeal this week's ruling. But others said they expect an effort to change it, either through an appeal or by attempting to change the laws to make them clearer. "Let's change the statute," said Mark Silverstein, legal director of the ACLU of Colorado. Arnold, however, said he trusts police and prosecutors to investigate shootings thoroughly. September 19, 1998 ----------------------- NOTE: In accordance with Title 17 U.S.C. section 107, this material is distributed without profit or payment to those who have expressed a prior interest in receiving this information for non-profit research and educational purposes only. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml ----------------------- ********************************************** To subscribe or unsubscribe, email: majordomo at majordomo.pobox.com with the message: (un)subscribe ignition-point email at address ********************************************** www.telepath.com/believer ********************************************** From vznuri at netcom.com Sat Sep 19 06:56:09 1998 From: vznuri at netcom.com (Vladimir Z. Nuri) Date: Sat, 19 Sep 1998 21:56:09 +0800 Subject: IP: UK: Microchips & Animal Passports for Pets Message-ID: <199809200246.TAA11989@netcom13.netcom.com> From: believer at telepath.com Subject: IP: UK: Microchips & Animal Passports for Pets Date: Sat, 19 Sep 1998 06:40:49 -0500 To: believer at telepath.com Source: London Telegraph http://www.telegraph.co.uk:80/et?ac=000150689433551&rtmo=gYkgwZZu&atmo=99999 999&P4_FOLLOW_ON=/98/9/19/npets19.html&pg=/et/98/9/19/npets19.html UK News Electronic Telegraph Saturday 19 September 1998 Issue 1212 Passports for pets in new rabies law By David Brown, Agriculture Editor BRITAIN'S stringent anti-rabies quarantine laws are to be swept aside in favour of electronic scanners and animal passports under plans to be published by the Government next week. A scheme relying on microchip implants that can be electronically monitored, together with documentary proof that animals have been immunised against rabies and other diseases, are among a raft of proposals that could mean the demise of mandatory six-months quarantine for all imported animals. Under the proposals, animals travelling between designated "low disease risk" countries in Europe and elsewhere would be allowed entry on condition that they were carefully screened on arrival and possibly subjected to blood tests. The Government is likely to back the proposals for a radical overhaul of the increasingly controversial quarantine system, which has been Britain's main front-line defence against rabies for nearly a century. Currently, imported pets must be held in nominated kennels for six months until vets decide they pose no health risk to people or animals in this country. Diplomats and members of the Armed Forces will be among those who should find life easier - if their overseas posts meet new criteria for assessing potential risks and their animals are properly vaccinated and provided with proposed new movement documents. But quarantine will not disappear completely under the plans drawn up over the past 10 months by a team of independent government advisers headed by Prof Ian Kennedy of University College, London. It will remain as a safety net to screen animals imported from countries that still have a problem with rabies - including many in Eastern Europe, North and South America, Africa and the Far East. "It will not be the free-for-all that some people might expect," Whitehall sources said last night. Nick Brown, the Minister of Agriculture, is expected to call a press conference next Wednesday to publish the report. But before the Government acts, the plans will be circulated for consultation among vets, animal welfare organisations, including the Royal Society for the Prevention of Cruelty to Animals, dog and cat breed societies, farmers and other groups with an interest in animal health. Britain's last major rabies scare was in 1969. In 1983, an Irish Wolfhound imported from the United States was caught with rabies in a quarantine kennel and in June 1996, at the height of the BSE crisis, a rabid bat that is believed to have crossed the Channel, bit a pregnant woman in Newhaven, Sussex. The Government decided in October last year to review the current quarantine arrangements after coming under mounting pressure from animal welfare groups and pet owners, including Chris Patten, Britain's last Governor of Hong Kong, who complained about difficulties in returning his family's pet dogs to Britain. Those complaints, coupled with the decline of rabies in EU countries, have given added impetus for the reform of the system over the past two years. But many vets remain to be convinced that easing quarantine is a good idea, arguing that veterinary certificates issued abroad may not be valid. The British Veterinary Association said last night: "We have not seen a copy of this report but our position is clear. We will not agree to any changes which do not, in our view, provide the United Kingdom with at least the level of safeguards against disease that the present quarantine system provides." � Copyright Telegraph Group Limited 1998. ----------------------- NOTE: In accordance with Title 17 U.S.C. section 107, this material is distributed without profit or payment to those who have expressed a prior interest in receiving this information for non-profit research and educational purposes only. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml ----------------------- ********************************************** To subscribe or unsubscribe, email: majordomo at majordomo.pobox.com with the message: (un)subscribe ignition-point email at address ********************************************** www.telepath.com/believer ********************************************** From vznuri at netcom.com Sat Sep 19 06:56:41 1998 From: vznuri at netcom.com (Vladimir Z. Nuri) Date: Sat, 19 Sep 1998 21:56:41 +0800 Subject: IP: Hacker editor rides herd on unruly institution Message-ID: <199809200247.TAA12045@netcom13.netcom.com> From: believer at telepath.com Subject: IP: Hacker editor rides herd on unruly institution Date: Sat, 19 Sep 1998 11:51:24 -0500 To: believer at telepath.com Source: Fox News - AP Hacker editor rides herd on unruly institution 11.01 a.m. ET (1502 GMT) September 19, 1998 By Chris Allbritton, Associated Press SAN FRANCISCO (AP) � The lines of text scrolled off the screen quickly, but the bleached-blond hacker snatched quick glances at the visitors' log on his Web page. Lots of visitors using military and government computers. The hacker, who calls himself Route, said he always gets a kick out of the feds' visits. He smiled. The FBI, the CIA and the others "wouldn't be doing their job if they weren't tracking computer information both legitimate and illegitimate,'' Route said. "I guess Phrack falls somewhere in between.'' Phrack is an online publication called a 'zine. It's a digital chimera: written for hackers but read by law enforcement, too. It's been the subject of federal prosecution, yet it still operates in the open. Its name combines "hack'' and "phreak,'' which refers to phone hacking. It's got attitude, technical know-how and in many ways defines today's hacker scene. It first hit the electronic bulletin boards Nov. 17, 1985, ages ago in hacker years. To put its longevity in perspective, Phrack came out two years after the movie "WarGames'' in which actor Matthew Broderick established the cliched image of the hacker as the lonely kid who altered his grades with a computer. Phrack predates the World Wide Web by almost a decade. And Phrack is older than many of its readers, who number about 8,000, said Route, who refuses to give his real name. Route, 24, doesn't look like the scrawny computer nerd with the cathode-ray pallor so many think of when the word hacker is mentioned. Silver earrings dangle from each ear and a bar pierces his tongue. Spidery tattoos creep down his shoulders and over biceps grown solid with hours of iron work. Behind his glower lies a keen mind that cuts through computer network problems like a digital knife, an invaluable skill for his day job at a computer security firm with Fortune 500 companies for clients. Route refused to name his company. Phrack's improbable history begins in 1985 when a hacker with the handle Taran King cobbled together various subversive texts that had been circulating like Soviet-era samizdat on the archipelago of underground electronic bulletin boards. It included all sorts of mischief-making: "How to Pick Master Locks,'' "How to Make an Acetylene Bomb'' and "School/College Computer Dial-Ups.'' But Phrack found itself the focus of federal prosecution in 1990, when editor Craig Neidorf, a k a Knight Lightning, was prosecuted by the Chicago Computer Fraud and Abuse Task Force. His alleged crime? He published a document in Phrack with certain details of the emergency 911 systems in use around the country. It had been given to him by another hacker who had copied it from computers owned by BellSouth, which valued it at almost $80,000. But the task force wanted to prove the document was more than valuable. Assistant U.S. Attorney William J. Cook said it put dangerous information in the hands of hackers. The case fell apart when Neidorf's lawyer proved that more detailed information about the system had appeared in other publications. You could order them from phone company technical catalogs for $13. The charges were dropped. Neidorf's trial was over. If today's Phrack is a bit less confrontational, that's understandable. Like many of the older hackers, Route is shifting his focus away from anarchy texts and phone hacking to computer security. Its "how-to'' days are pretty much over. "Phrack is not meant to be a manual of vulnerabilities,'' he said. As the editor, Route knows that Phrack can still be used for illegal purposes. "But you can't hold people completely liable for just putting information out there.'' He said he has had "blatantly illegal stuff'' sent to him. Once, he said he received the technical specifications for most pager systems used in the country, complete with how to hack those systems. He didn't publish. "It's a judgment call,'' he said. "I have no intention of running up against the law or (upsetting) the military.'' But it's almost guaranteed that something gleaned from Phrack will be used against the computer system of a big and powerful organization or business. "The scene is going to do what the scene is going to do,'' he said. "It's like any clique in society. You have good people and you have bad people.'' � 1998 Associated Press. All rights reserved. ----------------------- NOTE: In accordance with Title 17 U.S.C. section 107, this material is distributed without profit or payment to those who have expressed a prior interest in receiving this information for non-profit research and educational purposes only. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml ----------------------- ********************************************** To subscribe or unsubscribe, email: majordomo at majordomo.pobox.com with the message: (un)subscribe ignition-point email at address ********************************************** www.telepath.com/believer ********************************************** From vznuri at netcom.com Sat Sep 19 06:56:47 1998 From: vznuri at netcom.com (Vladimir Z. Nuri) Date: Sat, 19 Sep 1998 21:56:47 +0800 Subject: IP: IRS, White House above the law? by Joseph Farah Message-ID: <199809200247.TAA12078@netcom13.netcom.com> From: Jan Subject: IP: IRS, White House above the law? by Joseph Farah Date: Sat, 19 Sep 1998 19:54:10 -0500 To: Ignition-Point Date: Fri, 18 Sep 1998 14:31:36 -0600 From: Robert Huddleston Subject: IRS, White House above the law? by Joseph Farah between the lines by Joseph Farah FRIDAY SEPTEMBER 18, 1998 http://www.worldnetdaily.com/btlines/980918_btl_irs_white_house.html IRS, White House above the law? Last week, we had our first court hearing in our $10 million lawsuit against White House and Internal Revenue Service officials we believe conspired to use their government power to harass and intimidate my organization, the Western Journalism Center, for exposing Clinton administration scandals for the last four years. This was a procedural hearing in Sacramento before U.S. Judge Milton Schwartz, a Carter appointee, who seemed to be preparing the Justice Department attorney from Washington and our counsel from Larry Klayman's Judicial Watch for a major trial. Nevertheless, the government is trying to abort this trial on the kind of familiar technical grounds we have come to expect from this administration. Interestingly, the Justice Department has yet to dispute the major claims of our case -- that the center was the victim of a politically motivated audit designed to squelch our First Amendment rights. The Justice Department is claiming the one-year statute of limitations expired before we filed the suit. Not true. By any standard, we filed in plenty of time. The audit of our organization ended in May 1997. We were not officially notified until June of 1997. No tax-exempt organization in its right mind would sue the IRS during an audit. We filed the lawsuit in May of 1998 within one year of the audit being closed. The Justice Department is claiming an argument you've heard before from the administration -- that there is "no controlling legal authority" and, thus, no legislative remedy for organizations victimized by political audits. In other words, the president is free to use the IRS to go after his "enemies" and there is no punitive action the victim can take against him or the agents with whom he conspires. Next week, the Justice Department attorneys will be back in U.S. District Court in Sacramento to ask Judge Schwartz to dismiss the case on these specious grounds. I want to go on record right now as saying that no matter how the judge rules on this motion, the Western Journalism Center will not stop in pressing this matter for adjudication and remedy. This is a case far too important to the future of this country and the rule of law to allow it to be dropped. Let's review the basic facts. In 1994, the center began investigating Clinton administration corruption. By December 1994, memos released to congressional investigators show that the White House counsel's office had begun targeting the center for action of some kind. In 1995, the center was a major focus of a White House counsel's office 331-page report called the Communication Stream of Conspiracy Commerce. I was the only journalist profiled in this mammoth report alleging a wide-ranging media conspiracy against the president. In early 1996, I first began hearing rumors that my organization was being targeted by the IRS. Months later, we were notified that we were under audit and that our tax-exempt status was under scrutiny because of the nature of our investigative work into Clinton administration corruption during an election year. When we questioned the IRS agent about his authority to interfere in our First Amendment-protected activities, he said: "Look, this is a political case, and the decision will be made at the national level." We then exposed this blatant abuse of the IRS against our organization and the pattern of politically motivated audits against other non-profits in the pages of the Wall Street Journal. As a result, Congress began an investigation, and IRS Commissioner Margaret Milner Richardson resigned. Ultimately, the agent in charge was removed from the case, investigated internally by the IRS and a new agent assigned. The nine-month audit was then closed within two days. We demanded our case file, which the "Taxpayer Bill of Rights" states is available to any taxpayer following an audit. It was denied. We then filed a Freedom of Information Act request for it. Again it was denied. The IRS stated that the file would be withheld because it had been through the hands of others within the IRS and possibly outside of the agency and was, thus, protected by "governmental privilege." Having exhausted every available means to document our growing conviction that we were targeted for political reasons, we filed suit. If you believe, as I do, that this is a monumentally important case, I ask for your sincere and unceasing intercessory prayers that justice will be done. A daily radio broadcast adaptation of Joseph Farah's commentaries can be heard at http://www.ktkz.com/ Joseph Farah is editor of WorldNetDaily.com and executive director of the Western Journalism Center, an independent group of investigative reporters. <@{{>< <@{{>< <@{{>< <@{{>< <@{{>< <@{{>< <@{{>< SOCIALIST 1. socialism ( Noun ] : social organization based on goverment control of the production and distribution of goods. ***** ************************************************* "But if the watchman sees the sword coming and does not blow the trumpet to warn the people and the sword comes and takes the life of one of them, that man will be taken away because of his sin, but I will hold the watchman accountable for his blood." Ezekiel 33:6 (NIV) ___________________________________________________________ New toll-free hotline to Congress Congress is making a new toll-free number available for citizens who would like to make their voices heard in Washington. 1-800-504-0031 Ask for your Congressman office and let him know what you think............. --------------------------------------------------------------- Join Gun Owners of America [ GOA ] today. Read more about GOA at : http://www.gunowners.org/ -------------------------------------------------------------- Jews for the Preservation of Firearms Ownership (JPFO) Become a JPFO member, go to: http://www.jpfo.org/member.htm There you will see a printable member application, along with info on membership Membership IS open to ALL Law abiding citizens. --------------------------------------------------------------- <@{{>< <@{{>< <@{{>< <@{{>< <@{{>< <@{{>< <@{{>< ******=========================================***** "Among the elementary measures the American Soviet government will adopt to further the cultural revolution are... [a] National Department of Education...the studies will be revolutionized, being cleansed of religious, patriotic, and other features of the bourgeois ideology. The students will be taught the basis of Marxian dialectical materialism, internationalism and the general ethics of the new Socialist society." - William Z. Foster, Toward Soviet America, 1932 "...Stage III...would proceed to a point where no state would have the military power to challenge the progressively strengthened U.N. peace force... The manufacture of armaments would be prohibited... All other armaments would be destroyed..." -Department of State publication number 7277 ********************************************** To subscribe or unsubscribe, email: majordomo at majordomo.pobox.com with the message: (un)subscribe ignition-point email at address ********************************************** www.telepath.com/believer ********************************************** From vznuri at netcom.com Sat Sep 19 06:57:05 1998 From: vznuri at netcom.com (Vladimir Z. Nuri) Date: Sat, 19 Sep 1998 21:57:05 +0800 Subject: IP: Clinton Computer Exports Compromise Nat'l Security Message-ID: <199809200246.TAA12011@netcom13.netcom.com> From: believer at telepath.com Subject: IP: Clinton Computer Exports Compromise Nat'l Security Date: Sat, 19 Sep 1998 07:40:35 -0500 To: believer at telepath.com Source: New York Times http://www.nytimes.com/library/tech/98/09/biztech/articles/17computer-export s.html September 17, 1998 U.S. Agency Faults Study on Exports of Computers By JEFF GERTH WASHINGTON -- When the Clinton administration relaxed export controls on high-performance computers in 1996, it relied on a flawed report that did not study the national security implications and concluded with scant data that the computers were already easily available around the world, government auditors said Wednesday. The opposite conclusion is true, said the General Accounting Office, the audit arm of Congress. In a report released to a Senate panel, the auditors found that such high-performance computers "are not readily available" to countries of national security concern to the United States, like China, India or Pakistan. The GAO report also said that American manufacturers continue to dominate the overseas market. An important administration argument for loosening export controls was that easing controls was the only way American computer makers could compete against widely available foreign-made technology. The auditors said that "a key element" in the decision to relax the export controls was a Stanford University study, commissioned by the Commerce and Defense departments without any competition, that said some U.S. computer technology was uncontrollable worldwide and efforts to control it would harm the industry. But the auditors said that the study "lacked empirical evidence or analysis regarding its conclusion" of uncontrollability. The GAO also said that the study failed to do one of its assigned tasks: study how countries like China might use the computers for military purposes. Within a year after the export rules were loosened, military installations in Russia and China obtained a few powerful new American computers, prompting criminal investigations and a retightening by Congress of the export controls. The study's authors responded to the GAO, and their responses were presented to the Senate subcommittee on International Security, Proliferation and Federal Services by Harold Johnson, the GAO's associate director. Johnson said that the authors told the accounting office that they did not do a national security threat analysis because the federal government does not have the right information to do such a study. Seymour Goodman, the study's principal author, disputed the GAO's criticism of his report's analysis. "We had a lot of empirical evidence and we did a comprehensive analysis that was different from theirs and that focused on the availability of U.S.-built systems." William Reinsch, the undersecretary of commerce for export administration, defended the administration's relaxation of controls and said the GAO had asked the wrong question in looking at the computer marketplace. "Even though the U.S. today dominates the market for high-performance computers, there is a performance threshold below which we can not realistically expect to maintain control of computers unless we restrict sales to our closest allies," he said. Reinsch went on to argue that the GAO was wrong to rank national security as the top priority for looking at this issue. Instead, he said, the first priority should be the realities of the marketplace, where high-performance computers "are becoming less and less controllable because they are becoming smaller, cheaper, more powerful and more reliable, requiring less vendor support." President Clinton announced the change in policy in late 1995, fulfilling a pledge he made early in his administration to computer executives. The move also helped countries like China, which could now buy more advanced American computers without any federal license as long as the technology was used for civilian purposes. But the new rules made the exporter responsible for deciding whether a license was required, a decision previously made by the federal government. This new responsibility, the GAO report said, was "particularly difficult" for companies selling to countries like China, "where identifying the distinction between a civilian and military end user can be difficult without information that is sometimes available only to the U.S. government." Now, the Clinton administration is weighing whether to further relax the computer export limits. But the administration's critics remain "concerned that the policy is flawed," said Sen. Thad Cochran, R-Miss., who led Wednesday's hearing. Copyright 1998 The New York Times Company ----------------------- NOTE: In accordance with Title 17 U.S.C. section 107, this material is distributed without profit or payment to those who have expressed a prior interest in receiving this information for non-profit research and educational purposes only. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml ----------------------- ********************************************** To subscribe or unsubscribe, email: majordomo at majordomo.pobox.com with the message: (un)subscribe ignition-point email at address ********************************************** www.telepath.com/believer ********************************************** From vznuri at netcom.com Sat Sep 19 06:57:58 1998 From: vznuri at netcom.com (Vladimir Z. Nuri) Date: Sat, 19 Sep 1998 21:57:58 +0800 Subject: IP: ISPI Clips 4.47:Russian Big Brother covets all the E-mail Message-ID: <199809200246.TAA11978@netcom13.netcom.com> From: "ama-gi ISPI" Subject: IP: ISPI Clips 4.47:Russian Big Brother covets all the E-mail Date: Sat, 19 Sep 1998 01:18:03 -0700 To: ISPI Clips 4.47:Russian Big Brother covets all the E-mail News & Info from the Institute for the Study of Privacy Issues (ISPI) Saturday September 19, 1998 ISPI4Privacy at ama-gi.com ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ This From: US News & World Report, September 14, 1998 http://www.usnews.com Big Brother covets all the E-mail http://www.usnews.com/usnews/issue/980914/14key.htm By Christian Caryl Believe it or not, there are some areas where Russia leads the world. While other countries from Germany to Singapore ponder the pluses and minuses of government regulation of the Internet, Russia is way ahead. Its State Security Service (FSB), the main successor to the KGB, is planning all-encompassing surveillance of Internet communications. Internet activists say that the proposed regulations are proof of just how far Russia's struggling democracy has to go. "There is no concept of privacy anywhere in Russian legislation," says Andrei Sebrant of GlasNet, one of the country's leading Internet service providers. "So strictly speaking, there's nothing at all illegal about this." The plans, which have never been officially presented or acknowledged by the government, became public a few weeks ago, when they were leaked to critics. The idea is to force each service provider to install a "black box" connecting its network to the local FSB office via fiber-optic cable. That would enable state-sponsored snoopers to collect and examine E-mail, as well as data on addressees and recipients and Web surfing habits. Users, meanwhile, would never have the slightest sign of prying eyes and ears. The cost for the extra equipment would be borne by the providers themselves. Anatoli Levenchuk, an Internet expert who posted the proposed regulations on the Web and is leading the most vocal online protest, says that the requirements would boost providers' costs by 10 to 15 percent. That increase would be passed on to users, who already pay around $35 per month, very expensive by Russian standards. "Right now, we have about 1 million Internet users in Russia," says Levenchuk. "So those price hikes could immediately reduce the Internet community here by hundreds of thousands." Any providers who refuse to comply can expect to have their operating licenses yanked by the all-powerful Ministry of Communications, which has been helping the FSB draft the rules. But the FSB's plans may ultimately serve to prove just how resistant to any kind of centralized control the Internet remains. The new proposal doesn't address encryption, and the drug dealers and terrorists the FSB ostensibly wants to catch will be the first to resort to tough-to-crack encryption systems. Russian Web sites offering encryption technology have been doing a booming business since the first news of the regulations came out. But most Russian Internet users have little familiarity with encryption techniques, according to Maksim Otstavnov, an editor at CompuTerra magazine. For them, this could be the electronic equivalent of the days when the Soviet KGB routinely tapped phones and opened mail. --------------------------------NOTICE:------------------------------ ISPI Clips are news & opinion articles on privacy issues from all points of view; they are clipped from local, national and international newspapers, journals and magazines, etc. Inclusion as an ISPI Clip does not necessarily reflect an endorsement of the content or opinion by ISPI. In compliance with Title 17 U.S.C. section 107, this material is distributed free without profit or payment for non-profit research and educational purposes only. --------------------------------------------------------------------------- ISPI Clips is a FREE e-mail service from the "Institute for the Study of Privacy Issues" (ISPI). To receive "ISPI Clips" on a daily bases (approx. 3 - 8 clips per day) send the following message "Please enter [Your Name] into the ISPI Clips list: [Your e-mail address]" to: ISPIClips at ama-gi.com . The Institute for the Study of Privacy Issues (ISPI) is a small contributor-funded organization based in Victoria, British Columbia (Canada). ISPI operates on a not-for-profit basis, accepts no government funding and takes a global perspective. ISPI's mandate is to conduct & promote interdisciplinary research into electronic, personal and financial privacy with a view toward helping ordinary people understand the degree of privacy they have with respect to government, industry and each other and to likewise inform them about techniques to enhance their privacy. But, none of this can be accomplished without your kind and generous financial support. If you value in the ISPI Clips service or if you are concerned about the erosion of your privacy in general, won't you please help us continue this important work by becoming an "ISPI Clips Supporter" or by taking out an institute Membership? We gratefully accept all contributions: Less than $60 ISPI Clips Supporter $60 - $99 Primary ISPI Membership (1 year) $100 - $300 Senior ISPI Membership (2 years) More than $300 Executive Council Membership (life) Your ISPI "membership" contribution entitles you to receive "The ISPI Privacy Reporter" (our bi-monthly 12 page hard-copy newsletter in multi-contributor format) for the duration of your membership. For a contribution form with postal instructions please send the following message "ISPI Contribution Form" to ISPI4Privacy at ama-gi.com . We maintain a strict privacy policy. Any information you divulge to ISPI is kept in strict confidence. It will not be sold, lent or given away to any third party. ********************************************** To subscribe or unsubscribe, email: majordomo at majordomo.pobox.com with the message: (un)subscribe ignition-point email at address ********************************************** www.telepath.com/believer ********************************************** From ggr at qualcomm.com Sat Sep 19 07:16:49 1998 From: ggr at qualcomm.com (Greg Rose) Date: Sat, 19 Sep 1998 22:16:49 +0800 Subject: Repost in text: IDEA(tm) weakness In-Reply-To: <199809200116.DAA28107@replay.com> Message-ID: <199809200308.NAA12805@avalon.qualcomm.com> I think this is wrong. It claims that the problem in IDEA comes from the bias of the multiplication operation... but the multiply in IDEA is over the integers modulo 65537, with the 0 value representing 65536, not 0... this is in fact an unbiased operation. However I have not attempted to verify the rest of the logic. Anonymous writes: > Is IDEA secure ? > > The IDEA algorithm (patented by ASCOM) is the core algorithmm used > in PGP. It is based on a rotating 128 bit key split into 16 bit > segments. The algorthm converts 64 bits of data at a time using the > following operations '+', '^' (exclusive-or) and '*'. > > The formulas are : > >[...] > > Given a large random data message (ie 1000 samples - 64*1000 = 8Kb > file). The distribution of the above operations can be used to > break the key. ie both the '+' and the '^' operations give an even > distribution but the '*' operator gives a biased distribution > towards '0'. Greg Rose INTERNET: ggr at qualcomm.com QUALCOMM Australia VOICE: +61-2-9181 4851 FAX: +61-2-9181 5470 Suite 410, Birkenhead Point http://people.qualcomm.com/ggr/ Drummoyne NSW 2047 B5 DF 66 95 89 68 1F C8 EF 29 FA 27 F2 2A 94 8F From jf_avon at citenet.net Sat Sep 19 07:21:01 1998 From: jf_avon at citenet.net (Jean-Francois Avon) Date: Sat, 19 Sep 1998 22:21:01 +0800 Subject: Genocide WAS: Political purges and Bill C-68 Message-ID: <199809200301.XAA12070@cti06.citenet.net> Forwarded from the Canadian Firearms Digest V2 #596, Sat Sept 19, 1998 Thank you, principal at connect.ab.ca for your enlightening commentary. Since you posted it on a public list, I took the permission to re-post it to the original list. Highest regards. Jean-Francois Avon --------------------------- your letter ----------------------------- Date: Fri, 18 Sep 1998 15:52:46 -0600 From: principal at connect.ab.ca Subject: genocide ************** Beginning of Quote ********************** Date: Thu, 17 Sep 1998 14:10:44 -0600 From: "Jean-Francois Avon" Subject: Political purges and Bill C-68 Hi to all of you. I know most of you personally, except for the posts to mailing lists and public organisms. - - ------------------ beginning of letter --------------- Yesterday night, around 2am, I was unable to sleep and surfing the TV channels up until I fell on a movie on the ShowCase channel. This channel is devoted to repertoire cinema and less mainstream movies. As I flick to this channel, I see something I can't take my eyes off for it's overwhelming revolting topic: a bunch of corpses are on a dolly, each of one being tied by the feet to a crane cable and quickly, efficiently taken away to a big heap of corpses. ***************** End of Quote ************************** I was in Rwanda during the latter part of the genocide and during the period immediately following the Revolution. I concur with Mr. Avon. I have seen the heaps of corpses. The deaths of these people is tragic and firearms owners and free men and women should know what can happen if we allow ourselves to be cowed by government. It is worthwhile noting that contrary to the lies spewed by anti firearms groups firearms do not kill people. Rarely were the people of Rwanda killed by gunfire. They were killed in the tens of thousands with clubs and machetes. Why did these people go to there deaths like sheep to the slaughter? In my opinion they were so accustomed to unquestioning compliance that even in the face of death they would not rise up and fight. At the dozens of execution sites I encountered there were only two occasions where I saw evidence of gunfire. This was in the form of shotgun casings. I point this out because I questioned survivors about the procedures used by the government forces to round up and execute the mass numbers of people we are talking about here. Consistently, I was told that the government forces, with the assistance of collaborators, would either threaten the village leaders or convince them that they would be spared if they complied. They then moved the group en-mass to a collection point. At this time the villagers still complied with the butchers. Once a sufficient number of people were collected they would be slaughtered. The ratio of killers to victims would be quite small so if they had risen up as a group there could have been mass escape. This did not happen. There were exceptions . . . this is where the shotgun shells come in. There would be a couple of government soldiers with guns to cut down anyone that fled. In the Amahoro stadium in Kigali the bodies were piled one on top of another. Approx. 25,000 Rwandans were slaughtered there over a period of just a few days. In a small church and grounds on the road North from Cyangugu another 10,000 where slaughtered, hacked and bludgeoned to death. Of all the sensory overloads I experienced, one of the most memorable was that of a school in a village near the Eastern town of Byumba. The men and women were separated, which was fairly common, and then slaughtered. As usual they were not JUST killed but were hacked to pieces. Limbs were often chopped off first, brutal torture and emasculation was common before a merciful death was delivered by a fatal blow or machete wound. One of the dead was a young woman, her skull had been crushed with a club, upon examination of the body I saw that she still clutched her infant child to her chest. The skull of the child too was crushed. Drunk on the absolute power given to them by the government the soldiers and Intehamwe collaborators became blood thirsty fiends capable of killing a baby in such a brutal manner. (there were worse things but this has imprinted on my brain) In the center of the hollow square arrangement of huts were 2 twelve gauge casings . . . someone had tried to escape! There may be those who don't feel this information is topical or appropriate for the Digest as it is not directly a firearm issue. I believe there are some lessons. 1. Never have blind trust in the government when it comes to your or your loved ones life(a la Hep C). 2. There will always be collaborators, help your neighbor but never trust them completely. 3. Alone we are vulnerable, it is only through a unified group that you stand a chance against oppression. 4. To find out what a man is, give him power. 5. To murder masses, the mass murder does not need a specific tool. 6. Police and soldiers should never be the only ones with guns. (My credo, re-enforced by my experiences), As a free man I will not die on my knees. I submitted a quote to the list some months back. If the moderator will indulge me I would like to submit it again. "War is an ugly thing but not the ugliest of things; the decayed and degraded state of moral and patriotic feelings which thinks that nothing is worth war is much worse. A man who has nothing for which he is willing to fight, nothing which is more important than his own personal safety, is a miserable creature and has no chance of being free unless made and kept so by the exertions of better men than himself." - John Stuart Mill Jean-Francois Avon, B.Sc. Physics, Montreal, Canada DePompadour, Soci�t�d'Importation Lt�e Limoges fine porcelain and french crystal JFA Technologies, R&D�physicists &�engineers Instrumentation &�control, LabView programming PGP keys: http://bs.mit.edu:8001/pks-toplev.html PGP ID:C58ADD0D:529645E8205A8A5E F87CC86FAEFEF891 PGP ID:5B51964D:152ACCBCD4A481B0 254011193237822C Jean-Francois�Avon,�B.Sc.�Physics,�Montreal,�Canada ��DePompadour,�Soci�t�d'Importation�Lt�e �����Limoges�fine�porcelain�and�french�crystal ��JFA�Technologies,�R&D�physicists�&�engineers �����Instrumentation�&�control,�LabView�programming PGP�keys:�http://bs.mit.edu:8001/pks-toplev.html PGP�ID:C58ADD0D:529645E8205A8A5E�F87CC86FAEFEF891� PGP�ID:5B51964D:152ACCBCD4A481B0�254011193237822C From nobody at remailer.ch Sat Sep 19 07:24:52 1998 From: nobody at remailer.ch (Anonymous) Date: Sat, 19 Sep 1998 22:24:52 +0800 Subject: Clinton's fake apologies (fwd) Message-ID: <19980920032435.24227.qmail@hades.rpini.com> In reply to my suggestion that lieing under oath isn't a very good reason for impeachment, Jim Choate wrote: > Of course it's different if you preface your lie with "I swear to tell the > truth, the whole truth, and nothing but the truth". > > The oath is voluntary and therefore if broken no claim for duress, only > intentional misdirection, can explain such actions. echoed by nobody at remailer.ch who wrote: > ...If some public figure ... goes under oath and then lies, ... > he's trying to throw a wrench in the > justice system. It wouldn't be as bad if somebody like Jim or I lied under > oath, but this guy is the chief executive of the United States. He's > basically Top Cop, and his administration doesn't hesitate to press > charges against people who commit all sorts of victimless crimes. > I agree it's bad. I agree it undermines the justice system a little bit. But, ... impeachment? You're not charging him with murder (eg WACO), attacking the 1st ammendment (CDA), the 4th (SSN on driver's licences), the 5th (GAK). You're going after Al Capone for tax evasion. You want to get him because he's a Bad Person not because of the particular crime. This is ironic, because his crimes against our basic rights were committed while pursuing Bad People, but it is also hypocritical. nobody at remailer.ch also wrote: > [quoting me] > > I'm honoured to draw an ad hominem before revealing that I'm on AOL. > > > > -- an anonymous aol32 user. > > Actually, the amazing thing is that you're from AOL. You're coherent, you > quote, and you know how to use a remailer. One in a million. ;) Unbelievable, I would have thought. ;-> -- Aol32Monger From ravage at EINSTEIN.ssz.com Sat Sep 19 07:25:32 1998 From: ravage at EINSTEIN.ssz.com (Jim Choate) Date: Sat, 19 Sep 1998 22:25:32 +0800 Subject: Clinton's fake apologies (fwd) Message-ID: <199809200349.WAA12524@einstein.ssz.com> Forwarded message: > From adam at rpini.com Sat Sep 19 22:43:16 1998 > Date: 20 Sep 1998 03:24:35 -0000 > From: Anonymous > Subject: Re: Clinton's fake apologies (fwd) > I agree it's bad. I agree it undermines the justice system a little bit. > But, ... impeachment? If you can't trust your elected officials to live up to their word, in other words if they will lie under oath on something this immaterial then how do you trust him to live up to the oath he took when he took office? He asked, wasn't drafted, to have the peoples trust placed in him and then he reniged. > You're going after Al Capone > for tax evasion. Did Al Capone evade taxes? If so then what's your point? You want to get him because he's a Bad Person not because of > the particular crime. This is ironic, because his crimes against our basic > rights were committed while pursuing Bad People, but it is also hypocritical. Not at all, it simply recognizes that any public official with a record of lying under oath is not fit to hold office. ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From brianbr at together.net Sat Sep 19 07:52:03 1998 From: brianbr at together.net (Brian B. Riley) Date: Sat, 19 Sep 1998 22:52:03 +0800 Subject: Clinton's fake apologies (fwd) Message-ID: <199809200353.XAA17661@mx01.together.net> On 9/19/98 11:24 PM, Anonymous (nobody at remailer.ch) passed this wisdom: > >In reply to my suggestion that lieing under oath isn't >a very good reason for impeachment, > >Jim Choate wrote: >> Of course it's different if you preface your lie with "I swear to tell the >> truth, the whole truth, and nothing but the truth". >> >> The oath is voluntary and therefore if broken no claim for duress, only >> intentional misdirection, can explain such actions. > >echoed by nobody at remailer.ch who wrote: >> ...If some public figure ... goes under oath and then lies, ... >> he's trying to throw a wrench in the >> justice system. It wouldn't be as bad if somebody like Jim or I lied under >> oath, but this guy is the chief executive of the United States. He's >> basically Top Cop, and his administration doesn't hesitate to press >> charges against people who commit all sorts of victimless crimes. >> > >I agree it's bad. I agree it undermines the justice system a little bit. >But, ... impeachment? > >You're not charging him with murder (eg WACO), attacking the 1st >ammendment (CDA), >the 4th (SSN on driver's licences), the 5th (GAK). You're going after Al >Capone >for tax evasion. You want to get him because he's a Bad Person not because of >the particular crime. This is ironic, because his crimes against our basic >rights were committed while pursuing Bad People, but it is also hypocritical. > They couldn't get Capone any other way but on Income Tax Evasion ... we all know how much more guilty of how many more heinous crimes he was ... but we took him the only way we could ... Clinton is no different ... it would be grand and so fitting if we could impeach himt for having committed aggravated assault upon the Bill of Rights, but if we have to get him because he can't keep his pecker zipped up then so be it ... as with case of Al Capone, this country will also be richer without William Jefferson (Thomas must be rolling in his grave!) Klinton! Brian B. Riley --> http://members.macconnect.com/~brianbr For PGP Keys "When hell freezes over, grab your ice skates." -- Mark Johnson From stuffed at stuffed.net Sat Sep 19 23:05:53 1998 From: stuffed at stuffed.net (STUFFED NEWS DAILY) Date: Sat, 19 Sep 1998 23:05:53 -0700 (PDT) Subject: TAKE THE PRESIDENTIAL SEX TOUR/WOMAN WHO TURNED MONICA GREEN Message-ID: <19980919071000.27541.qmail@eureka.abc-web.com> Today we have THREE RealVideo movies showing Clinton closely embracing Lewinsky on occasions spanning many months. See for yourself if the signs were there for all to see... IN TODAY'S ISSUE: 30 NEW EXTRA HOT JPEGS! 5 NEW SIZZLING STORIES TOPLESS DANCER WITH DANGEROUS BOOBS RE-ARRESTED FOR BEING TOO REVEALING PRESIDENTIAL SEX TOUR + VIDEOS THE INFAMOUS DRUDGE REPORT MAY BE IN TROUBLE THE BEST OF EUREKA! THE WOMAN WHO TURNED MONICA GREEN VIRGIN NO LONG-AIR MIND IF I GLUE MY FACE TO YOUR FOOT TOO MUCH HOMEWORK IS BAD FOR YOU RACE CAR MAMA USED TO BE A MAN MUCH MORE! ----> http://stuffed.net/98/9/19/ <---- Welcome to today's issue of Stuffed. To read it you should click on the URL above. If it is not made clickable by your email program you will need to use your mouse to highlight the URL, copy it and then paste it into your browser (then press Return). This email is never sent unsolicited. Stuffed is the supplement for the Eureka newsletter you subscribed to. Full instructions on unsubscribing are in every issue of Eureka! ----> http://stuffed.net/98/9/19/ <---- From raph at acm.org Sat Sep 19 08:26:55 1998 From: raph at acm.org (Raph Levien) Date: Sat, 19 Sep 1998 23:26:55 +0800 Subject: Repost in text: IDEA(tm) weakness In-Reply-To: <199809200116.DAA28107@replay.com> Message-ID: <360484E7.11556EA4@acm.org> A quick review reveals that this is clearly another "PGP is broken" hoax. The author is assuming that IDEA's * operation has a nonuniform distribution of outputs given a uniform distribution of inputs. Since it is taken mod 65537 (a prime), this is simply not the case - for constant x, x * y mod 65537 is a permutation over y. Everything else flows from this flawed assumption. The rest of the post is silly as well. "Not tested on real PGP data because I couldn't find where the IDEA data starts." Very funny, this info is quite accessible. Also, posting the technique but witholding the code is ridiculous. If the technique worked, it would get implemented within hours. Oh well. It was exciting for a minute or two. Raph From nobody at replay.com Sat Sep 19 08:59:34 1998 From: nobody at replay.com (Anonymous) Date: Sat, 19 Sep 1998 23:59:34 +0800 Subject: CHALLENGE? Toto/signature attack w. unpublished public key Message-ID: <199809200502.HAA08667@replay.com> > > In addition it has to be that n is the right length based on the "s" > > padding. This limits it to an 8 bit range, in this case 1024-1031 > > bits. > > The constraint I gave was that log(n) = 1024. Bear in mind that the > msbyte of s = 0x08, so we know that n > s, and I think we know that n > < 2^1024 also based on the s padding from the signature. So based on > this n would be in the range 1020 - 1024 bits, right? Actually there is somewhat more flexibility than this. You made up the padding, it didn't come from the file, did it? You could add perhaps 1 more byte of FF without stretching credibility too extremely. Then n could be 1020 - 1032 bits. It's too bad that s started out so small (assuming the "true" n was 1024 bits). > > If you make n be a product of a bunch of small primes, so that you > > can make signatures with it, then a third party can detect this and > > know it is bogus. > > He has to factor your n to determine that it is bogus though? This > would imply that he had more compute than you do. (Not unreasonable > threat model mind). But didn't YOU have to factor n also? That's what you showed, originally, a large s^e which you factored down to get some small factors and a big one. If you manage to get a prime factorization you can combine factors to get your n. But it won't be any harder for him to factor than it was for you. > Resources available: one low end pentium based linux PC? :-) Just that > the attack is clearly feasible is interesting though a demonstration > would be perhaps more convincing to less technically aware IRS people. > The biggest resource overhead is implementing that lot though, unless > there exist packages or libraries which already do most of it for you. The discrete log algorithm is similar to quadratic sieve and other modern factoring algorithms. You do multiple factorizations of other numbers and combine them to generate the desired relationships. The difference is that the factor base is not just the primes, it uses special numbers. There was a break a few years ago of the discrete log modulus being used by Sun's RPC. This was something like 200-300 bits. Maybe that discrete log code could be obtained from the authors. From howree at cable.navy.mil Sat Sep 19 09:23:22 1998 From: howree at cable.navy.mil (Reeza!) Date: Sun, 20 Sep 1998 00:23:22 +0800 Subject: Clinton's fake apologies (fwd) In-Reply-To: <19980920032435.24227.qmail@hades.rpini.com> Message-ID: <3.0.5.32.19980920152605.0086ba30@205.83.192.13> At 03:24 AM 9/20/98 -0000, Anonymous wrote: > >I agree it's bad. I agree it undermines the justice system a little bit. >But, ... impeachment? > >You're not charging him with murder (eg WACO), attacking the 1st ammendment (CDA), >the 4th (SSN on driver's licences), the 5th (GAK). You're going after Al Capone >for tax evasion. You want to get him because he's a Bad Person not because of >the particular crime. This is ironic, because his crimes against our basic >rights were committed while pursuing Bad People, but it is also hypocritical. > I could care less if he had an affair, personally. But he had an affair with a subordinate in his direct employ. When CEO's do that, they get ostracized. I'm in the military. If I did that, I'd be on the carpet seeing the Ol' Man, perhaps even court martial, and then out of the military. And this is the example set by my Commander in Chief??? Many other presidents have had affairs while in office, starting with G. Washington himself. The difference is, they exercised better judgement and discretion re: who the affair was with, when and where it was consumated. Certainly the CIC is projecting a bad image, certainly it is his business if he has an affair, but when he does it in such a manner that it becomes front page material in every newspaper around the world, there is something terribly, desperately wrong. In case you hadn't noticed, the investigation of him, vis-a-vis the rules established by other demicans, his supposed compatriates, is still ongoing. Methinks this is just the tip of the iceberg, a bone for the populace to chew on so that when the rest of the story breaks, we (the dog) won't notice the prime rib and sirloin. I congratulate you for your defense of a person who demonstrably has broken his marriage vows, his oath of public office, and purjured himself while under an additional oath in a court of law. You, too, are a few neurons short of a functional synapse. I suggest you discuss it with the maker. The best way is large caliber bullet at sufficient velocity to penetrate and exit the cranial cavity. God speed, you fucking idiot. Reeza! The world was on fire,,, but no one could save me but you... Strange what desire ,,will make foolish people do..... (to the back beat) This world is only gonna break your heart.... ==C.I.== From nobody at remailer.ch Sat Sep 19 11:16:15 1998 From: nobody at remailer.ch (Anonymous) Date: Sun, 20 Sep 1998 02:16:15 +0800 Subject: Clinton's fake apologies (fwd) Message-ID: <19980920072503.29931.qmail@hades.rpini.com> On 20 Sep 1998, Anonymous wrote: > > In reply to my suggestion that lieing under oath isn't > a very good reason for impeachment, > > Jim Choate wrote: > > Of course it's different if you preface your lie with "I swear to tell the > > truth, the whole truth, and nothing but the truth". > > > > The oath is voluntary and therefore if broken no claim for duress, only > > intentional misdirection, can explain such actions. > > echoed by nobody at remailer.ch who wrote: > > ...If some public figure ... goes under oath and then lies, ... > > he's trying to throw a wrench in the > > justice system. It wouldn't be as bad if somebody like Jim or I lied under > > oath, but this guy is the chief executive of the United States. He's > > basically Top Cop, and his administration doesn't hesitate to press > > charges against people who commit all sorts of victimless crimes. > > > > I agree it's bad. I agree it undermines the justice system a little bit. > But, ... impeachment? Yes. We have some jokester sitting in Washington with full authority over our military forces. The people can't believe a word he says. Congress can't believe a word he says. He rules by executive order. He ignores the Constitution. There is argument over whether he ordered military strikes to divert attention from his scandal and whether he sold the country out to the Red Chinese. Now people like myself are thinking - totally justified - that this guy will do absolutely anything to hold on to his presidency. I don't feel particularly secure with some guy who I can't trust running the military and with his finger on the nuclear button. That itself is a violation of national security. From nobody at replay.com Sat Sep 19 11:46:10 1998 From: nobody at replay.com (Anonymous) Date: Sun, 20 Sep 1998 02:46:10 +0800 Subject: No Subject Message-ID: <199809200735.JAA15794@replay.com> To my understanding pleading the 5th in response to a court order for your passphrase would work, correct? Or would you be liable under contempt of court? From aba at dcs.ex.ac.uk Sat Sep 19 13:12:34 1998 From: aba at dcs.ex.ac.uk (Adam Back) Date: Sun, 20 Sep 1998 04:12:34 +0800 Subject: CHALLENGE? Toto/signature attack w. unpublished public key In-Reply-To: <199809200502.HAA08667@replay.com> Message-ID: <199809200836.JAA28403@server.eternity.org> Anonymous writes: > > > In addition it has to be that n is the right length based on the "s" > > > padding. This limits it to an 8 bit range, in this case 1024-1031 > > > bits. > > > > The constraint I gave was that log(n) = 1024. Bear in mind that the > > msbyte of s = 0x08, so we know that n > s, and I think we know that n > > < 2^1024 also based on the s padding from the signature. So based on > > this n would be in the range 1020 - 1024 bits, right? > > Actually there is somewhat more flexibility than this. You made up the > padding, it didn't come from the file, did it? I used PGP to make an m to match a 1024 bit n which I presumed from a 1024 bit s; s is from the signature packet from the signed post in question. I made the assumption that for a 1024 bit s, the padded message digest m would be of size 1024 bit also, with it's leading 00 01 FF ... FF etc. > You could add perhaps 1 more byte of FF without stretching > credibility too extremely. Then n could be 1020 - 1032 bits. It's > too bad that s started out so small (assuming the "true" n was 1024 > bits). I see what you are saying: that if n had been even 1032 bits, it would still be possible (though relatively unlikely) to result in a s < 1024, which would mean that the m I presumed could have had been a byte longer. I think your assumption that PGP would not encode the leading 0 byte (in the s) is correct, from past PGP code tinkering. In fact I guess that actually this statement generalises and (with an even smaller probability) the n could have been 1040 bits, and the s just happened to come out < 1024 bits, and so on. I'll see if I can induce this effect by generating a 1025 bit key, and seeing if any of the signatures come out at 1024 bits: n = 0x0181291263B847EBEBFDC65E9128DDE9015522B461618F43CDBBF3D707507BA9 A71B002F4F852EEC1465710B1641C8816D3E0851C41C2A11E89062E424116A69 6E0FB179C7439C6C2F88A214E8D9877658A82982783FA5597262D6CD648111EB A3AB12FC9EB71FB90222624D188E31A3B3333020740860E5F11250D10E2E61F77D e = 0x11 s = 0x5AA544A471AA79074796D0C85BE01DF44BBED7F14C1189D2D114F8A4E9D4D20E 1E67ED9CFA8E20F4D9B84B9C82918F5721D984C7D3A2E2561D399982DFD38873 3665745849F83EA14A2D2D586CCB253515E63CF81E2C3927D991E25FAE673DEC E18DB2F6014850CE97F2910393166577F120C4A9512B122F47E05FB117702D6B So yes, n = 1025 bits, and this particular s is 1023 bits, and this one is 1025 bits: s' = 0x012B4B5218E1173DCEF5525C3E9E72BA962371372DA9E9D8D1B469A3BD1060E1 5F0ABA0E0BD9B497944FA9AE039F7F006591470857E0CB4FCB460485307A4366 54105112BD2E548B6BA9E6B950BC37D39A51ADC169B34935D052DFEEEA9A9FFC BEA4D85BF22D87D66BCB3530EE5316F22A4A4BC4FAB33E592B019E87DE1EAB7336 (most of them work out to be < 1025 bits). > > > If you make n be a product of a bunch of small primes, so that you > > > can make signatures with it, then a third party can detect this and > > > know it is bogus. > > > > He has to factor your n to determine that it is bogus though? This > > would imply that he had more compute than you do. (Not unreasonable > > threat model mind). > > But didn't YOU have to factor n also? That's what you showed, originally, > a large s^e which you factored down to get some small factors and a big > one. If you manage to get a prime factorization you can combine factors > to get your n. But it won't be any harder for him to factor than it was > for you. Yes, you are right. Presented with two public keys (n,e), and (n',e') and a signature s, that even if the attacker manages to factor n but not n' the attacker can't prove that there isn't another public key (n'',e'') which is the real key which signed the message. Ie the reason the attacker is unable to factor (n',e') may be either because it is a multiple of two 512 bit primes, or because it is a mutliple of primes of special form I quoted a post describing in the other post, and he doesn't have enough compute to recover it. With the quoted algorithm from Maurer, the attacker needs more compute to show that the key has a special form than you do to create the key. Adam From attila at hun.org Sat Sep 19 13:14:42 1998 From: attila at hun.org (attila) Date: Sun, 20 Sep 1998 04:14:42 +0800 Subject: Clinton's fake apologies (fwd) In-Reply-To: <3.0.5.32.19980920152605.0086ba30@205.83.192.13> Message-ID: On Sun, 20 Sep 1998, Reeza! wrote: [snip bunch of a good ream applied where required --] > >In case you hadn't noticed, the investigation of him, vis-a-vis the rules >established by other demicans, his supposed compatriates, is still ongoing. > >Methinks this is just the tip of the iceberg, a bone for the populace to >chew on so that when the rest of the story breaks, we (the dog) won't >notice the prime rib and sirloin. > we all know that -- the question is whether or not the Klintons have left enough witnesses alive to prove it! who's next on their hit parade? >I congratulate you for your defense of a person who demonstrably has broken >his marriage vows, his oath of public office, and purjured himself while >under an additional oath in a court of law. > >You, too, are a few neurons short of a functional synapse. > perfect! slap! slap! let's do it again! >I suggest you discuss it with the maker. The best way is large caliber >bullet at sufficient velocity to penetrate and exit the cranial cavity. > cant do this one more than once unless it's Vince Foster. >God speed, you fucking idiot. > yup, praise the Lord, and pass the ammo; we'll even help a few you fellows out [the door]. >Reeza! > gave me a good laugh --thanx, Reeza! ooo-rah! > The world was on fire,,, but no one could save me but you... > Strange what desire ,,will make foolish people do..... > (to the back beat) > This world is only gonna break your heart.... > ==C.I.== > __________________________________________________________________________ go not unto usenet for advice, for the inhabitants thereof will say: yes, and no, and maybe, and I don't know, and fuck-off. _________________________________________________________________ attila__ To be a ruler of men, you need at least 12 inches.... There is no safety this side of the grave. Never was; never will be. From rah at shipwright.com Sat Sep 19 17:14:45 1998 From: rah at shipwright.com (Robert Hettinga) Date: Sun, 20 Sep 1998 08:14:45 +0800 Subject: Questions for Magaziner? // taxing crypto In-Reply-To: <199809200104.VAA13387@swan> Message-ID: At 9:04 PM -0400 on 9/19/98, Ron Rivest wrote: > I feel mis-quoted and/or mis-represented in your note (below) > stating that "Magaziner mirrored Rivest's offer to tax encryption > products to pay for increased law enforcement technology support". Okay. Cool. Sorry if I mischaracterized it somehow, I wasn't trying to. Or was it Diffie who said something like that? By the way, someone told me that the Crypto "Authors at MIT" talk with you and Diffie, etc., was on CSPAN recently, so if someone *really* wanted to, they could go back, see *exactly* what was said, and say here what the idea was, (and who to attribute it to, of course), that prompted me to make the, um, offending, comment, they could do so. Frankly, I was too hyped from telling the FBI guy he didn't matter anymore, not to mention his dirty look that followed :-), to remember it accurately enough for scientific attribution. "The cost of error on a network full of scientists is bandwidth." -- Hettinga's Law of Network Noise Sorry if I mischaracterized what was surely the right thing to say at the time... :-). Cheers, Bob Hettinga ----------------- Robert A. Hettinga Philodox Financial Technology Evangelism 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From ravage at EINSTEIN.ssz.com Sat Sep 19 17:49:04 1998 From: ravage at EINSTEIN.ssz.com (Jim Choate) Date: Sun, 20 Sep 1998 08:49:04 +0800 Subject: Forwarded mail... Message-ID: <199809201416.JAA13430@einstein.ssz.com> Forwarded message: > Date: Sun, 20 Sep 1998 09:35:33 +0200 > From: Anonymous > > To my understanding pleading the 5th in response to a court order for your > passphrase would work, correct? Or would you be liable under contempt of > court? > It should work, though I don't believe it's ever been tested in court. I've been looking at the court forcing one to take immunity and can't find anything that would support such actions. So if you haven't told the court you will cooperate *and* you say nothing more than that you're taking the 5th there shouldn't be much they can do except charge you as an accomplice and hope for a conviction on other material. ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From frissell at panix.com Sat Sep 19 18:18:22 1998 From: frissell at panix.com (Duncan Frissell) Date: Sun, 20 Sep 1998 09:18:22 +0800 Subject: IP: Tougher laws are sought to seize cash In-Reply-To: Message-ID: <199809201420.KAA06590@mail1.panix.com> >It now is illegal to try to leave the country with more >than $10,000 in currency without reporting it to U.S. >Customs officials. Violations are punishable by up to >five years in prison and seizure of the money. But in >June, the U.S. Supreme Court dealt a serious blow >to efforts to seize the unreported cash, ruling in a >precedent-setting case that such seizures often >violate constitutional protections against "excessive >fines." Here's the case: http://laws.findlaw.com/US/000/96-1487.html DCF From announce at dmail1.real-net.net Sat Sep 19 18:20:52 1998 From: announce at dmail1.real-net.net (RealNetworks News) Date: Sun, 20 Sep 1998 09:20:52 +0800 Subject: Important: RealPlayer G2 Beta Expiration Message-ID: <199809201413.HAA09326@dmail3.real-net.net> Dear RealPlayer G2 Beta Customer, As part of our ongoing commitment to improve customer service we want to notify you of some important technical information. In some cases our customers have noticed that their RealPlayer G2 Beta has expired. In order to continue using your RealPlayer G2 Beta, please read and follow the simple instructions below. +===+===+===+===+===+===+===+===+===+===+ If Your RealPlayer G2 Beta Has Expired If you see a message warning you that your RealPlayer has expired, you may correct this problem by visiting RealNetworks Service and Support web site. Just click on the link below and follow the instructions on the page. ---> http://service.real.com/help/expired.html +===+===+===+===+===+===+===+===+===+===+ If Your RealPlayer G2 Beta Has Not Already Expired You may have already received a notification from your RealPlayer G2 Beta indicating that a new update is available. If you installed the update by responding to the notification, your RealPlayer G2 Beta expiration date has been extended and you do not need to take any further action. If you have not installed the update, please do so now by visiting RealNetworks Service and Support web site. Just follow the instructions under the section labeled: "If your G2 RealPlayer Beta has not already expired." ---> http://service.real.com/help/expired.html NOTE: If you have already contacted RealNetworks Support you will not need to take any action. Thank you for supporting RealNetworks products, Maria Cantwell Senior Vice President RealNetworks, Inc. Seattle, WA USA --------------------------------------------- ABOUT THIS E-MAIL Participation in RealNetworks product updates and special offers is voluntary. During the installation of the RealPlayer Plus software you indicated a preference to receive these emails. For information about subscribing to or unsubscribing from future announcements, visit http://www.real.com/mailinglist/index.html From stevem at tightrope.demon.co.uk Sat Sep 19 18:30:45 1998 From: stevem at tightrope.demon.co.uk (Steve Mynott) Date: Sun, 20 Sep 1998 09:30:45 +0800 Subject: uk police and warrents Message-ID: <19980920152951.A29686@tightrope.demon.co.uk> The UK police are pushing for access to people's email _without_ having a warrent. THey also want the ISPs to store everyone's mail for a week.. -- pgp 1024/D9C69DF9 1997/10/14 steve mynott From stevem at tightrope.demon.co.uk Sat Sep 19 18:44:25 1998 From: stevem at tightrope.demon.co.uk (Steve Mynott) Date: Sun, 20 Sep 1998 09:44:25 +0800 Subject: Questions for Magaziner? In-Reply-To: Message-ID: <19980920154227.B29686@tightrope.demon.co.uk> On Sat, Sep 19, 1998 at 02:13:39PM -0700, Tom Weinstein wrote: > > Arnold G. Reinhold wrote: > > > > One question I'd like asked is whether the US Gov will approve 56-bit RC-4 > > for export on the same terms as 56-bit DES. That would allow export > > versions of web browsers to be upgraded painlessly, making international > > e-commerce 64 thousand times more secure than existing 40-bit browsers. > > (56-bit DES browsers would require every merchant to upgrade their SSL > > servers and introduce a lot of unneeded complexity.) > > Actually, it wouldn't be any easier to deploy 56-bit RC4 than DES. Either > would require roughly the same changes to both clients and servers. Not easier technically but "easier" maybe politically. Key length seems to be held (probably wrongly) as a rough measure of crypto "strength" by journos and those in power. 40bit RC4 is weak. How strong would 56bit RC4 be? -- pgp 1024/D9C69DF9 1997/10/14 steve mynott From jya at pipeline.com Sat Sep 19 19:34:40 1998 From: jya at pipeline.com (John Young) Date: Sun, 20 Sep 1998 10:34:40 +0800 Subject: CJ's Teeth Busted Message-ID: <199809201536.LAA12406@camel8.mindspring.com> Forwarded: Relatives report that Jeff Gordon busted CJ's teeth, which is why CJ was picked up, not for his wasted carcass, but for the the cutting edge incisors being hosted and packed around North America like suitcase nukes. The teeth allegedly hold the secrets of why everyone except the FBI wanted CJ. Jeff sent them to a LANL for DNA mouthwash decrypt for whatever CJ did to whoever to social engineer access to Motorola's algorithm's for transmitting DEFCON 1. Which means us .mil Totos got to go to the backup plan for richocheting/encrypting/mixing signals to the sats. Anyone forget where it is, send me a msg with the PK http://calvo.teleco.ulpgc.es/listas/cypherpunks at infonex.com/ Search Heavenly Gate/Cypherpunks/Waco+CJ Parker.. The word on the IC Net (see above URL) is that the teeth are rigged to resist for no more than twenty days under pressure of counterterrorism's bite. Then they bark Semtext: fucking jerks, then go nuclear. Monday is a key tumbler click. More, there's a forwarded report from the alleged CJ that he spit in the eye of the T-man, wrote "Helter Skelter" on the cell mirror with his blood, and then, slow chewing a turd, ostentatiously peeked up the lady magistrate's Victoria Secrets, for which she brazen-hussily ordered him to forthwith gaze up this: MO. Toto at AOL.com From emc at wire.insync.net Sat Sep 19 19:37:42 1998 From: emc at wire.insync.net (Eric Cordian) Date: Sun, 20 Sep 1998 10:37:42 +0800 Subject: Alleged IDEA(tm) Weakness In-Reply-To: <199809200308.NAA12805@avalon.qualcomm.com> Message-ID: <199809201540.KAA25520@wire.insync.net> > I think this is wrong. It claims that the problem > in IDEA comes from the bias of the multiplication > operation... but the multiply in IDEA is over the > integers modulo 65537, with the 0 value > representing 65536, not 0... this is in fact an > unbiased operation. However I have not attempted > to verify the rest of the logic. Correct, multiplication by a non-zero residue modulo 65537 is a permutation of the non-zero residues. The central notion behind IDEA is to use this operation, which can be expressed expeditiously in terms of the unsigned 16x16->32 multiply, as a builtin wide S-Box. This is how IDEA manages to do strong encryption using only a few ordinary arithmetic and logical instructions with no necessity for table lookup. I didn't bother to read the rest of the rant. -- Sponsor the DES Analytic Crack Project http://www.cyberspace.org/~enoch/crakfaq.html From asesor at ragnatela.miller.com.mx Sun Sep 20 10:37:52 1998 From: asesor at ragnatela.miller.com.mx (asesor at ragnatela.miller.com.mx) Date: Sun, 20 Sep 1998 10:37:52 -0700 (PDT) Subject: Comercialice su Negocio por Interne Message-ID: <199809201737.KAA11388@toad.com> /////////////////////////////////////////////////////////////////////////////// Vimos su anuncio en los Clasificados y pensamos que esta informacion puede ser de su interes. Si usted no desea recibir mas mensajes de este tipo, inserte la palabra "remove" en el Subject/Asunto y automaticamente sera borrado de nuestra lista. //////////////////////////////////////////////////////////////////////////////// Publicite su negocio a miles de personas de forma GRATUITA. Visite nuestra pagina y obtenga GRATIS un programa para dise�ar su pagina Web en 10 minutos: http://www.miller.com.mx/biz.html From kriek at bigfoot.com Sat Sep 19 20:26:30 1998 From: kriek at bigfoot.com (Neels Kriek) Date: Sun, 20 Sep 1998 11:26:30 +0800 Subject: "Bioarmageddon" Message-ID: <000201bde4b3$afdb36a0$8a060cd1@alien> Just read "The Cobra Event"by the author of "The Hot Zone" Although mostly fiction it makes for some very scary reading. From qweasd123 at my-dejanews.com Sat Sep 19 20:27:27 1998 From: qweasd123 at my-dejanews.com (qweasd123 at my-dejanews.com) Date: Sun, 20 Sep 1998 11:27:27 +0800 Subject: WARNING: softSENTRY is a SCAM Message-ID: <199809201619.LAA25486@x11.dejanews.com> Windows developers, DO NOT purchase 20/20 Software's outrageously priced ($695) softSENTRY utility. The package IS A SCAM. Before reading the below document I found on the Web, understand that DLL- and component-based copy protection systems are inherently easy to crack. (softSENTRY incorporates a DLL-based protection as one of its options, in addition to direct .exe "protection".) Also understand that utilities such as Shrinker and WWPack are only useful for compression, NOT protection from reverse engineering. EXE-compressors are notorious for being easy to crack. Do you want me to convince you? http://209.44.62.170/pir8/files/ak.html provides cracks for Vbox, SalesAgent, softSENTRY, TimeLock, and many other copy protection schemes. (Yes, the much overbloated Vbox is now WORTHLESS as a copy protection system.) For cracks of just about any EXE-compressor/encryptor you can think of (including WWPack32, Protect!, and Shrinker), visit http://www.nettaxi.com/citizens/caligo/main.htm. Yes, you can also forget about using Shrinker or WWPack to protect your app's code. They are both absolutely WORTHLESS in that respect as well. Cracks for them are now everywhere on the Web. ----------------------- e-mail: LSD-LSD at usa.net ----------------------- Hello out there. I am somewhat of a newbie at cracking (with some knowledge of assembly) but thought I'd try my luck at a commercial protection scheme for one of my first cracks. I will show you how to crack an extremely stupid, ready-made protection scheme, softSENTRY 2.07 from 20/20 Software. Download the trial version (itself extremely easy to crack) from http://www.twenty.com/pgs/dlidx.html. This software allows zombie programmers (who, IMHO, do not deserve to be called programmers if they have fallen for this disgustingly bogus protection) to "automatically" convert their FULL programs to "protected" trial versions. Sounds like a snake oil vendor, right? It is precisely that: bogus commercialism at its very best. (This crappy, $695 piece of junk really is worth only ten bucks. I have encountered far better utilities priced five times less.) Okay, what tools do we need to crack softSENTRY? - Numega's Soft-Ice - a good hex-editor I will not show you how to crack the demo of softSENTRY, because the process is boringly easy to do. (Do it youself! Tip: Delete c:\windows\system\ss.drv and the "magic key" located at HKEY_CLASSES_ROOT\{XXXXXXXXXX} to restore the trial period.) I shall, however, show how to murder its weak protection scheme! (By the way, the fact that softSENTRY's own protection is so weak indicates a lot about the quality of the product itself!!) Prepare a test target by protecting some small program like Notepad in order to disassemble the process and watch how softSENTRY "works". For disassembly, we will utilize SoftIce because W32Dasm89 seemed to crash when I attempted to load the target. The protected file and the original file have different sizes. "Clever", you would have thought, as I did, "Maybe there's some encryption and variable random protection scheme inside the target." Well, you're in for quite a surprise. Now hold your breath; THIS IS THE ENTRY POINT FOR ALL PROTECTED FILES: :004B066F CC int 03 :004B0670 55 push ebp :004B0671 8BEC mov ebp,esp :004B0673 83EC48 sub esp,00000048 :004B0676 53 push ebx :004B0677 56 push esi :004B0678 57 push edi :004B0679 E950000000 jmp 004B06CE ; This is a very strange jump, wouldn't you say? :004B067E 0000 add [eax],al :004B0680 7006 jo 004B0688 All protected files possess the same pattern, with the exact same JMP (coded as E950000000)! This is very fortunate for us; it means that searching any "protected" file for the pattern { 55 8B EC 83 EC 48 53 56 57 E9 50 00 00 00 } will give us the entry point of the program and indicate to us that the program has been "protected" with softSENTRY! (Has your jaw hit the floor yet?) Yes, softSENTRY is very silly. The very insolent JMP 004B06CE points the EIP to the actual protection routine. The routine then jumps depending on the "protection" scheme the programmer specified for use: time limit, splash, etc. Read carefully: 00093C82: 8B4508 mov eax,[ebp][00008] ; 00093C85: 50 push eax ; 00093C86: 68A0324B00 push 004B32A0 ; 00093C8B: FF156C744B00 call [0004B746C] ; 00093C91: E88A000000 call 001279B1 ;THIS CALL LOADS THE RESOURCES OF THE MAIN PROGRAM! 00093C96: E825000000 call 00127956 ;THIS CALL WILL RUN THE MAIN PROGRAM! 00093C9B: 8B45B8 mov eax,[ebp][0FFB8] ; ; 00093C9E: 50 push eax ; 00093C9F: FF15E4734B00 call [0004B73E4] ; (If the protection fails, you will land at 00093C9B.) The two calls at 00093C91 and 00093C96 load the FULL program completely free of all nag, splash, time-limit, etc. functions that have been chosen. If you compare the above source with any other "protected" program, you will see that both calls are ALWAYS coded as: E8 8A 00 00 00 E8 25 00 00 00 1st Call 2nd Call Now we can write a general crack for this amazingly retarded protection scheme. Simply replace the first jump (coded as E950000000) with the code of the two calls, which, again, is always E88A000000 E825000000. 1) Search for: { 55 8B EC 83 EC 48 53 56 57 E9 50 00 00 00 } ^^^^^^^^^^^^^^ (This is the jump.) 2) Replace it with E8A2040000 E83D040000. Note that the two calls have been recalculated accordingly but remain the same. (Track them with your debugger!) So, cracking a softSENTRY-"protected" application is only a matter of switching a few bytes. I certainly wouldn't pay $695 for some silly "protection" that took me only 10 minutes to crack! From qweasd123 at my-dejanews.com Sat Sep 19 20:27:29 1998 From: qweasd123 at my-dejanews.com (qweasd123 at my-dejanews.com) Date: Sun, 20 Sep 1998 11:27:29 +0800 Subject: WARNING: softSENTRY is a SCAM Message-ID: <6u39v4$89r$1@nnrp1.dejanews.com> Windows developers, DO NOT purchase 20/20 Software's outrageously priced ($695) softSENTRY utility. The package IS A SCAM. Before reading the below document I found on the Web, understand that DLL- and component-based copy protection systems are inherently easy to crack. (softSENTRY incorporates a DLL-based protection as one of its options, in addition to direct .exe "protection".) Also understand that utilities such as Shrinker and WWPack are only useful for compression, NOT protection from reverse engineering. EXE-compressors are notorious for being easy to crack. Do you want me to convince you? http://209.44.62.170/pir8/files/ak.html provides cracks for Vbox, SalesAgent, softSENTRY, TimeLock, and many other copy protection schemes. (Yes, the much overbloated Vbox is now WORTHLESS as a copy protection system.) For cracks of just about any EXE-compressor/encryptor you can think of (including WWPack32, Protect!, and Shrinker), visit http://www.nettaxi.com/citizens/caligo/main.htm. Yes, you can also forget about using Shrinker or WWPack to protect your app's code. They are both absolutely WORTHLESS in that respect as well. Cracks for them are now everywhere on the Web. ----------------------- e-mail: LSD-LSD at usa.net ----------------------- Hello out there. I am somewhat of a newbie at cracking (with some knowledge of assembly) but thought I'd try my luck at a commercial protection scheme for one of my first cracks. I will show you how to crack an extremely stupid, ready-made protection scheme, softSENTRY 2.07 from 20/20 Software. Download the trial version (itself extremely easy to crack) from http://www.twenty.com/pgs/dlidx.html. This software allows zombie programmers (who, IMHO, do not deserve to be called programmers if they have fallen for this disgustingly bogus protection) to "automatically" convert their FULL programs to "protected" trial versions. Sounds like a snake oil vendor, right? It is precisely that: bogus commercialism at its very best. (This crappy, $695 piece of junk really is worth only ten bucks. I have encountered far better utilities priced five times less.) Okay, what tools do we need to crack softSENTRY? - Numega's Soft-Ice - a good hex-editor I will not show you how to crack the demo of softSENTRY, because the process is boringly easy to do. (Do it youself! Tip: Delete c:\windows\system\ss.drv and the "magic key" located at HKEY_CLASSES_ROOT\{XXXXXXXXXX} to restore the trial period.) I shall, however, show how to murder its weak protection scheme! (By the way, the fact that softSENTRY's own protection is so weak indicates a lot about the quality of the product itself!!) Prepare a test target by protecting some small program like Notepad in order to disassemble the process and watch how softSENTRY "works". For disassembly, we will utilize SoftIce because W32Dasm89 seemed to crash when I attempted to load the target. The protected file and the original file have different sizes. "Clever", you would have thought, as I did, "Maybe there's some encryption and variable random protection scheme inside the target." Well, you're in for quite a surprise. Now hold your breath; THIS IS THE ENTRY POINT FOR ALL PROTECTED FILES: :004B066F CC int 03 :004B0670 55 push ebp :004B0671 8BEC mov ebp,esp :004B0673 83EC48 sub esp,00000048 :004B0676 53 push ebx :004B0677 56 push esi :004B0678 57 push edi :004B0679 E950000000 jmp 004B06CE ; This is a very strange jump, wouldn't you say? :004B067E 0000 add [eax],al :004B0680 7006 jo 004B0688 All protected files possess the same pattern, with the exact same JMP (coded as E950000000)! This is very fortunate for us; it means that searching any "protected" file for the pattern { 55 8B EC 83 EC 48 53 56 57 E9 50 00 00 00 } will give us the entry point of the program and indicate to us that the program has been "protected" with softSENTRY! (Has your jaw hit the floor yet?) Yes, softSENTRY is very silly. The very insolent JMP 004B06CE points the EIP to the actual protection routine. The routine then jumps depending on the "protection" scheme the programmer specified for use: time limit, splash, etc. Read carefully: 00093C82: 8B4508 mov eax,[ebp][00008] ; 00093C85: 50 push eax ; 00093C86: 68A0324B00 push 004B32A0 ; 00093C8B: FF156C744B00 call [0004B746C] ; 00093C91: E88A000000 call 001279B1 ;THIS CALL LOADS THE RESOURCES OF THE MAIN PROGRAM! 00093C96: E825000000 call 00127956 ;THIS CALL WILL RUN THE MAIN PROGRAM! 00093C9B: 8B45B8 mov eax,[ebp][0FFB8] ; ; 00093C9E: 50 push eax ; 00093C9F: FF15E4734B00 call [0004B73E4] ; (If the protection fails, you will land at 00093C9B.) The two calls at 00093C91 and 00093C96 load the FULL program completely free of all nag, splash, time-limit, etc. functions that have been chosen. If you compare the above source with any other "protected" program, you will see that both calls are ALWAYS coded as: E8 8A 00 00 00 E8 25 00 00 00 1st Call 2nd Call Now we can write a general crack for this amazingly retarded protection scheme. Simply replace the first jump (coded as E950000000) with the code of the two calls, which, again, is always E88A000000 E825000000. 1) Search for: { 55 8B EC 83 EC 48 53 56 57 E9 50 00 00 00 } ^^^^^^^^^^^^^^ (This is the jump.) 2) Replace it with E8A2040000 E83D040000. Note that the two calls have been recalculated accordingly but remain the same. (Track them with your debugger!) So, cracking a softSENTRY-"protected" application is only a matter of switching a few bytes. I certainly wouldn't pay $695 for some silly "protection" that took me only 10 minutes to crack! -----== Posted via Deja News, The Leader in Internet Discussion ==----- http://www.dejanews.com/rg_mkgrp.xp Create Your Own Free Member Forum From shamrock at cypherpunks.to Sat Sep 19 20:43:59 1998 From: shamrock at cypherpunks.to (Lucky Green) Date: Sun, 20 Sep 1998 11:43:59 +0800 Subject: ArcotSign (was Re: Does security depend on hardware?) In-Reply-To: <199809192038.QAA29964@denmark-vesey.MIT.EDU> Message-ID: On Sat, 19 Sep 1998, Ryan Lackey wrote: > > [from a discussion of tamper-resistant hardware for payment systems > on dbs at philodox.com, a mailing list dedicated to digital bearer systems, > where Scott Loftesness, of DigiCash and Arcot Systems, mentioned ArcotSign.] > > You mentioned the URL for Arcot, and I looked at the site. It seems > rather lacking in technical details, and makes a very strong claim -- > that it can provide tamper resistance in software on a hardware/OS/etc. > platform which is generally hostile (a general purpose computer). >From the technical description of Arcot's WebFort technology at http://www.arcot.com/WebFort1.htm, the product sets up an encrypted and authenticated channel between the client and the server. You could use standard SSL with client certs to achieve the same result. What concerns me are the other outrageous claims made on the site: o Conventional software solutions offering public key authentication, such as those from Microsoft, Netscape, and Entrust are no stronger than username/password mechanisms. [False. UID/PW's are subject to guessing. Client certs are not]. o ArcotCard is a tamper resistant software only private key storage system. [Anybody using the words "tamper resitant" to describe a software based solution is incompetent at best]. o ArcotSignTM technology is a breakthrough that offers smart card tamper resistance in software. Arcot is unique in this regard, and WebFort is the only software-only web access control solution on the market that offers smart card security, with software convenience and cost. [We have now entered deep snake oil territory. Claims that software affords tamper resistance comparable to hardware tokens are either based in dishonesty or levels of incompetence in league with "just as secure pseudo-ontime pads"]. In summary, based on the technical information provided by Arcot System, the product is a software based authentication system using software based client certificates. -- Lucky Green PGP v5 encrypted email preferred. From stuffed at stuffed.net Sun Sep 20 13:07:25 1998 From: stuffed at stuffed.net (STUFFED NEWS DAILY) Date: Sun, 20 Sep 1998 13:07:25 -0700 (PDT) Subject: WHAT'S THE BETTING ON CLINTON?/NO NIBBLES FOR MONICA! Message-ID: <19980920071000.7708.qmail@eureka.abc-web.com> IN TODAY'S ISSUE: 30 NEW EXTRA HOT JPEGS! 5 NEW SIZZLING STORIES DEALING WITH JEALOUSY MAGIC MISTRESS MATTRESS THE BEST OF EUREKA! DO I LOOK FAT IN THIS? BANGCOCK DISCK CHOP SEX SELLS!!! NO NIBBLES FOR MONICA FROM NUDISM TO BUDDHISM WHAT'S THE BETTING ON CLINTON? MUCH MORE! ----> http://stuffed.net/98/9/20/ <---- Welcome to today's issue of Stuffed. To read it you should click on the URL above. If it is not made clickable by your email program you will need to use your mouse to highlight the URL, copy it and then paste it into your browser (then press Return). This email is never sent unsolicited. Stuffed is the supplement for the Eureka newsletter you subscribed to. Full instructions on unsubscribing are in every issue of Eureka! ----> http://stuffed.net/98/9/20/ <---- From reinhold at world.std.com Sat Sep 19 23:15:03 1998 From: reinhold at world.std.com (Arnold G. Reinhold) Date: Sun, 20 Sep 1998 14:15:03 +0800 Subject: Questions for Magaziner? Message-ID: >> Arnold G. Reinhold wrote: >> >> One question I'd like asked is whether the US Gov will approve 56-bit RC-4 >> for export on the same terms as 56-bit DES. That would allow export >> versions of web browsers to be upgraded painlessly, making international >> e-commerce 64 thousand times more secure than existing 40-bit browsers. >> (56-bit DES browsers would require every merchant to upgrade their SSL >> servers and introduce a lot of unneeded complexity.) > >Actually, it wouldn't be any easier to deploy 56-bit RC4 than DES. Either >would require roughly the same changes to both clients and servers. > I was under the impression that 40-bit RC4 was accomplished by revealing 88 bits of the 128-bit key in a header. If a new 56-bit-RC4 browser was implimented by setting16 of those 88 bits to zero, would any existing server know the difference? If not, you would get an immediate improvement in security, at least for browser to server messages, without waiting for the servers to be upgraded. No doubt I am missing something, but what? Arnold From whgiii at invweb.net Sat Sep 19 23:20:43 1998 From: whgiii at invweb.net (William H. Geiger III) Date: Sun, 20 Sep 1998 14:20:43 +0800 Subject: uk police and warrents In-Reply-To: <19980920152951.A29686@tightrope.demon.co.uk> Message-ID: <199809201922.PAA09395@domains.invweb.net> -----BEGIN PGP SIGNED MESSAGE----- In <19980920152951.A29686 at tightrope.demon.co.uk>, on 09/20/98 at 03:29 PM, Steve Mynott said: >The UK police are pushing for access to people's email _without_ having a >warrent. >THey also want the ISPs to store everyone's mail for a week.. Encrypt everything and let them keep it as long as they want. :) - -- - --------------------------------------------------------------- William H. Geiger III http://www.openpgp.net Geiger Consulting Cooking With Warp 4.0 Author of E-Secure - PGP Front End for MR/2 Ice PGP & MR/2 the only way for secure e-mail. OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html - --------------------------------------------------------------- Tag-O-Matic: OS/2: Your brain. Windows: Your brain on drugs. -----BEGIN PGP SIGNATURE----- Version: 2.6.3a-sha1 Charset: cp850 Comment: Registered_User_E-Secure_v1.1b1_ES000000 iQCVAwUBNgVX3I9Co1n+aLhhAQH1UwQArvMflQ5BzBFFMWi4s/7u4NCf0v1dl6Id SBvbGf3kZA4E1MAZ7Ry/UQucrVBuLmvU2VQBQyj8D2sILPzRUYySVUY8lzi7M8CB kwY2Df5RFqa9m55aSvfAfaDCugzbZY5Rc2ImLfBVSAS1GDLpUUyhna5Oo3FtU482 pMYsvUAxtCY= =QPHH -----END PGP SIGNATURE----- From hallam at ai.mit.edu Sat Sep 19 23:35:42 1998 From: hallam at ai.mit.edu (Phillip Hallam-Baker) Date: Sun, 20 Sep 1998 14:35:42 +0800 Subject: Questions for Magaziner? In-Reply-To: Message-ID: <000101bde4ce$31382180$bf011712@games> > I was under the impression that 40-bit RC4 was accomplished by > revealing 88 > bits of the 128-bit key in a header. If a new 56-bit-RC4 browser was > implimented by setting16 of those 88 bits to zero, would any existing > server know the difference? If not, you would get an immediate improvement > in security, at least for browser to server messages, without waiting for > the servers to be upgraded. > > No doubt I am missing something, but what? No, that won't work. One side is set to check that the bits it decrypts match the ones sent in the clear. If they don't match it rejects them. There is a problem with the deployed browser base either way :-(. There is no real difficulty in reducing the number of bits exposed from 88 to 72 however. Certainly 56bit RC4 would be preferrable to 56bit DES for most people at this point since it is unlikely that the EFF will invest another $250K in proving the same point again for RC4 while the plans for a DES cracker are now published in a book. If the government won't allow security, we are back at the stage of setting up the best obstacles we are allowed rather than establishing barriers. There is very good reason to deny the FBI wiretap powers. The FBI is now back into the type of political investigations it did under Hoover. It is investigating the question of who gave Salon magazine information that discredits Mr Hyde despite the fact that there is no evidence it came from the alledged source and even if there was discrediting a Congressman is not illegal. Phill From whgiii at invweb.net Sun Sep 20 00:15:58 1998 From: whgiii at invweb.net (William H. Geiger III) Date: Sun, 20 Sep 1998 15:15:58 +0800 Subject: Questions for Magaziner? In-Reply-To: <36041E82.F4F072ED@netscape.com> Message-ID: <199809202012.QAA10139@domains.invweb.net> -----BEGIN PGP SIGNED MESSAGE----- In <36041E82.F4F072ED at netscape.com>, on 09/19/98 at 04:13 PM, Tom Weinstein said: >> Arnold G. Reinhold wrote: >> >> One question I'd like asked is whether the US Gov will approve 56-bit RC-4 >> for export on the same terms as 56-bit DES. That would allow export >> versions of web browsers to be upgraded painlessly, making international >> e-commerce 64 thousand times more secure than existing 40-bit browsers. >> (56-bit DES browsers would require every merchant to upgrade their SSL >> servers and introduce a lot of unneeded complexity.) >Actually, it wouldn't be any easier to deploy 56-bit RC4 than DES. >Either would require roughly the same changes to both clients and >servers. I'm sorry but I must be missing something here ... Why not just use products that have strong crypto without GAK? What is the point of using this weak junk when one does not have to?? - -- http://www.pgpi.com -- Strong secure e-mail encryption http://www.opera.com -- Opera web browser with strong crypto & no back doors http://www.apache.org -- Most popular Http server on the Internet http://www.ssleay.org -- Free strong SSL library that can be used with the Apache server. Then we have the usauly suspects: http://www.jya.com/nscp-foia.htm -- Netscape's GAK plans. http://www.kra.org -- KRAP gang. - -- - --------------------------------------------------------------- William H. Geiger III http://www.openpgp.net Geiger Consulting Cooking With Warp 4.0 Author of E-Secure - PGP Front End for MR/2 Ice PGP & MR/2 the only way for secure e-mail. OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html - --------------------------------------------------------------- Tag-O-Matic: Bugs come in through open Windows. -----BEGIN PGP SIGNATURE----- Version: 2.6.3a-sha1 Charset: cp850 Comment: Registered_User_E-Secure_v1.1b1_ES000000 iQCVAwUBNgVjmo9Co1n+aLhhAQH3NwQAoKla/hjuDRnaUaQ6AgvmI1XRk9rEFQzs 1hFEX5gTqhi/3V/iMRlP4WfJKT6tfQMLae7vL8wNtKzXwqElWZHXxONb8wIoITfH sQlsE0bnKLAjyYtNc0v1MwSO/oKf1j7Npy8wOZowAxb0lcQNRsQJmOy3h620LLHO Q0mxf/hhmGs= =y4X/ -----END PGP SIGNATURE----- From declan at well.com Sun Sep 20 00:19:50 1998 From: declan at well.com (Declan McCullagh) Date: Sun, 20 Sep 1998 15:19:50 +0800 Subject: CJ Update In-Reply-To: <199809200148.VAA28141@camel7.mindspring.com> Message-ID: I've received two messages from Carl Johnson in letter form. He seems in, um, good spirits. He also mentions a BabyTruthMongerel at one point. He asks that his messages be passed on to cypherpunks, and I have no objection, after I'm done writing the fourth part of the article. We could presumably scan them in and put them up on pathfinder.com. -Declan On Sat, 19 Sep 1998, John Young wrote: > >From Alia Johnson , CJ's sister, today: > > I'm writing to say that CJ has arrived at the Springfield Medical > Referral Center, where he will be held for a month or more (the > phone says U.S. Medical Center for Federal Prisoners) for > "examination". > > Here is the address: > > Carl E. Johnson > Register # 05987-196 > U.S. Medical Center for Federal Prisoners > P.O. Box 4000 > Springfield, Missouri 65801 > > Also, to my delight, I received a letter from him today. He sounds okay. > > CJ in his letter asks for physical mailing addresses for some of the > cypherpunks (no one specifically) so that he can send you things to > post since I will be travelling. > > [End Alia] > > --------- > > We'll be happy to digitize and/or post any mail from CJ folks want to > share, anonymous and/or encrypted always welcome: > > Fax: 212-799-4003 > Vox: 212-873-8700 > > Snail: > > John Young > 251 West 89th Steet, Suite 6E > New York, NY 10024 > > We've put all our PGP keys at: > > http://jya.com/jya-keys.txt > > And a bunch of keys for the wild bunch of Totos: > > http://jya.com/totos-keys.htm > > > > > > From pjm at spe.com Sun Sep 20 01:06:35 1998 From: pjm at spe.com (pjm at spe.com) Date: Sun, 20 Sep 1998 16:06:35 +0800 Subject: atheism (was: RE: Democracy... (fwd)) (fwd) In-Reply-To: <199809191325.IAA08217@einstein.ssz.com> Message-ID: <8888-Sun20Sep1998201338+0200-pjm@spe.com> Jim Choate writes: > Patrick May writes: > > Not all philosophies are religions. > > If we are talking philosophies of the range to include 'natural philosophy' > (ie physics) then you are correct. Fortunately, this attempt at shifting the > topic of discussion away from personal or individual philosophies relating > to the relationship between individuals, God, and the cosmos won't work. Excuse my shorthand: Not all "personal" philosophies are religions. [ . . . ] > > Asserting so is an attempt > > to make one or both of the terms meaningless. > > And trying to change the subject of discourse is as well. A philosophy is a > set of beliefs, period. In this particular case we are discussing personal > or individual philosophies and from definition and practice they are > identical. Religion after all is nothing more than a set of beliefs and > therefore falls under 'personal philosophy'. Personal philosophies are a superset of personal religious beliefs. Personal philosophies that include the concept of a god are clearly religious in nature. Personal philosophies that include the concept of "faith" are probably religious in nature. Personal philosophies that include the concepts of empirical evidence, sceptical inquiry, and willingness to reject previously held positions due to new evidence or argument are probably not religious in nature. The reason I challenged your assertion is that religious people often use such statements as a basis for further arguments that end up equivocating based on the term religion. They first broaden the definition, by fiat, to be almost meaningless and then later use a much narrower definition to support their ultimate point. I'm not suggesting that you were going to do this; I am simply pointing out why it is something of a sore point. [ . . . ] > > There are two forms of atheism (visit alt.atheism.moderated for > > an unending discussion). "Strong" atheists state that they "believe > > that god does not exist." "Weak" atheists state that they "do not > > believe that god exists." > > Changing the side on which the 'do not' resides doesn't change the meaning. > These two sentences are identical in content and meaning. No, they are not. The distinction is crucial to the main point I evidently failed to make in my previous message: Atheism is not a set of beliefs that constitutes a personal philosophy. There are Buddhist atheists, Universalist-Unitarian atheists, objectivist atheists, Wiccan atheists, etc. Atheism isn't even a belief, it is merely the statement of a lack of one particular belief. Getting back to the strong v. weak distinction, the weak atheist position that one "does not believe god(s) exist" does not constitute a belief, a set of beliefs, or a personal philosophy, let alone a religion. The strong atheist position that one "believes god(s) do not exist" is actually making a knowledge claim and so does constitute a belief. Recognizing that someone holds the strong atheist position may give some clues to their other beliefs and the remainder of their personal philosophy, but, again, that position alone does not constitute a personal philosophy or religion. [ . . . ] > > Without reason and logic, how do you propose to prove these > > assertions? > > I'm not trying to prove anything, you are. I'm just blowing holes in your > reasoning. I'm not trying to prove anything either. I'm simply pointing out some issues regarding atheism that are too often ignored or confused. [ . . . ] > > All faith-based assertions are by definition irrational. Mystics > > frequently speak of transcendence as if the word denotes a concept > > with a particular meaning, but never provide a coherent definition. > > Perhaps you'll surprise me? > > Transcendence is the belief that there is something more than the earthly > veil. In other words, if you practice a transcendantal religion then by > definition you believe in a ghost-in-the-machine of one form or another. > > If you like you can think of it as one set of religions believes there is > purpose and reason in existance whereas others believe that it is all random > dice (and yes that is a broad brush I'm painting with). Now this part of the discussion I entered to satisfy my own curiosity. Since it is so far off-topic for this list I'd be glad to take it to personal email if you wish. When you say "more than the earthly veil" do you mean that there exist phenomena that cannot, even in principle, be detected by our five senses or by any physical mechanism we can create? If so, how do you know and why would it matter? Regards, pjm From ravage at EINSTEIN.ssz.com Sun Sep 20 01:35:05 1998 From: ravage at EINSTEIN.ssz.com (Jim Choate) Date: Sun, 20 Sep 1998 16:35:05 +0800 Subject: atheism (was: RE: Democracy... (fwd)) (fwd) Message-ID: <199809202202.RAA14798@einstein.ssz.com> Forwarded message: > From: pjm at spe.com > Date: Sun, 20 Sep 1998 20:13:38 +0200 > Subject: atheism (was: RE: Democracy... (fwd)) (fwd) > Personal philosophies are a superset of personal religious > beliefs. Personal philosophies that include the concept of a god are > clearly religious in nature. Personal philosophies that include the > concept of "faith" are probably religious in nature. Personal > philosophies that include the concepts of empirical evidence, > sceptical inquiry, and willingness to reject previously held positions > due to new evidence or argument are probably not religious in nature. Here is the catch in your distinction, the belief in those empirical positions is fundamentaly based on faith. Critical to those beliefs are at least two (any scientist worth anything could list many more) assumptions that can *only* be taken on faith: The universe and its operation is isotropic and homogenious So clearly a belief in science as a method to describe the relations between individuals and nature (at whatever scale) is fundamentaly based on faith. As to your assertion that such a belief system is not a religion, please take the time to review pantheism. It is clearly a religion in that it addresses the relationship of the individual, society, nature, and God. It does so by abandoning transcendence. You really should read some of Spinoza's work as well as William James'. Everything a person believes, for or against, is fundamentaly based on unprovable axiomatic assumptions whose (in)correctness is based on faith and by extension a belief in the correctness of the holder and the implied fallibility of all other individuals who hold beliefs to the contrary. In a very real sense religion is the epitomy of hubris. > The reason I challenged your assertion is that religious people > often use such statements as a basis for further arguments that end up > equivocating based on the term religion. They first broaden the > definition, by fiat, to be almost meaningless and then later use a > much narrower definition to support their ultimate point. I'm not > suggesting that you were going to do this; I am simply pointing out > why it is something of a sore point. This entire paragraph makes no sense. > No, they are not. The distinction is crucial to the main point I > evidently failed to make in my previous message: Atheism is not a set > of beliefs that constitutes a personal philosophy. There are Buddhist > atheists, Universalist-Unitarian atheists, objectivist atheists, > Wiccan atheists, etc. Atheism isn't even a belief, it is merely the > statement of a lack of one particular belief. No, atheism is the statement that "God could exist, but doesn't". Whether one chooses to hang 'Bhuddism' or 'Wiccan' on is irrelevant. We aren't discussion labels but rather characteristics. Fundamentaly *ALL* atheism states: While it could happen that way, I don't believe it does. Which is identical in meaning to: While it could happen that way, I believe it doesn't. > Getting back to the strong v. weak distinction, the weak atheist > position that one "does not believe god(s) exist" does not constitute > a belief, a set of beliefs, or a personal philosophy, let alone a > religion. The strong atheist position that one "believes god(s) do > not exist" is actually making a knowledge claim and so does constitute > a belief. Try to sell that spin-doctor bullshit to somebody else, and read a book on basic logic. > I'm not trying to prove anything either. I'm simply pointing out > some issues regarding atheism that are too often ignored or confused. Hence you are trying to prove that atheism is confused or ignored and as a result is misundestood. I've got news for you, it isn't either. If anyone is confused (and about to be ignored) it's yourself. > Now this part of the discussion I entered to satisfy my own > curiosity. Since it is so far off-topic for this list I'd be glad to > take it to personal email if you wish. Thanks but I don't generaly exchange private mail with strangers. > When you say "more than the > earthly veil" do you mean that there exist phenomena that cannot, even > in principle, be detected by our five senses or by any physical > mechanism we can create? If so, how do you know and why would it > matter? You didn't understand a single word in that explanation of transcendance. There are many(!) phenomena that occur in nature that are not transcendental that we can't in principle or practice experience with our five senses. Take your Machian view of reality somewhere else. As to knowing if something matters or not, that is the fundamental issue involved in the question: Does God exist? We're back to where we started. Signing off. ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From rah at shipwright.com Sun Sep 20 01:36:44 1998 From: rah at shipwright.com (Robert Hettinga) Date: Sun, 20 Sep 1998 16:36:44 +0800 Subject: It's Sunday and there's a hurricane coming... Message-ID: --- begin forwarded text Date: Sun, 20 Sep 1998 15:13:53 -0400 (AST) From: Ian Grigg To: dbs at philodox.com, e$@vmeng.com Subject: It's Sunday and there's a hurricane coming... Reply-To: iang at systemics.com Sender: Precedence: Bulk List-Subscribe: X-Web-Archive: http://www.philodox.com/dbs-archive/ It's Sunday and there's a hurricane coming. We're prepared with the Pringles and Jamaican ginger beer, and are now just watching the action on screen and out the window. One of the things about living in the Financial Cryptography Capital of the World is that occasionally we get visited by The Powers That Be, and flattened in the process. More nuisance than a TLA hate campaign, noisier than professors' mailing list, and more water than a broken pipe in a Cyber. Hurricane Georges is coming to town. The funny thing is that all along, or at least for many years, we have known how to control hurricanes. It was inevitably one of those cold war US defence contracts, run by the USAF. There was some justification based on annoying naval flotillas at sea, although it wasn't clear whether the fly-boys were intending to annoy the USN or the Ruskies. They kept the whole thing quiet, as nobody needs to know that huge amounts of money can be saved and/or advancing armardas can be sunk without using the other expensive toys developed by the other programs. Trials did occur, but the technology failed to make it into the commercial market. In order to hide the true potential, the brass hats put a strict 56-miles limit on the application for civilian purposes, thus revealing that you could only move the beast around, you couldn't really tame it. The real problem with the technology was that hurricanes still wanted to go in roughly the same direction, and all one could do was to pay the fee to the Air Force to get it moved 56 miles up or down the coast. Needless to say, the Generals were surprised to receive competing bids for services in the first live civilian hurricane. After a lot of confusion and multiple contradictory bids being accepted, the hurricane entered, destroyed, and left. As did the Generals, with the loot. This misuse of what were now public funds was considered sufficient to slap the exec order on the whole deal, conveniently making illegal any class action suits over the misused private funds. Working on this problem for some time has led to a solution. Using an anonymous cash protocol, we have built an Internet-based solution for setting the market-driven price for a hurricane path. Conveniently, we have also contracted delivery services from the specialists, those very same Generals, who are now living in the islands near here under assumed names and ranks. Up until now, the whole idea was received with less than religous fervour. Either nobody believed we could do it, or the locals were simply playing on island time. Just as we were about to give it up and retire to banana growing, Georges showed up and contracts started winding in. Market operators have a duty to track activity and ensure that no insider trading occurs (those pesky Generals). This responsibility has expanded into advice for traders of attractive opportunities for investment, either in the future positions market or in our line of lamps, air-dropped generators, and emergency supplies of Pringles. We've also been able to track geographical trends for governmental statistical purposes. Georges was nominally slated to cross the islands at Guadeloupe, but heavy market pressure backed by church collections on thursday night purchased a shift north in track. Getting in early was profitable for the Guadeloupians. St Martins then bought heavily and shifted it back on a close to due east track. Unfortunately the French fluffed it last night by downgrading their alert to a warning, so all the world knows now. Antigua, being stuck in the middle, then bought in, backed up by Monsterrat (who raised funds by threatening the Brits with another thousand refugees). Since then Georges has been yoyoing across the map and the market has gone to hell in a hand basket. The Generals had been raking in the delivery contracts, but have posted an aircraft maintainance alert and tripled the premium. Antiguan alternate government types, engaged in a power play with their legal counterparts, have traded a mammoth contract to have the hurricane move _towards_ them. Unhappy at the Generals' reluctance to fly, they've issued an options contract of another kind on the market operators, that will be 'in the money' if their other contract is not fulfilled. Meanwhile, a catholic mama in the US virgin islands had a little flutter on the market to help her more easterly daughter. Failing to spot mama's anonymous currency transaction form, the IRS have declared the area in general and hurricanes in particular to be a major money laundering effort, and have a SWOT team flying in. At least, the men in black will fly in once they complete negotiations with the Generals, who previously contracted all airports for the hurricane season, and are prepared to deal in exchange for an amnesty for previous picadillos. The market still goes strong, having at this stage traded 10% of the GDP of the East Caribbean. We're prepared for the long run, with defense in depth by redundant UPS and generators, multiple IP and interlocking 50 cal machine guns. If only we could stop our shareholders from killing each other, we could advance our plans to open trading in Florida. Phew. This Jamaican ginger beer is strong stuff, and we're already out of Pringles. Oh, and there's a hurricane coming. El Generalissimo. --- end forwarded text ----------------- Robert A. Hettinga Philodox Financial Technology Evangelism 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From rah at shipwright.com Sun Sep 20 01:44:16 1998 From: rah at shipwright.com (Robert Hettinga) Date: Sun, 20 Sep 1998 16:44:16 +0800 Subject: GILC Campaign to remove crypto restrictions from Wassenaar Arrangement Message-ID: --- begin forwarded text Mime-Version: 1.0 X-Priority: 3 (Normal) X-Msmail-Priority: Normal X-Mimeole: Produced By Microsoft MimeOLE V4.72.2106.4 Importance: Normal Date: Fri, 18 Sep 1998 04:41:24 -0500 Reply-To: Digital Signature discussion Sender: Digital Signature discussion From: Richard Hornbeck Subject: GILC Campaign to remove crypto restrictions from Wassenaar Arrangement To: DIGSIG at LISTSERV.TEMPLE.EDU The following excerpt from the Global Internet Liberty Campaign (GILC) Web page http://www.efa.org.au/wassenaar/support/ briefly describes its recent issuance of a statement calling for the removal of cryptography export restrictions from the Wassenaar Arrangement. Further background information on this international Arrangement, and on the considerable international support for this statement can be found at Electronic Frontiers Australia (EFA)'s Web Site. Dr. Michael Baker of EFA is the primary author and original sponsor for the GILC statement. Further information is also available at the Wassenaar organization's Web site, http://www.wassenaar.org/ In principle, Wassenaar is the international version of those regulations that currently place restrictions on exporting strong crypto outside the U.S. All of the 33 member countries agree to abide by a set of standards for exporting encryption products from their countries, for the benefit or preventing terrorism, making international law enforcement's job easier, etc. Individuals subscribing to this list may wish to review this material, and add their organization or association's support to this important campaign. It is timed to coincide with the current round of Wassenaar talks in Vienna that begin this month, and continue through November. Richard Hornbeck ============================================================== The major impediment to the wide spread adoption of cryptography, to protect vital infrastructures from attack and electronic commerce from fraud, has been controls on the export of cryptography. The only international agreement on the export of cryptography is the Wassenaar Arrangement, which wrongly classes encryption as a dual-use technology (one that could be used for offensive purposes). On 15th September 1998 Members of the Global Internet Liberty Campaign issued a statement calling for the removal of cryptography export restrictions from the Wassenaar Arrangement. Since then companies and associations have been expressing their support for the statement. If your company or association wishes to "sign" the following support statement: "We, the undersigned companies and associations support the Global Internet Liberty Campaign Member Statement of 15th September 1998 calling for the removal of cryptography export restrictions from the Wassenaar Arrangement." please write to giving your company or association name, web address and country. --- end forwarded text ----------------- Robert A. Hettinga Philodox Financial Technology Evangelism 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From attila at hun.org Sun Sep 20 02:57:02 1998 From: attila at hun.org (attila) Date: Sun, 20 Sep 1998 17:57:02 +0800 Subject: It's Sunday and there's a hurricane coming... In-Reply-To: Message-ID: careful, Bob --they'll be saying this reeks of another philosophical argument which has two CPers MIA. Big Brother is watching the list --or at least the IRS-CID is. attila out... P.S. BTW, IMNSOHO, good fiction and worth the read! On Sun, 20 Sep 1998, Robert Hettinga wrote: > >--- begin forwarded text > > >Date: Sun, 20 Sep 1998 15:13:53 -0400 (AST) >From: Ian Grigg >To: dbs at philodox.com, e$@vmeng.com >Subject: It's Sunday and there's a hurricane coming... >Reply-To: iang at systemics.com >Sender: >Precedence: Bulk >List-Subscribe: >X-Web-Archive: http://www.philodox.com/dbs-archive/ > >It's Sunday and there's a hurricane coming. We're prepared >with the Pringles and Jamaican ginger beer, and are now just >watching the action on screen and out the window. > >One of the things about living in the Financial Cryptography >Capital of the World is that occasionally we get visited by >The Powers That Be, and flattened in the process. > >More nuisance than a TLA hate campaign, noisier than >professors' mailing list, and more water than a broken >pipe in a Cyber. Hurricane Georges is coming to town. > >The funny thing is that all along, or at least for many >years, we have known how to control hurricanes. It was >inevitably one of those cold war US defence contracts, run >by the USAF. There was some justification based on annoying >naval flotillas at sea, although it wasn't clear whether the >fly-boys were intending to annoy the USN or the Ruskies. >They kept the whole thing quiet, as nobody needs to know that >huge amounts of money can be saved and/or advancing armardas >can be sunk without using the other expensive toys developed >by the other programs. > >Trials did occur, but the technology failed to make it into >the commercial market. In order to hide the true potential, >the brass hats put a strict 56-miles limit on the application >for civilian purposes, thus revealing that you could only move >the beast around, you couldn't really tame it. > >The real problem with the technology was that hurricanes still >wanted to go in roughly the same direction, and all one could >do was to pay the fee to the Air Force to get it moved 56 miles >up or down the coast. Needless to say, the Generals were >surprised to receive competing bids for services in the first >live civilian hurricane. > >After a lot of confusion and multiple contradictory bids being >accepted, the hurricane entered, destroyed, and left. As did >the Generals, with the loot. This misuse of what were now public >funds was considered sufficient to slap the exec order on the >whole deal, conveniently making illegal any class action suits >over the misused private funds. > >Working on this problem for some time has led to a solution. >Using an anonymous cash protocol, we have built an Internet-based >solution for setting the market-driven price for a hurricane path. >Conveniently, we have also contracted delivery services from the >specialists, those very same Generals, who are now living in the >islands near here under assumed names and ranks. > >Up until now, the whole idea was received with less than religous >fervour. Either nobody believed we could do it, or the locals >were simply playing on island time. Just as we were about to give >it up and retire to banana growing, Georges showed up and contracts >started winding in. > >Market operators have a duty to track activity and ensure >that no insider trading occurs (those pesky Generals). This >responsibility has expanded into advice for traders of attractive >opportunities for investment, either in the future positions >market or in our line of lamps, air-dropped generators, and >emergency supplies of Pringles. > >We've also been able to track geographical trends for governmental >statistical purposes. Georges was nominally slated to cross the >islands at Guadeloupe, but heavy market pressure backed by church >collections on thursday night purchased a shift north in track. >Getting in early was profitable for the Guadeloupians. > >St Martins then bought heavily and shifted it back on a close >to due east track. Unfortunately the French fluffed it last night >by downgrading their alert to a warning, so all the world knows now. > >Antigua, being stuck in the middle, then bought in, backed up by >Monsterrat (who raised funds by threatening the Brits with another >thousand refugees). Since then Georges has been yoyoing across the >map and the market has gone to hell in a hand basket. > >The Generals had been raking in the delivery contracts, but have >posted an aircraft maintainance alert and tripled the premium. > >Antiguan alternate government types, engaged in a power play >with their legal counterparts, have traded a mammoth contract to >have the hurricane move _towards_ them. Unhappy at the Generals' >reluctance to fly, they've issued an options contract of another >kind on the market operators, that will be 'in the money' if their >other contract is not fulfilled. > >Meanwhile, a catholic mama in the US virgin islands had a little >flutter on the market to help her more easterly daughter. > >Failing to spot mama's anonymous currency transaction form, the IRS have >declared the area in general and hurricanes in particular to be a major >money laundering effort, and have a SWOT team flying in. At least, the >men in black will fly in once they complete negotiations with the Generals, >who previously contracted all airports for the hurricane season, and >are prepared to deal in exchange for an amnesty for previous picadillos. > >The market still goes strong, having at this stage traded 10% of >the GDP of the East Caribbean. We're prepared for the long run, >with defense in depth by redundant UPS and generators, multiple IP >and interlocking 50 cal machine guns. If only we could stop our >shareholders from killing each other, we could advance our plans >to open trading in Florida. > >Phew. This Jamaican ginger beer is strong stuff, and we're already >out of Pringles. Oh, and there's a hurricane coming. > > >El Generalissimo. > >--- end forwarded text > > >----------------- >Robert A. Hettinga >Philodox Financial Technology Evangelism >44 Farquhar Street, Boston, MA 02131 USA >"... however it may deserve respect for its usefulness and antiquity, >[predicting the end of the world] has not been found agreeable to >experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' > __________________________________________________________________________ go not unto usenet for advice, for the inhabitants thereof will say: yes, and no, and maybe, and I don't know, and fuck-off. _________________________________________________________________ attila__ To be a ruler of men, you need at least 12 inches.... There is no safety this side of the grave. Never was; never will be. From lodi at well.com Sun Sep 20 05:05:53 1998 From: lodi at well.com (Alia Johnson) Date: Sun, 20 Sep 1998 20:05:53 +0800 Subject: CJ Update In-Reply-To: Message-ID: Thanks, Declan, and please copy me with whatever saunters down the pike. Alia On Sun, 20 Sep 1998, Declan McCullagh wrote: > I've received two messages from Carl Johnson in letter form. He seems in, > um, good spirits. He also mentions a BabyTruthMongerel at one point. > > He asks that his messages be passed on to cypherpunks, and I have no > objection, after I'm done writing the fourth part of the article. We could > presumably scan them in and put them up on pathfinder.com. > > -Declan > > > > On Sat, 19 Sep 1998, John Young wrote: > > > >From Alia Johnson , CJ's sister, today: > > > > I'm writing to say that CJ has arrived at the Springfield Medical > > Referral Center, where he will be held for a month or more (the > > phone says U.S. Medical Center for Federal Prisoners) for > > "examination". > > > > Here is the address: > > > > Carl E. Johnson > > Register # 05987-196 > > U.S. Medical Center for Federal Prisoners > > P.O. Box 4000 > > Springfield, Missouri 65801 > > > > Also, to my delight, I received a letter from him today. He sounds okay. > > > > CJ in his letter asks for physical mailing addresses for some of the > > cypherpunks (no one specifically) so that he can send you things to > > post since I will be travelling. > > > > [End Alia] > > > > --------- > > > > We'll be happy to digitize and/or post any mail from CJ folks want to > > share, anonymous and/or encrypted always welcome: > > > > Fax: 212-799-4003 > > Vox: 212-873-8700 > > > > Snail: > > > > John Young > > 251 West 89th Steet, Suite 6E > > New York, NY 10024 > > > > We've put all our PGP keys at: > > > > http://jya.com/jya-keys.txt > > > > And a bunch of keys for the wild bunch of Totos: > > > > http://jya.com/totos-keys.htm > > > > > > > > > > > > > > > > From jf_avon at citenet.net Sun Sep 20 07:30:16 1998 From: jf_avon at citenet.net (Jean-Francois Avon) Date: Sun, 20 Sep 1998 22:30:16 +0800 Subject: financial analysis of Canadian gun controll bill ( C-68 ) Message-ID: <199809210324.XAA00921@cti06.citenet.net> Excerpt from: Cdn-Firearms Digest Sunday, September 20 1998 Volume 02 : Number 597 Date: Sun, 20 Sep 1998 05:33:19 -0600 From: Jean Hogue Subject: 360 Millions For What? 1. 360 Millions For What ? background: the CFC finally spit out the revised estimate of registration until the end year 2002: 120 millions in set up costs 240 millions for operation (60 M per year for 4 years). - ------ Reference: canadian firearms digest v. 2 # 595 Date: Thu, 17 Sep 1998 19:26:57 -0600 From: David A Tomlinson Subject: BOY ARE THEY GONNA BOMB... > If, however, it is an unrestricted rifle or shotgun, then it will NOT have > to be "verified" -- no matter how many times it is transferred and > re-registered -- until 01 Jan 2003. Let me see if I can get this straight now: - -- a) re-arrangement of the data set: In order to justify the National Firearms Registry (and the whole CFC existence), the Canadian Firearms Centre came out with its own statistics, having rejected the actual firearms crime figures from both the RCMP and Statistics Canada. The CFC's point what to "prove" that the "problem" firearms were not the legally registered restricted firearms (these were so easy to ban outright) but the unrestricted rifles and shotguns. - -- b) verification: flavor of the day First, the CFC came out with the dumb "fill-it-in-yourself" postcard, guaranteed to collect essentially trash and hopelessely corrupt the entire National Firearms Registry. Second, the CFC announced that after the registration deadline (Dec. 31, 2002), all the 7 million records would be examined to weed out the trash. An impossible task. Hercules did not pussyfoot around with a shovel in Augias' stables. It means that the registration work would have to be redone entirely and taking a corrupt database as the only source of information. At the end of 2002, the National Firearms Registry would be a collection of trash with absolutely no legal value. The importance of "legal value" ? Let's see ... "A Ruger Mini-14 ? No, I surrendered that newly banned gun years ago. Your records must be wrong. No, I did not keep the stinking receit. I don't have to prove I'm innocent, you have to prove I'm guilty. Get lost !" What they goonna do ? Break down the door at 03:00 with machine guns ? Third, the CFC announced it would do verification on the fly. Stuck with sky-rocketing costs, the best it could come up with was to recruit 6,000, then 3,000 unpaid volunteers -- a few weeks before the law is to take effect on Oct. 1, 1998. Each of them would have to proceed with an average number of 2,300 verifications within a 4-year time frame to ensure the protection of 7 miilion firearm registration records against corruption. Fourth, DAT's posting now clarifes that verification only applies to restricted firearms. This coincides with the last few days left before Oct. 1st and a seeming conclusion that the CFC failed to find in time 3,000 persons dumb enough to come mow their lawn for free. - -- end result : - the CFC's own self-serving estimates of 7 million firearms (a case has been made of an actual number of 20 millions) - registered restricted firearms records with the gov.: 1 million ---> rifles/shotguns outnumber restricted guns by 6:1 1. 86 % of registration applications (rifles and shotguns) will be exempt from verification. Brilliant ! A few days before the Oct. 1st deadline, we are now back at square two: 6 million trash records, to be verified "maniana". (Spanish for either really "tomorrow" or "in the fullness of time", the audience must judge which applies). 2. The remaining 14 % (handguns and other restricteds) already on file were ALREADY verified and need to verified AGAIN (but rifles and shotguns only need to be registered ONCE ever - right !). 3. The principle of the day is that the firearms allegedly most often used in domestic violence do not need no stinking verification but the considerably smaller stock of restricted firearms already verified must be verified. Conclusion: For 360 millions, we will end up with a National Firearms Registry with absolutely no legal value. In 2003, a new round of hundreds of millions will be required again to magically clean up an entirely corrupt Registry. No deadline set. Hey CFC, please don't say it. I do not want to be told again that the enire after-the-fact verification program will only cost 85 millions. It really is not that complicated. Either the registration applications need to be verified or they don't. A rifle/shotgun owner is just as liable as a handgun owner to make a mistake when describing a firearm on a registration form. Arguing that the type of firearm changes the requirement is essentially negociating on the principle. (Clinton: oral sex does not count as a sexual relationship). The sort of people who have not figured out yet that a principle is somehting that is not open to negociation and compromise are the sort of people who have no principles. So, in the end, the registration process will have worthless data on the unrestricted firearms -- allegedly the ones most often used in crime and the emphasis on accurate registration will be placed on the other, considerably smaller lot, of firearms. Odd, I thought this is what the government has been doing since 1934. And failed ever since. Do not pass go, do not collect $ 200, lose a turn and go back to square 0. IS THIS WHAT WE GET FOR 360 MILLIONS ? And Allan Rock, who brought us C-68, now does not have money to compensate hep-C victims. - --------------- 2. Question to the CFC: When are you going to disclose your revised fees ? Announced roughly within the same time frame as the 85 million dollar cost for the entire 7-year gun registry (starting from 1995 until the end of 2002). The following base figures are those of the CFC: registration fee: $ 10 initially for "up to 10 firearms", increasing to $ 18. possession permit: $ 10 initially, increasing to $ 60 near the end. number of gun owners: 3 millions number of firearms: 7 millions proportion of gun owners enticed into early compliance by low initial fee: 30% average number of firearms per gun owner: 2.3 (less than 10) First 30 %: 900,000 gun owners, 2.1 million guns: 18 M$ 0.9 million permits x $ 10/permit = 9 M$ 0.9 million registrations x $ 10 = 9 M$ Last 70 % : 2.1 million gun owners, 4.9 million guns: 164 M$ 2.1 million permits x $ 60/permit = 126 M$ 2.1 million registrations x $ 18 = 38 M$ Total tax grab by Dec. 31st, 2002 182 M $ ------- Note that the number of registration applications is equal to the number of gun permit applications because we are allowed "up to 10 firearms" for the same fee. Now, the following secnarios to consider are : 1- the bureaucrats really believed the 85 million figure -- and they were going to bilk gun owners out of an extra 100 million dollars right from the start, more than twice what they actually "needed"; 2- the bureaucrats have known for a long time that the fee schedule they published covers only half of the actual costs of 360 millions. Just as they stalled and stonewalled and denied for as long as possible the true extent of their spendings, they are also stalling and stonewalling on the real fees they will have to charge to cover their lavish lifestyle. I doubt very much scenario 1 is true -- the bureaucrats could not be so naive, the Surete du Quebec itself will set up a staff of up 200 at the cost of 40 millions, close to half the 85 million total. Scenario 2 shows we cannot believe Ottawa's fee structure anymore than we can believe its total cost estimates nor its crime statistics. In a nutshell: - - The bureaucrats could not do it for 85 mmillions. - - The bureaucrats cannot do it for 360 millions. (at that point, only gone through the motions, unvalidated registry). - ---> The fees cannot remain at the original level promised at the beginning. ------------------------------ Jean-Francois�Avon,�B.Sc.�Physics,�Montreal,�Canada ��DePompadour,�Soci�t�d'Importation�Lt�e �����Limoges�fine�porcelain�and�french�crystal ��JFA�Technologies,�R&D�physicists�&�engineers �����Instrumentation�&�control,�LabView�programming PGP�keys:�http://bs.mit.edu:8001/pks-toplev.html PGP�ID:C58ADD0D:529645E8205A8A5E�F87CC86FAEFEF891� PGP�ID:5B51964D:152ACCBCD4A481B0�254011193237822C From jkeep at bigfoot.com Sun Sep 20 23:39:46 1998 From: jkeep at bigfoot.com (jkeep at bigfoot.com) Date: Sun, 20 Sep 1998 23:39:46 -0700 (PDT) Subject: Get a free cell phone and much more..... Message-ID: <199809210639.XAA10433@allcapecod.com> To be removed from future mailings please click reply and send with the word remove in the subject line Here are several of the best in network opportunities ++++++++++++++++++++++++++++++++++++++++++++++++++++++++ FREE CELL PHONE and NO More Phone Bills!!! Call! 1-800-600-0343 ext# 2107 VERY SIMPLE COMPENSATION PLAN: A 2 by 2 Forced Company Matrix. Weekly Paychecks & Double Matching Bonus! Get 2 Who Get 2 - Get Paid! When you complete your first cycle you get $100 plus FREE State-of-the-Art Ericson or NOKIA 6160 Digital and Analog PCS Cell Phone! Caller ID, Voice Mail, E-Mail, Call Waiting, 3-Way Calling, Built in 199 Names and Numbers directory, free battery and free charger, calendar, calculator,currency converter, minute counter, A Great Phone! and 600 minutes of service FREE LOCAL and LONG DISTANCE CALLS On the #1 Wireless Network! No Roaming Charge! No Monthly Fees! EVERY NETWORKER NEEDS THIS! Your Downline Needs This!!! The perfect compliment to your existing business or . . . a business opportunity all by itself. REPLY TO THIS MESSAGE WITH cellular in the subject line or go to http://www.thebestincellular.net for more info OR CALL 1-800-600-0343 ext# 2107 WIPE OUT YOUR BIGGEST MARKETING EXPENSE - YOUR PHONE BILL! In addition, you receive An Ongoing Supply of "QUALIFIED" BUSINESS OPPORTUNITY LEADS . . . Choose 300 Fax Leads or . . . 300 Telemarketing Leads - Everytime you cycle and $200 plus a $50 bonus when the people you sign up or they sign up cycle +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ MultilevelSalesAssociaton downline club. We will enter 500 people into 3 diverse mlm programs that will earn you $$$$$$$$$$$ This club is free to join and will allow you to enter programs with 200-400 people already in your downline reply to this message with dlc in your subject line or go to http://www.thebestincellular.net/dlc.html or Call! 1-800-600-0343 ext# 2107 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ There are over 40 million people in the US without medical coverage Now HEALTCARE HAS GONE MLM. You can make $$$$$$$ signing up people into this 14 year old program. The basic plan costs $29.95 per month per family, everyone is covered, it provides benefits like accidental insurance, discounts at doctors, hospitals, dentists, vision care specialists, RX stores and much more, over 300,000 providers of service for more info reply to this message with napp in the subject line or go to Call us! 1-800-600-0343 ext 2107 From moulton at moulton.com Sun Sep 20 09:32:06 1998 From: moulton at moulton.com (Fred C. Moulton) Date: Mon, 21 Sep 1998 00:32:06 +0800 Subject: atheism (was: RE: Democracy... (fwd)) (fwd) Message-ID: <2.2.32.19980921053419.00a3a104@shell7.ba.best.com> To quote the The Encyclopedia of Philosophy (EOP): 'No definition of "atheism" can hope to be in accord with all uses of this term." The EOP article continues with a discussion of various definitions and reasons for them. The article includes the following comment: 'On our definition, an "atheist" is a person who rejects belief in God, regardles of whether or not his reason for the rejection is the claim that "God exists" is a fales proposition.' George H. Smith in his book Atheism: The Case Against God writes: 'Atheism, in its basic form, is not a belief: it is the absence of belief. An atheist is not primarily a person who believes that a god does not exist; rather, he does not believe in the existence of a god.' Within the past year I attended a lecture by Mr. Smith and during the lecture he indicated that his formulation was being preferred by scholars in the field while the one given by Jim Choate was still used in the popular culture. Thus I think it is inappropriate to criticize the definition of atheism used by pjm at spe.com. Fred At 05:02 PM 9/20/98 -0500, Jim Choate wrote: >Forwarded message: > >> From: pjm at spe.com >> Date: Sun, 20 Sep 1998 20:13:38 +0200 >> Subject: atheism (was: RE: Democracy... (fwd)) (fwd) >> No, they are not. The distinction is crucial to the main point I >> evidently failed to make in my previous message: Atheism is not a set >> of beliefs that constitutes a personal philosophy. There are Buddhist >> atheists, Universalist-Unitarian atheists, objectivist atheists, >> Wiccan atheists, etc. Atheism isn't even a belief, it is merely the >> statement of a lack of one particular belief. > >No, atheism is the statement that "God could exist, but doesn't". Whether >one chooses to hang 'Bhuddism' or 'Wiccan' on is irrelevant. We aren't >discussion labels but rather characteristics. Fundamentaly *ALL* atheism >states: > >While it could happen that way, I don't believe it does. > >Which is identical in meaning to: > >While it could happen that way, I believe it doesn't. > From alan at clueserver.org Sun Sep 20 09:58:16 1998 From: alan at clueserver.org (Alan Olsen) Date: Mon, 21 Sep 1998 00:58:16 +0800 Subject: uk police and warrents In-Reply-To: <199809201922.PAA09395@domains.invweb.net> Message-ID: On Sun, 20 Sep 1998, William H. Geiger III wrote: > >The UK police are pushing for access to people's email _without_ having a > >warrent. > > >THey also want the ISPs to store everyone's mail for a week.. > > Encrypt everything and let them keep it as long as they want. :) Until they come for your keys. (Also without a warrent.) alan at ctrl-alt-del.com | Note to AOL users: for a quick shortcut to reply Alan Olsen | to my mail, just hit the ctrl, alt and del keys. From guy at panix.com Sun Sep 20 12:16:36 1998 From: guy at panix.com (Information Security) Date: Mon, 21 Sep 1998 03:16:36 +0800 Subject: This is a listed crime? Message-ID: <199809210818.EAA08107@panix7.panix.com> # Bin Laden has suffered other setbacks recently. On Wednesday night, the # FBI arrested Wadih el Hage, an Arlington, Texas man who law enforcement # officials charge worked with bin Laden and Al-Din in Sudan, and with # Fazil in Kenya from 1994 to 1997. He has been charged with lying to the # FBI about his relationship with other bin Laden operatives, including a # senior bin Laden lieutenant who drowned in a 1996 ferryboat accident in # Tanzania. Is "lying to the FBI" a law on the books, or is the actual charge something else? ---guy From bill.stewart at pobox.com Sun Sep 20 12:38:26 1998 From: bill.stewart at pobox.com (Bill Stewart) Date: Mon, 21 Sep 1998 03:38:26 +0800 Subject: Dilbert on Wearable Computing Message-ID: <3.0.5.32.19980919140545.008d5740@idiom.com> Today's Dilbert is at http://www.unitedmedia.com/comics/dilbert/ and if you access it after today, it'll be at http://www.unitedmedia.com/comics/dilbert/archive/images/dilbert98091213518.gif Thanks! Bill Bill Stewart, bill.stewart at pobox.com PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639 From adam at homeport.org Sun Sep 20 14:25:42 1998 From: adam at homeport.org (Adam Shostack) Date: Mon, 21 Sep 1998 05:25:42 +0800 Subject: ArcotSign (was Re: Does security depend on hardware?) In-Reply-To: <199809192038.QAA29964@denmark-vesey.MIT.EDU> Message-ID: <19980921062758.A3194@weathership.homeport.org> On Sun, Sep 20, 1998 at 06:45:06PM +0200, Lucky Green wrote: | On Sat, 19 Sep 1998, Ryan Lackey wrote: | | > | > [from a discussion of tamper-resistant hardware for payment systems | > on dbs at philodox.com, a mailing list dedicated to digital bearer systems, | o ArcotSignTM technology is a breakthrough that offers smart card tamper | resistance in software. Arcot is unique in this regard, and WebFort is the | only software-only web access control solution on the market that offers | smart card security, with software convenience and cost. [We have now | entered deep snake oil territory. Claims that software affords tamper | resistance comparable to hardware tokens are either based in dishonesty or | levels of incompetence in league with "just as secure pseudo-ontime | pads"]. | | In summary, based on the technical information provided by Arcot System, | the product is a software based authentication system using software based | client certificates. I have no knowledge of Arcot's systems and can't comment on them. Hoever, there are ways to make software hard o disassmeble and/or tamper with. Given that Arcot is probably going to attack smartcards as being easily attacked, 'smartcard level' security is not that high a target, the claim may not be so outlandish. Be intestesting to see how fast the code is. If they're embedding certs in complex code that needs to run to sign, then theft of the cert may be difficult. Adam -- "It is seldom that liberty of any kind is lost all at once." -Hume From schneier at counterpane.com Sun Sep 20 14:28:19 1998 From: schneier at counterpane.com (Bruce Schneier) Date: Mon, 21 Sep 1998 05:28:19 +0800 Subject: ArcotSign (was Re: Does security depend on hardware?) In-Reply-To: Message-ID: <199809211030.FAA05159@mixer.visi.com> At 06:27 AM 9/21/98 -0400, Adam Shostack wrote: >On Sun, Sep 20, 1998 at 06:45:06PM +0200, Lucky Green wrote: >| On Sat, 19 Sep 1998, Ryan Lackey wrote: >| >| > >| > [from a discussion of tamper-resistant hardware for payment systems >| > on dbs at philodox.com, a mailing list dedicated to digital bearer systems, > >| o ArcotSignTM technology is a breakthrough that offers smart card tamper >| resistance in software. Arcot is unique in this regard, and WebFort is the >| only software-only web access control solution on the market that offers >| smart card security, with software convenience and cost. [We have now >| entered deep snake oil territory. Claims that software affords tamper >| resistance comparable to hardware tokens are either based in dishonesty or >| levels of incompetence in league with "just as secure pseudo-ontime >| pads"]. >| >| In summary, based on the technical information provided by Arcot System, >| the product is a software based authentication system using software based >| client certificates. > > I have no knowledge of Arcot's systems and can't comment on >them. Hoever, there are ways to make software hard o disassmeble >and/or tamper with. Given that Arcot is probably going to attack >smartcards as being easily attacked, 'smartcard level' security is not >that high a target, the claim may not be so outlandish. They're not looking to do tamperproof software. Their business model can be best described as: "better than passwords, cheaper than SecurID." Here's the basic idea: Strew a million passwords on your hard drive, and make it impossible to verify which is the correct one offline. So, someone who steals the password file off the client cannot run a cracking tool against the file. > Be intestesting to see how fast the code is. If they're >embedding certs in complex code that needs to run to sign, then theft >of the cert may be difficult. It isn't bad. Bruce ********************************************************************** Bruce Schneier, President, Counterpane Systems Phone: 612-823-1098 101 E Minnehaha Parkway, Minneapolis, MN 55419 Fax: 612-823-1590 Free crypto newsletter. See: http://www.counterpane.com From nobody at replay.com Sun Sep 20 15:15:14 1998 From: nobody at replay.com (Anonymous) Date: Mon, 21 Sep 1998 06:15:14 +0800 Subject: No Subject Message-ID: <199809211117.NAA29900@replay.com> ... some of the internal key-IDs have been modified. however, both versions should have been posted in various 'true' messages. No information if some of the false messages were ever encrypted with the key twiddles in hidden 32 bits, but probably not. ... From ravage at EINSTEIN.ssz.com Sun Sep 20 16:09:50 1998 From: ravage at EINSTEIN.ssz.com (Jim Choate) Date: Mon, 21 Sep 1998 07:09:50 +0800 Subject: This is a listed crime? (fwd) Message-ID: <199809211236.HAA16397@einstein.ssz.com> Forwarded message: > From: Information Security > Date: Mon, 21 Sep 1998 04:18:43 -0400 (EDT) > Subject: This is a listed crime? > Is "lying to the FBI" a law on the books, or is the actual > charge something else? Deliberately providing police incorrect information during an official investigation is a crime. A person can answer the question truthfuly or else they can refuse, lying is not an option. There is also the potential for being charged as an accomplice. ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From ravage at EINSTEIN.ssz.com Sun Sep 20 16:12:13 1998 From: ravage at EINSTEIN.ssz.com (Jim Choate) Date: Mon, 21 Sep 1998 07:12:13 +0800 Subject: atheism (was: RE: Democracy... (fwd)) (fwd) Message-ID: <199809211240.HAA16457@einstein.ssz.com> Forwarded message: > Date: Sun, 20 Sep 1998 22:34:19 -0700 > From: "Fred C. Moulton" > Subject: Re: atheism (was: RE: Democracy... (fwd)) (fwd) > Within the past year I attended a lecture by Mr. Smith and during the > lecture he indicated that his formulation was being preferred by > scholars in the field while the one given by Jim Choate was still > used in the popular culture. > > Thus I think it is inappropriate to criticize the definition of > atheism used by pjm at spe.com. Well Fred you and pjm can believe what you wish, I fully support it. However, yourself, pjm, & Mr. Smith are claiming that a belief that something doesn't exist isn't a belief is simply a tricky play on semantics. A belief in a negative is still a belief irrespective of how many people believe it. Might doesn't make right (or logical). As I've demonstrated before (and for the last time): ^(A) = (^A) Argue all you want, Yet it moves. ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From ravage at EINSTEIN.ssz.com Sun Sep 20 17:04:40 1998 From: ravage at EINSTEIN.ssz.com (Jim Choate) Date: Mon, 21 Sep 1998 08:04:40 +0800 Subject: Faith, logic, language, & history... Message-ID: <199809211332.IAA16566@einstein.ssz.com> Hi, Some have posited that the traditional way of looking at religion, logic, and culture is false and that in fact a new methodology of examination has been found. What is happening is that some faction has decided to abandon 5000+ years of human social and religous culture in favor of a new set of definitions. These definitions use the traditional terminology in a new manner and in addition invoke an alternate understanding of basic logic (ie 1st Order Predicate Calculus). To date no proof or demonstration, only an oft repeated claim, has been forthcoming to demonstrate the short-fall in the traditional approach. While the issues based on faith are clearly outside the purvue of rational proof the invocation of alternate logics to back them up is not. It falls on the current cadre of supporters to demonstrate two things: 1. The shortfall in comprehension or understanding that occurs with the traditional approach 2. How the new system addresses these shortcoming succsfully. In short, if these folks really want us to believe their assertion: ^(A) <> (^A) Then they need to demonstrate why De Morgans Law and other derivations of this logical axiom are incorrect and how this alternate inversion identity corrects these failures. *IF* this can be accomplished then the remainder of their argument has some basis in consideration. The catch they don't seem to have seen is that when one inokes an empirical philosophy in the support of a faith based philosophy it is done at the behest and within the guidelines of the empirical philosophy. To do otherwise is to change the rules in the middle of the game. How many people believe it is irrelevant, how many books are written is irrelevant. All that matters is demonstrating the proof within the boundary conditions. It is not an issue of personality or popularity. Myself, I don't believe they can do it. Computers work, crypto works, man got to the moon, medicine works, airplanes fly, etc., etc., etc. As the saying goes, the proof is in the pudding. It's time these folks got their butts in the kitchen. ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From attila at hun.org Sun Sep 20 18:22:29 1998 From: attila at hun.org (attila) Date: Mon, 21 Sep 1998 09:22:29 +0800 Subject: This is a listed crime? In-Reply-To: <199809210818.EAA08107@panix7.panix.com> Message-ID: On Mon, 21 Sep 1998, Information Security wrote: ># Bin Laden has suffered other setbacks recently. On Wednesday night, the ># FBI arrested Wadih el Hage, an Arlington, Texas man who law enforcement ># officials charge worked with bin Laden and Al-Din in Sudan, and with ># Fazil in Kenya from 1994 to 1997. He has been charged with lying to the ># FBI about his relationship with other bin Laden operatives, including a ># senior bin Laden lieutenant who drowned in a 1996 ferryboat accident in ># Tanzania. > >Is "lying to the FBI" a law on the books, or is the actual >charge something else? >---guy > -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 dont want to take the time to look up the 18 USC reference, but providing deliberately false information to _any_ federal agent is a felony-- that includes the IRS. if nothing else, such as telling a federal agent to fuck-off, they will charge you with obstruction of justice. for all who think the Bill of Rights really means something, consider: silence obstruction of justice false information lying to a federal agent in course of ... ... too many to list; also, each of the regulatory agencies have their own courts and regulations which usurp the Congressional mandate for legislation of the Constitution. The regulatory courts have broad powers and their decisions, both criminal and civil, can be entered in Federal District Court; you, of course, have right of review in Federal District Court, for what that is worth --by the time you get that far in the procedings, you're out of money for the mandatory lawyers the original 13th amendment was created to prevent --the government has confiscated your property without due process, and before "conviction" under the seizure laws which permit them to grab assets at the time of the arrest --even if you are acquitted, there is little if any guarantee your property will be restored --if in the meantime it is sold at 10 cents on the dollar at auction, you may be entitled to that dime. welcome to democracy in action. attila out.... -----BEGIN PGP SIGNATURE----- Version: PGPfreeware 5.0i for non-commercial use Comment: No safety this side of the grave. Never was; never will be. Charset: noconv iQA/AwUBNgZfzz7vNMDa3ztrEQIwlwCdGMfStrZLM9b3QFss95M/oxiuUHQAn1s9 ETc8Fr1fsDRoBjwZlFvKlBK5 =QsY1 -----END PGP SIGNATURE----- __________________________________________________________________________ go not unto usenet for advice, for the inhabitants thereof will say: yes, and no, and maybe, and I don't know, and fuck-off. _________________________________________________________________ attila__ To be a ruler of men, you need at least 12 inches.... There is no safety this side of the grave. Never was; never will be. From frissell at panix.com Sun Sep 20 18:46:18 1998 From: frissell at panix.com (Duncan Frissell) Date: Mon, 21 Sep 1998 09:46:18 +0800 Subject: This is a listed crime? (fwd) In-Reply-To: <199809211236.HAA16397@einstein.ssz.com> Message-ID: <199809211446.KAA16321@mail1.panix.com> At 07:36 AM 9/21/98 -0500, Jim Choate wrote: >Forwarded message: > >> From: Information Security >> Date: Mon, 21 Sep 1998 04:18:43 -0400 (EDT) >> Subject: This is a listed crime? > >> Is "lying to the FBI" a law on the books, or is the actual >> charge something else? > >Deliberately providing police incorrect information during an official >investigation is a crime. A person can answer the question truthfuly or else >they can refuse, lying is not an option. There is also the potential for >being charged as an accomplice. In fact some authorities thought that you could give an "exculpatory no" answer to questions without being guilty of Obstruction of Justice. "Did you accept a bribe from the Chinese, Mr. Clinton." "No." But last year the Supremes held that even "exculpatory noes" can be Obstruction so the better answer (as it always has been) is "Get out of my face G-Man I don't have to talk to scum like you." (Or words to that effect). DCF From CTIA_Daily_News at um2.unitymail.com Mon Sep 21 10:22:34 1998 From: CTIA_Daily_News at um2.unitymail.com (CTIA Daily News) Date: Mon, 21 Sep 1998 10:22:34 -0700 (PDT) Subject: CTIA Daily News from WOW-COM - September 21, 1998 Message-ID: <199809211716.MAA20127@mailstrom.revnet.com> ========================================== Welcome to today's edition of the CTIA Daily News from WOW-COM.� Please click on the icon / attachment for the most important news in wireless communications today. The Newest Most Comprehensive Tradeshow of Wireless Computing and Communications is Less Than a Month Away. Register TODAY! http://www.wirelessit.com/register.htm Team WOW-COM wowcom at ctia.org =========================================== -------------- next part -------------- A non-text attachment was scrubbed... Name: bin00021.bin Type: application/octet-stream Size: 9515 bytes Desc: "_CTIA_Daily_News_19980921.htm" URL: From attila at hun.org Sun Sep 20 19:31:20 1998 From: attila at hun.org (attila) Date: Mon, 21 Sep 1998 10:31:20 +0800 Subject: atheism (was: RE: Democracy... (fwd)) (fwd) In-Reply-To: <199809202202.RAA14798@einstein.ssz.com> Message-ID: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On Sun, 20 Sep 1998, Jim Choate wrote: >Forwarded message: > >> From: pjm at spe.com >> Date: Sun, 20 Sep 1998 20:13:38 +0200 >> Subject: atheism (was: RE: Democracy... (fwd)) (fwd) >> [snip] >No, atheism is the statement that "God could exist, but doesn't". Whether >one chooses to hang 'Bhuddism' or 'Wiccan' on is irrelevant. We aren't >discussion labels but rather characteristics. Fundamentaly *ALL* atheism >states: > >While it could happen that way, I don't believe it does. > >Which is identical in meaning to: > >While it could happen that way, I believe it doesn't. > >> Getting back to the strong v. weak distinction, the weak atheist >> position that one "does not believe god(s) exist" does not constitute >> a belief, a set of beliefs, or a personal philosophy, let alone a >> religion. The strong atheist position that one "believes god(s) do >> not exist" is actually making a knowledge claim and so does constitute >> a belief. > >Try to sell that spin-doctor bullshit to somebody else, and read a book on >basic logic. > agreed, the strong v. weak atheist argument is _impossible_. however, an interesting premise I posited to my 14 year old son who had gone through his scientific awareness state and consequently declared himself an "aethist". at the time he was in a boarding school and we were in conversation with the chief counselor who happened to be a member of an LDS bishopric: kid: yes, an aethist. father: so... you "deny" God's existence since their is no "proof" of His existence. did you ever consider that in order to "deny" anything, you must have defined that concept? in other words, to deny God, you must have determined that I or someone else has defined God in order for you to be able to "deny" God? ... counselor: is there a difference between belief and faith? ... father: aethism is a concept which is almost impossible to define as it is a denial that if it could it doesnt. it is much easier to defend "agnosticism" where you admit you do not believe, or have faith, because you lack sufficient scientific proof. aethism is not doubting, it is denying, even in the face of proof. consider this in terms of both belief and faith: suppose you die, and despite your lack of belief or faith, you find yourself before the throne of God. as your awareness returns, you look up and the image of God is the image of an orangutan --now what are you going to do? without missing a heartbeat: counselor: I think you better get down on your knees and pray! I seriously thought I would face an LDS disciplinary council for that spontaneous off-the-wall comment. I didn't, but I have rocked more than a few boats. and, it does point out the extent to which belief is based on faith. to the literalists who point to Genesis and "God created man in his own image" I always suggest that God in the process could have refined homo sapiens over the years and the original creation may have been significantly more endowed with hair; secondly, God can appear to man in any form He chooses: the burning bush, the blinding light to Saul, etc. however, stating beliefs and disbeliefs is fine; trying to convince another whose beliefs or disbeliefs are securely anchored in whatever they believe as truth, is futile. I will accept, without trying to change, anyone's "religious" beliefs as their beliefs; I only ask they extend the same tolerance to me. attila out... > [snip] -----BEGIN PGP SIGNATURE----- Version: PGPfreeware 5.0i for non-commercial use Comment: No safety this side of the grave. Never was; never will be. Charset: noconv iQA/AwUBNgZuCj7vNMDa3ztrEQLR7gCg7cqx1bA29pe+fBCb7DcyPundpGsAn39U hhEHvCh4fgriwDbOO/QbTdn3 =gsVI -----END PGP SIGNATURE----- From TSGman at earthlink.net Sun Sep 20 19:47:42 1998 From: TSGman at earthlink.net (Todd S. Glassey) Date: Mon, 21 Sep 1998 10:47:42 +0800 Subject: ArcotSign (was Re: Does security depend on hardware?) In-Reply-To: <199809211030.FAA05159@mixer.visi.com> Message-ID: <003701bde576$9858f3f0$200aa8c0@tsg-laptop> Hey Bruce, doesn't this response of yours imply that the OS is what is comprimised?, that either the access models and control of the File System on the target system (that is the one with the million PW's strewn about the disk file system) is setup wrong or is just not functional. Otherwise why would I want to take up critical disk space with a management process that had to manage a million disk-based entities. Oh and BTW - a simple runtime profiler (i.e. most of the runtime debuggers will suffice if they have trace capability) will crack which password is the right one, and I don't even need physical access to the machine to run it in Microsoft Land. Now if they used the CertCo model and split the key/pw into several sections and signed or encrypted them separately so that essentially you have a holographic PW its harder, but the Runtime Profiler is still capable of creating havoc in this model, I think. That is exactly the point why SW alone solutions cannot provide the levels of trust that some forms of commerce require. If the OS is untrustworthy and you have to replicate the components of the system to confuse an intruder as to which is the "active entitiy"... then whats to stop the same person from building a sleeper or coopting the User Memory Space. It seems to me that this effort will just stop people that are cruising through others filespaces in search of gold. As far as commercial trust models are concerned this solution, IMHO, is less than desirable and in some instances covers up but does not fix, various liability models for a complete system. It seems to me (standard disclaimers apply here), that in the real world, the best way to operate is to trust no one, not your OS, not your ISP, and especially not your own people. What that mandates is that there is some "anchor process" that binds both policy and the systems that implement it to the firmament. I believe that this is the key to making tools like CDSA and others (OpSec) more functional. Besides, Imagine the strength of an audit process based upon one of these immutable policy anchors. Todd > -----Original Message----- > From: dbs at philodox.com [mailto:dbs at philodox.com]On Behalf Of Bruce > Schneier > Sent: Monday, September 21, 1998 3:27 AM > To: Adam Shostack; Lucky Green; Ryan Lackey > Cc: scott at loftesness.com; dbs at philodox.com; coderpunks at toad.com; > cryptography at c2.net; cypherpunks at algebra.com > Subject: Re: ArcotSign (was Re: Does security depend on hardware?) > > > At 06:27 AM 9/21/98 -0400, Adam Shostack wrote: > >On Sun, Sep 20, 1998 at 06:45:06PM +0200, Lucky Green wrote: > >| On Sat, 19 Sep 1998, Ryan Lackey wrote: > >| > >| > > >| > [from a discussion of tamper-resistant hardware for payment systems > >| > on dbs at philodox.com, a mailing list dedicated to digital > bearer systems, > > > >| o ArcotSignTM technology is a breakthrough that offers smart > card tamper > >| resistance in software. Arcot is unique in this regard, and > WebFort is the > >| only software-only web access control solution on the market > that offers > >| smart card security, with software convenience and cost. [We have now > >| entered deep snake oil territory. Claims that software affords tamper > >| resistance comparable to hardware tokens are either based in > dishonesty or > >| levels of incompetence in league with "just as secure pseudo-ontime > >| pads"]. > >| > >| In summary, based on the technical information provided by > Arcot System, > >| the product is a software based authentication system using > software based > >| client certificates. > > > > I have no knowledge of Arcot's systems and can't comment on > >them. Hoever, there are ways to make software hard o disassmeble > >and/or tamper with. Given that Arcot is probably going to attack > >smartcards as being easily attacked, 'smartcard level' security is not > >that high a target, the claim may not be so outlandish. > > They're not looking to do tamperproof software. Their business model can > be best described as: "better than passwords, cheaper than SecurID." > > Here's the basic idea: Strew a million passwords on your hard drive, and > make it impossible to verify which is the correct one offline. > So, someone > who steals the password file off the client cannot run a cracking tool > against the file. > > > Be intestesting to see how fast the code is. If they're > >embedding certs in complex code that needs to run to sign, then theft > >of the cert may be difficult. > > It isn't bad. > > Bruce > ********************************************************************** > Bruce Schneier, President, Counterpane Systems Phone: 612-823-1098 > 101 E Minnehaha Parkway, Minneapolis, MN 55419 Fax: 612-823-1590 > Free crypto newsletter. See: http://www.counterpane.com > > > From jf_avon at citenet.net Sun Sep 20 19:57:19 1998 From: jf_avon at citenet.net (Jean-Francois Avon) Date: Mon, 21 Sep 1998 10:57:19 +0800 Subject: [short] Updated quote from Allan Rock Message-ID: <199809211555.LAA10768@cti06.citenet.net> This is the complete quote from Alan Rock, then justice minister who pushed the gun control, registration and confiscation bill (C-68). "I came to Ottawa with the firm belief that the only people in this country who should have guns are police officers and soldiers." -- Allan Rock, Canada's Minister of Justice, quoted in _Maclean's_ "Taking Aim on Guns", April 25, 1994, page 12. "... protection of life is NOT a legitimate use for a firearm in this country sir! Not! That is expressly ruled out!". Justice Minister Allan Rock "Canadian justice issues, a town hall meeting" Producer - Joanne Levy, Shaw cable, Calgary (403) 250-2885 Taped at the Triwood community centre in Calgary Dec.1994 Jean-Francois Avon, B.Sc. Physics, Montreal, Canada JFA Technologies, R&D physicists & engineers Instrumentation & control, LabView programming PGP keys: http://bs.mit.edu:8001/pks-toplev.html PGP ID:C58ADD0D:529645E8205A8A5E F87CC86FAEFEF891 PGP ID:5B51964D:152ACCBCD4A481B0 254011193237822C From stuffed at stuffed.net Mon Sep 21 11:13:55 1998 From: stuffed at stuffed.net (STUFFED NEWS DAILY) Date: Mon, 21 Sep 1998 11:13:55 -0700 (PDT) Subject: 'I F**K LUCY' ON THE WEB/NET SEX HITS THE STOCK MARKET Message-ID: <19980921071001.17302.qmail@eureka.abc-web.com> IN TODAY'S ISSUE: 30 NEW EXTRA HOT JPEGS! 5 NEW SIZZLING STORIES NOOKIE IN THE NEST ROAD ROMPS CAPITAL HILL HORNINESS AUCTION SITE RESTRICTED TO ADULTS SWISS SEX SEEKER ARRESTED I F**K LUCY NET SEX AND STOCKS THE BEST OF EUREKA! MUCH MORE! ----> http://stuffed.net/98/9/21/ <---- Welcome to today's issue of Stuffed. To read it you should click on the URL above. If it is not made clickable by your email program you will need to use your mouse to highlight the URL, copy it and then paste it into your browser (then press Return). This email is never sent unsolicited. Stuffed is the supplement for the Eureka newsletter you subscribed to. Full instructions on unsubscribing are in every issue of Eureka! ----> http://stuffed.net/98/9/21/ <---- From declan at well.com Sun Sep 20 20:31:20 1998 From: declan at well.com (Declan McCullagh) Date: Mon, 21 Sep 1998 11:31:20 +0800 Subject: Satellite phones and Net-connections: new space race (fwd) Message-ID: ---------- Forwarded message ---------- Date: Mon, 21 Sep 1998 09:31:30 -0700 (PDT) From: Declan McCullagh To: politech at vorlon.mit.edu Subject: Satellite phones and Net-connections: new space race I can't give you a URL to my satellite article in this week's Time magazine; it won't be on our web site for another week. --- Time Magazine September 28, 1998 Pages B18-B22 The Super-Cell By Declan McCullagh The Iridium consortium and rival joint ventures are closing in on their goal of making sat phones into multibillion-dollar mainstays of the info-superhighway --- Also worth checking out is an article by Tamala Edwards on the Vermont Senate race, in which an honest-to-goodness 79-year old dairy farmer is running against incumbent Dem Patrick Leahy. You'll remember Leahy is the architect of the Digital Telephony wiretapping law, but was also a vocal opponent of the CDA. -Declan From mmotyka at lsil.com Sun Sep 20 20:48:20 1998 From: mmotyka at lsil.com (Michael Motyka) Date: Mon, 21 Sep 1998 11:48:20 +0800 Subject: Clinton's fake apologies (fwd) In-Reply-To: <3.0.5.32.19980920152605.0086ba30@205.83.192.13> Message-ID: <360683E5.26C6@lsil.com> Reeza! wrote: > In case you hadn't noticed, the investigation of him, vis-a-vis the rules > established by other demicans, his supposed compatriates, is still ongoing. > > Methinks this is just the tip of the iceberg, a bone for the populace to > chew on so that when the rest of the story breaks, we (the dog) won't > notice the prime rib and sirloin. > Completely illogical. Give me one good reason not to lead with your best punch? I suspect Starr's work is voluminous but weak on all other counts so he led with what would create the most publicity. I've said that I'm no great fan of Clinton's but this entire investigation is blatantly partisan and has brought the political process in this country about as low as it is possible to bring it. Starr's base approach to justice is the opening shot of what I hope turns into an all-out scorched-earth battle. Let 'em all fall down. I'm just afraid that when it's over the only people who will be willing to run for public office will be truly dangerous people who have no respect for liberty not of their own definition. Mike From schneier at counterpane.com Sun Sep 20 20:55:38 1998 From: schneier at counterpane.com (Bruce Schneier) Date: Mon, 21 Sep 1998 11:55:38 +0800 Subject: ArcotSign (was Re: Does security depend on hardware?) In-Reply-To: <199809211030.FAA05159@mixer.visi.com> Message-ID: <199809211656.LAA18134@mixer.visi.com> At 08:43 AM 9/21/98 -0700, Todd S. Glassey wrote: >Hey Bruce, >doesn't this response of yours imply that the OS is what is comprimised?, >that either the access models and control of the File System on the target >system (that is the one with the million PW's strewn about the disk file >system) is setup wrong or is just not functional. Otherwise why would I want >to take up critical disk space with a management process that had to manage >a million disk-based entities. It's not that much disk space. The million entries was a methphor. They use mathematics instead of raw disk storage. >Oh and BTW - a simple runtime profiler (i.e. most of the runtime debuggers >will suffice if they have trace capability) will crack which password is the >right one, and I don't even need physical access to the machine to run it in >Microsoft Land. Now if they used the CertCo model and split the key/pw into >several sections and signed or encrypted them separately so that essentially >you have a holographic PW its harder, but the Runtime Profiler is still >capable of creating havoc in this model, I think. Of course. It's less secure than hardware solutions. >That is exactly the point why SW alone solutions cannot provide the levels >of trust that some forms of commerce require. If the OS is untrustworthy and >you have to replicate the components of the system to confuse an intruder as >to which is the "active entitiy"... then whats to stop the same person from >building a sleeper or coopting the User Memory Space. It seems to me that >this effort will just stop people that are cruising through others >filespaces in search of gold. Agreed. Think of AOL as the ideal user for this idea. They want something a little more secure than passwords, but don't want to spend the money on hardware. Passwords can be guessed, or sniffed. This system doesn't allow passwords to be guessed, and there are some more additions to prevent sniffing (all pretty standard). Sure, if the client machine is compromised (installing a sniffer, etc), there is no security, but that's not the real threat. >As far as commercial trust models are concerned this solution, IMHO, is less >than desirable and in some instances covers up but does not fix, various >liability models for a complete system. Sure. But it's good enough for some things. >It seems to me (standard disclaimers apply here), that in the real world, >the best way to operate is to trust no one, not your OS, not your ISP, and >especially not your own people. What that mandates is that there is some >"anchor process" that binds both policy and the systems that implement it to >the firmament. I believe that this is the key to making tools like CDSA and >others (OpSec) more functional. Besides, Imagine the strength of an audit >process based upon one of these immutable policy anchors. That's not the best way to operate in the real world. I'd much rather have friends, get married, and have a fun life than to trust no one. I'd much rather take the occassional hit rather than sit alone in the dark holding a gun. This is the real world of ninny net users in chat rooms, this isn't online real estate. Bruce ********************************************************************** Bruce Schneier, President, Counterpane Systems Phone: 612-823-1098 101 E Minnehaha Parkway, Minneapolis, MN 55419 Fax: 612-823-1590 Free crypto newsletter. See: http://www.counterpane.com From mmotyka at lsil.com Sun Sep 20 21:05:07 1998 From: mmotyka at lsil.com (Michael Motyka) Date: Mon, 21 Sep 1998 12:05:07 +0800 Subject: This is a listed crime? In-Reply-To: <199809210818.EAA08107@panix7.panix.com> Message-ID: <360687E1.2F94@lsil.com> Information Security wrote: > > # Bin Laden has suffered other setbacks recently. On Wednesday night, the > # FBI arrested Wadih el Hage, an Arlington, Texas man who law enforcement > # officials charge worked with bin Laden and Al-Din in Sudan, and with > # Fazil in Kenya from 1994 to 1997. He has been charged with lying to the > # FBI about his relationship with other bin Laden operatives, including a > # senior bin Laden lieutenant who drowned in a 1996 ferryboat accident in > # Tanzania. > > Is "lying to the FBI" a law on the books, or is the actual > charge something else? > ---guy Not in my book but look very carefully at INS law. It may have to do with documentation generated during his admission to the country rather than after. INS law, to a nonlawyer, looks like the Constitution can be held at arm's length. Still sounds pretty shaky. After all, who remembers everything? I can't even remember what I had for supper last night no less the names of all the people I've worked with in the last few years. From attila at hun.org Sun Sep 20 21:57:54 1998 From: attila at hun.org (attila) Date: Mon, 21 Sep 1998 12:57:54 +0800 Subject: This is a listed crime? In-Reply-To: <199809211700.MAA17197@einstein.ssz.com> Message-ID: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On Mon, 21 Sep 1998, Jim Choate wrote: > >> dont want to take the time to look up the 18 USC reference, but >> providing deliberately false information to _any_ federal agent >> is a felony-- that includes the IRS. if nothing else, such as >> telling a federal agent to fuck-off, they will charge you with >> obstruction of justice. > >The trick is to tell them you are using your Constitutional right to refuse >to answer under the 5th. At that point they can arrest you, and you get >protection via a lawyer and the other processes, or they can go away. If >after this responce they continue to ask you question they are in fact >harassing you and you can press charges for that. > agreed, in theory. but how do you protect yourself when two or more take the stand and swear under oath that you said: "......" or, even: "I dont know nuthin' 'bout it" --which has already been interpreted to a lie it can be proved to a material witness, etc. dealing with the Feds is very similiar to the pecking order of traffic which was suggest to me once in Zuerich: trolleys lorries buses natives presume the man with a badge and a gun is a native. the burden of proof is on you that an agent of our honest, democratically elected government is harassing you. I have seen clear evidence of wiretapping presented, the judge called two gestapos to the stand, and asked them point blank: "did you wiretap [authorized or unauthoized], or were you aware of a wiretap; or did you receive reliable or unreliable information which might have been only obtainable by wiretap or bugging?" and watch both agents straight face lie --one going so far as to say: "no, your Honor, that would be against the law. in the same vein of evidence: why do "officers of the law" carry an extra Saturday Night Special? --in case they drop someone, they can justify their assassination on the basis the deceased was armed and dangerous; or, why does a wanted poster for a meek bean counter who disappeared after touching his employer say: "presume armed and dangerous"? --covers LEOs if they drop the miscreant on sight. the intent of the laws should be evident to everyone. the reality of the laws is the rules of evidence are heavily loaded in favour of the armed and dangerous officers sworn to uphold the law --as they see fit. a little old lady who only walks to the store and to church can be busted for something --be creative. the U.S. legal system has been distorted to the point it could easily be considered the enforcement arm of a totalitarian state. I do consider we have had a valid government since 08 Mar 1933 when FDR, 4 days after his inaugeration hoodwinked Congress into make 'us' the enemy in the Trading With the Enemy Act of 1917, validating the executive order, and declaring a national emergency. all three actions still stand -the national emergency continues. the American theory is wonderful; the American experience not always so wonderful. -----BEGIN PGP SIGNATURE----- Version: PGPfreeware 5.0i for non-commercial use Comment: No safety this side of the grave. Never was; never will be. Charset: noconv iQA/AwUBNgaRlj7vNMDa3ztrEQJZqQCgrmq55Z0oX7grZURPfY8G8qWyU5IAnjvw ZdQyAZK10TYHumCKvTgjZxXo =HJaz -----END PGP SIGNATURE----- From howree at cable.navy.mil Sun Sep 20 22:04:02 1998 From: howree at cable.navy.mil (Reeza!) Date: Mon, 21 Sep 1998 13:04:02 +0800 Subject: Clinton's fake apologies (fwd) In-Reply-To: <3.0.5.32.19980920152605.0086ba30@205.83.192.13> Message-ID: <3.0.5.32.19980922040316.0081b9f0@205.83.192.13> At 09:50 AM 9/21/98 -0700, Michael Motyka wrote: > >Completely illogical. Give me one good reason not to lead with your best >punch? I suspect Starr's work is voluminous but weak on all other counts >so he led with what would create the most publicity. I've said that I'm >no great fan of Clinton's but this entire investigation is blatantly >partisan and has brought the political process in this country about as >low as it is possible to bring it. The affairs of Men rarely rely upon the dictates of logic, or even common sense. National Security. International Relations. Self Interest Re: Future Employment. Direct and Specific instruction from immediate supervisor. He does report to a panel of others. It is weaker than it could be on other counts, due to many/most/all of the prime candidates selected to testify against the sitting....person, keep turning up dead. Go Figure. Certainly it has ties to partisanship. Clarence Thomas. The Demicans made the rules, now the Publicrats are playing by them. I'm reminded of a line from the recent movie "Good Will Hunting". "How do you like them apples?" Certainly it has given the Nation a black eye. We are now down in the gutter, at what would seem to be Clintons level, discussing the merits of cigars with or without extra flavoring. >Starr's base approach to justice is the opening shot of what I hope >turns into an all-out scorched-earth battle. Let 'em all fall down. I'm >just afraid that when it's over the only people who will be willing to >run for public office will be truly dangerous people who have no respect >for liberty not of their own definition. Starr's base approach? You mean 'basic' don't you? No, you were right. But remember, it is all strictly by the Demican play book. I also agree that the Beltway needs a shakedown, I share your fears. Reeza! "Yes, the president should resign. He has lied to the American people, time and time again, and betrayed their trust. He is no longer an effective leader. Since he has admitted guilt, there is no reason to put the American people through an impeachment. He will serve absolutely no purpose in finishing out his term; the only possible solution is for the president to save some dignity and resign." - William Jefferson Clinton, speaking of Richard M. Nixon, 1974 From mmotyka at lsil.com Sun Sep 20 22:23:45 1998 From: mmotyka at lsil.com (Michael Motyka) Date: Mon, 21 Sep 1998 13:23:45 +0800 Subject: This is a listed crime? In-Reply-To: Message-ID: <360699DC.7BB4@lsil.com> > if nothing else, such as > telling a federal agent to fuck-off, they will charge you with > obstruction of justice. > Not too long ago the New York State Court of Appeals struck down some local ordinance outlawing public profanity stating that it was unconstitutional. Looks like not all courts are enemies of the Bill of Rights. Bottom line is that you can say 'Fuck You' in New York. That's not to say that some tallboot won't abuse his power and crack your skull or set you up if you dis him. > dont want to take the time to look up the 18 USC reference, but > providing deliberately false information to _any_ federal agent > is a felony-- that includes the IRS. > Perhaps you could deliberately mislead them without actually representing the information as true. Would these disclaimers indicate that the following information is not suitable for any purpose and that the provider takes no responsibility for any confusion resulting from the use of the information? Like a Microsoft software license. A tail-light warranty for the spoken spam. I heard that ... I believe that ... In my opinion ... I'm not sure ... I don't recall exactly ... I think you should consider looking into ... It is possible that ... I thought that ... What if ... Didn't he once ... Or use these: I'm truly, truly sorry I can't help you. Would you like some more coffee? Piss off. > silence obstruction of justice > Silence is allowed, 5th ammendment. Where in the BOR does it say that this only applies under oath in a court of law? > false information lying to a federal agent in course of ... > Golly, can't lie under oath, can't lie not under oath. Can't just be quiet. I guess they win. Justice prevails. From petro at playboy.com Sun Sep 20 22:32:56 1998 From: petro at playboy.com (Petro) Date: Mon, 21 Sep 1998 13:32:56 +0800 Subject: Clinton's fake apologies (fwd) In-Reply-To: <3.0.5.32.19980920152605.0086ba30@205.83.192.13> Message-ID: At 11:50 AM -0500 9/21/98, Michael Motyka wrote: >Starr's base approach to justice is the opening shot of what I hope >turns into an all-out scorched-earth battle. Let 'em all fall down. I'm >just afraid that when it's over the only people who will be willing to >run for public office will be truly dangerous people who have no respect >for liberty not of their own definition. Which is different from today how? -- petro at playboy.com----for work related issues. I don't speak for Playboy. petro at bounty.org-----for everthing else. They wouldn't like that. They REALLY Economic speech IS political speech. wouldn't like that. From frissell at panix.com Sun Sep 20 22:33:30 1998 From: frissell at panix.com (Duncan Frissell) Date: Mon, 21 Sep 1998 13:33:30 +0800 Subject: This is a listed crime? In-Reply-To: <199809210818.EAA08107@panix7.panix.com> Message-ID: <199809211834.OAA20729@mail1.panix.com> At 02:22 PM 9/21/98 +0000, attila wrote: > dont want to take the time to look up the 18 USC reference, but > providing deliberately false information to _any_ federal agent > is a felony-- that includes the IRS. True > if nothing else, such as > telling a federal agent to fuck-off, they will charge you with > obstruction of justice. False. You are never required to talk to a peace officer, Fed, or investigator unless you want to. They can arrest you of course (with probable cause ha ha). Even then, you still don't have to talk to them. In criminal cases you *never* have to talk to anyone. > too many to list; also, each of the regulatory agencies have > their own courts and regulations which usurp the Congressional > mandate for legislation of the Constitution. The regulatory > courts have broad powers and their decisions, both criminal and > civil, can be entered in Federal District Court; The agencies have no criminal adjudicatory power (aside from a few odd circumstances). They can seize property of course (if you have it where it can be seized) but they (mostly) can't lock you up. > you, of course, > have right of review in Federal District Court, for what that is > worth --by the time you get that far in the procedings, you're > out of money for the mandatory lawyers the original 13th amendment > was created to prevent Lawyers aren't mandatory. Colin Ferguson defended himself on nine murder counts without one (and lost). The Long Island Railroad gunman. DCF From mmotyka at lsil.com Sun Sep 20 23:12:50 1998 From: mmotyka at lsil.com (Michael Motyka) Date: Mon, 21 Sep 1998 14:12:50 +0800 Subject: Clinton's fake apologies (fwd) In-Reply-To: <3.0.5.32.19980920152605.0086ba30@205.83.192.13> Message-ID: <3606A58F.385B@lsil.com> Petro wrote: > > At 11:50 AM -0500 9/21/98, Michael Motyka wrote: > >Starr's base approach to justice is the opening shot of what I hope > >turns into an all-out scorched-earth battle. Let 'em all fall down. I'm > >just afraid that when it's over the only people who will be willing to > >run for public office will be truly dangerous people who have no respect > >for liberty not of their own definition. > > Which is different from today how? > In spite of their shortcomings, many of today's politicians in both parties seem to be fairly pragmatic, 'middle of the road' types. If the only people who can pass muster under the emerging standards are religous fundamentalists then we will have a Bill of Rights under attack problem that is another order of magnitude greater than we have right now. Scares me because while I'm pretty much a live and let live sort, some of the fundamentalists I've known are not very tolerant. Mike From mmotyka at lsil.com Sun Sep 20 23:18:02 1998 From: mmotyka at lsil.com (Michael Motyka) Date: Mon, 21 Sep 1998 14:18:02 +0800 Subject: Stego-empty hard drives... In-Reply-To: Message-ID: <3606A3B8.5B33@lsil.com> Robert Hettinga wrote: > Stegoing an encrypted partition as "blank" hard drive space without > actually writing over it unless you wanted to? > A freshly formatted partition has a fill value. Noise would indicate that is is not fresh. This would not be proof that it contained encrypted data but it would indicate some sort of use. Another layer: create a partition. Use it as an archive for 'unclassified' materials. At some point after the use has fragmented it enough to look real: disable all automatic accesses ( temp files, caches ... ) to the partition create an application program that uses the unused space as a secure filesystem Then the partition would be arguably "in normal use" and it could get tough to prove the nature of the unused space. You could even leave some space filled with the format fill value. Not sure how to hide the app. maybe as passphrased option in some innocuous custom application. Accounting app? The possibility of them taking a hash and saving it for later comparison is a problem. > Stegoing an encrypted partition as not even *there* at all? > Just do a drive ID command and you can figure out how many logical sectors are there. Add up the elements in the partition table and look for a difference. Unused space -esp that filled with noise- is suspect. > Obviously, even if the partition were found, it would look, to sniffer > programs, as if it were empty, right? :-). > Just the existence of a "hidden" partition might might get the juices flowing. ************************************************************************************************* It would be truly beautiful if you could alter the drive firmware to identify itself as a 3Gb drive when it was actually a 5 Gb drive. Add some kind of extended command to the drive that allowed you to activate/deactivate the extended region at will. Without a password of course, the additional command would just report the appropriate error. Then just make sure you have an extra slot in the partition table to address the extended region unless you want to write a low-level driver. Any Quantum or Maxtor persons on the list? Mike Security requires hardware and software. From mmotyka at lsil.com Sun Sep 20 23:25:22 1998 From: mmotyka at lsil.com (Michael Motyka) Date: Mon, 21 Sep 1998 14:25:22 +0800 Subject: Chemical Analysis of Laptop strap. In-Reply-To: <199809190501.HAA12423@replay.com> Message-ID: <3606A678.40A4@lsil.com> Anonymous wrote: > So I fly home Friday from San Jose. Probably because I was > in a hurry, after walking through the magnetometer and x-raying > my stuff, a security dude grabbed my laptop and said he wanted > to 'analyze' it. Yeah sure whatever, I decided not to protest > I was late for my flight. > > This analysis, it turned out, was wiping a coffee filter over the strap > of its bag, and sticking the coffee filter into a slot on a machine. > No solvent even. The machine had columns labelled TNT RDX NITRO PETN HMX. > I recognized the first four as high explosives. Later, I wondered > if people with angina (who take nitro orally) ever set this off. > Most of them, of course, are not bearded eastern-european/semetic > guys in their 30's who look worried and in a hurry. > > Anyway, that was it, and I made my flight. Didn't even open > the laptop's case. > > The machine name was ION-something; I wonder whether it sucked vapors > from the fiber disk or whether it was a neutron-spectrometer (?) device. > > (Had this been a UK Customs 'inspection' of the contents of the disk, I > might have had to explain the half-gig of "noise" I have on the disk. > Only, it really is noise. Really.) > > Anyway, the moral of the story: > > Don't store your laptop with your explosives :-) > > Just wait until you've had a cavity search and been grilled for four hours because you fed Miracle-Gro to your prize peonies just before leaving on your trip. It's pretend security. Feel-good stuff. Better to do NMR of any large-volume object although the magnetic field migh fuck up your drive. From petro at playboy.com Sun Sep 20 23:42:05 1998 From: petro at playboy.com (Petro) Date: Mon, 21 Sep 1998 14:42:05 +0800 Subject: Clinton's fake apologies (fwd) In-Reply-To: <3.0.5.32.19980920152605.0086ba30@205.83.192.13> Message-ID: At 2:14 PM -0500 9/21/98, Michael Motyka wrote: >Petro wrote: >> >> At 11:50 AM -0500 9/21/98, Michael Motyka wrote: >> >Starr's base approach to justice is the opening shot of what I hope >> >turns into an all-out scorched-earth battle. Let 'em all fall down. I'm >> >just afraid that when it's over the only people who will be willing to >> >run for public office will be truly dangerous people who have no respect >> >for liberty not of their own definition. >> >> Which is different from today how? >> >In spite of their shortcomings, many of today's politicians >in both parties seem to be fairly pragmatic, 'middle of the road' types. >If the only people who can pass muster under the emerging standards are >religous fundamentalists then we will have a Bill of Rights under attack >problem that is another order of magnitude greater than we have right >now. Scares me because while I'm pretty much a live and let live sort, >some of the fundamentalists I've known are not very tolerant. The "live and let" attitude of todays politician is there simply because that is where they get the most votes. If they thought that they would get better results, they's thump the bible just as hard as say... Jimmy Swagart. -- petro at playboy.com----for work related issues. I don't speak for Playboy. petro at bounty.org-----for everthing else. They wouldn't like that. They REALLY Economic speech IS political speech. wouldn't like that. From frissell at panix.com Mon Sep 21 00:01:46 1998 From: frissell at panix.com (Duncan Frissell) Date: Mon, 21 Sep 1998 15:01:46 +0800 Subject: Clinton's fake apologies (fwd) In-Reply-To: <3.0.5.32.19980920152605.0086ba30@205.83.192.13> Message-ID: <199809212002.QAA03936@mail1.panix.com> At 09:50 AM 9/21/98 -0700, Michael Motyka wrote: >Completely illogical. Give me one good reason not to lead with your best >punch? I suspect Starr's work is voluminous but weak on all other counts >so he led with what would create the most publicity. Starr did an Impeachment Referral with the stuff he had incontrovertible proof of. Proof is very difficult when dealing with someone like Clinton and you don't want to do a Referral with insufficient proof. Notice that even with proof of multiple felonies the Clintonistas say that they aren't important felonies. >I've said that I'm >no great fan of Clinton's but this entire investigation is blatantly >partisan and has brought the political process in this country about as >low as it is possible to bring it. The Special Counsel was appointed at the request of the President after 6 Democrat Senators called for it. Republicans don't like Clinton but they don't have to. >Starr's base approach to justice is the opening shot of what I hope >turns into an all-out scorched-earth battle. He's just behaving in the way the Democrats designed the OIC to behave. A prosecutor on speed with no boss and no budget. That was their intent. US Attorneys or local DAs would behave the same way if they had the cash. Law & Order Liberals like Clinton can hardly complain. Better him than some 18-year-old drug lookout sentenced to 40 years or some accident-free drunk driver sentenced to life (Texas recently). >Let 'em all fall down. I'm >just afraid that when it's over the only people who will be willing to >run for public office will be truly dangerous people who have no respect >for liberty not of their own definition. Like Clinton, right? I certainly like to see the damage to the Presidency. We also don't have to worry about any tobacco legislation for a few years. DCF "We'll give you more than you deserve. We'll give you Justice." From jya at pipeline.com Mon Sep 21 00:04:17 1998 From: jya at pipeline.com (John Young) Date: Mon, 21 Sep 1998 15:04:17 +0800 Subject: US Complaints in Embassy Bombings Message-ID: <199809212005.QAA04784@camel14.mindspring.com> We offer three of the US complaints in the embassy bombings: http://jya.com/usa-v-qaeda.htm These describe charges against Wadih el Hage, Mohamed Sadeek Odeh and Haroun Fazil, filed in New York's Southern District. El Hage is the American arrested last week that Guy referred to with the "This is a listed crime?" thread. NYT reports on El Hage and Fazil: http://jya.com/fazil-el-hage.htm Odeh is the first suspect arrested at the Pakistani border. Fazil is an explosives expert charged with making the Nairobi bomb and directing the op. He is a fugitive with a $2m reward offered. All are allegedly members of Qaeda, Bin Laden's "international terrorist" group aiming to kill Yanks worldwide for Echelon-type stuff. Know who's with Jim and CJ at Springfield? Blind Sheik Omar of World Trade Center bombing fame and Mafioso John Gotti, who nearly croaked from lack of dental care at another pen. The place has a distinguished history. See its honor roll on Alta Vista. Search "Medical Facility for Federal Prisoners." From mgering at ecosystems.net Mon Sep 21 00:08:50 1998 From: mgering at ecosystems.net (Matthew James Gering) Date: Mon, 21 Sep 1998 15:08:50 +0800 Subject: atheism (was: RE: Democracy... (fwd)) (fwd) Message-ID: <33CCFE438B9DD01192E800A024C84A192846CE@mossbay.chaffeyhomes.com> Jim Choate wrote: > As I've demonstrated before (and for the last time): > > ^(A) = (^A) f() = belief function A = hypothesis ^ = not f(^A) != ^f(A) At least not without placing requirements on f(). Then you claim everything is a belief, so f() is meaningless. But then you deny A == A when you claimed that metaphysical objectivity is a belief, so what was the point in writing the equation in the first place? Go transcend. Matt From petro at playboy.com Mon Sep 21 00:10:16 1998 From: petro at playboy.com (Petro) Date: Mon, 21 Sep 1998 15:10:16 +0800 Subject: Stego-empty hard drives... In-Reply-To: Message-ID: At 2:06 PM -0500 9/21/98, Michael Motyka wrote: >Robert Hettinga wrote: >> Stegoing an encrypted partition as "blank" hard drive space without >> actually writing over it unless you wanted to? >> >A freshly formatted partition has a fill value. Noise would indicate >that is is not fresh. This would not be proof that it contained >encrypted data but it would indicate some sort of use. > >Another layer: > create a partition. > Use it as an archive for 'unclassified' materials. > At some point after the use has fragmented it enough to look real: > disable all automatic accesses ( temp files, caches ... ) >to the >partition > create an application program that uses the unused space as >a secure >filesystem > >Then the partition would be arguably "in normal use" and it could get >tough to prove the nature of the unused space. You could even leave some >space filled with the format fill value. Not sure how to hide the app. >maybe as passphrased option in some innocuous custom application. >Accounting app? Passphrase at startup. One phrase allows access to the "stego'd" areas, the other allows access to the "cover" areas. This wouldn't stand source code inspection, but if you used some sort of Pretty Lousy Privacy on the "cover" data, and an uncompromised crypto on the rest you might pass all but the most rigourous investigation. Of course, if you are getting an extremely rigourous investigation, you don't need good crypto, you need good PR, and a good lawyer because they WILL find something, unless they think hanging your butt will cause riots. -- Five seconds later, I'm getting the upside of 15Kv across the nipples. (These ambulance guys sure know how to party). The Ideal we strive for: http://www.iinet.net.au/~bofh/bofh/bofh11.html No, I don't speak for playboy, They wouldn't like that. They really wouldn't. From sunder at brainlink.com Mon Sep 21 00:11:51 1998 From: sunder at brainlink.com (Sunder) Date: Mon, 21 Sep 1998 15:11:51 +0800 Subject: Stego-empty hard drives... In-Reply-To: <199809192012.WAA05755@replay.com> Message-ID: <3606B18A.C95F4F0A@brainlink.com> Anonymous wrote: > Once they realize people are doing this, they will begin taking hashes or > some other record of the blank space. The next time you are scanned by > customs, they pull the record and compare the previous "blank" space with > the current "blank" space. If they don't match, you're suspect. > > They still cannot prove that you're carrying hidden data. They ask you if > you know what stego is. They ask you if you have hidden data on your > drive. If you say yes, they demand to see it. If you say no, they say > "Okay, then it should be no problem if we push the wipe button on our > program, should it?" > > If they start doing that they have still won, because now you are not > carrying the data across the border or the data is destroyed as you cross > the border. What's this bullshit, eh? Just overwrite the BIOS roms in your machine to return all zeros for the sectors you don't want to show them. Have some special passphrase you have to type in while in the BIOS setup program to deactivate this. Most newer notebooks have flash upgradeable ROMs anyway. Better yet, simply have it report a drive size that's much smaller than what you really have. i.e. install a 4gb drive, but have the bios only see it as a 1gb disk. When software tries to read or write beyond the 1gb space, have it return errors like a real disk would. Anyone who knows x86 assembly can do this sort of shit. If you want to get real wicked on this or are afraid they'll have software that talks directly to the IDE controller, take apart the disk controller card on the drive itself and give it this type of functionality (much harder.) Hell, even if they switch to taking out your hard drive out of your notebook and duplicating it, as long as the HD itself reports LESS space than it really has, they can't get to it, they can't scan it, they can't copy it, they can't overwrite it. Don't want to do that or can't? Okay, boot their software in a Virtual CPU box, and if they try to access I/O directly, have your code intercept and emulate the access. They try to run privilidged opcodes, trap'em and make it look like they're running fine, etc... Let's get this nice and clear once and for all: Software running on untrusted (i.e. your notebook) hardware cannot be trusted as it can be fooled and modified by it. It doesn't matter how sophisticated their scanning software is as long as the hardware DOESN'T COMPLY with it's requests. Software always asks the hardware to do things for it. The hardware doesn't have to obey. :) The solution to getting around this bullshit is in hardware or firmware. I will ignore Anon's idiotic idea of them comparing blank space before and after. That's stupid for one of several very obvious reason: temp files. If that's not clear enough, here's another: defrag. -- =====================================Kaos=Keraunos=Kybernetos============== .+.^.+.| Sunder |Prying open my 3rd eye. So good to see |./|\. ..\|/..|sunder at sundernet.com|you once again. I thought you were |/\|/\ <--*-->| ------------------ |hiding, and you thought that I had run |\/|\/ ../|\..| "A toast to Odin, |away chasing the tail of dogma. I opened|.\|/. .+.v.+.|God of screwdrivers"|my eye and there we were.... |..... ======================= http://www.sundernet.com ========================== From bram at gawth.com Mon Sep 21 00:15:04 1998 From: bram at gawth.com (bram) Date: Mon, 21 Sep 1998 15:15:04 +0800 Subject: ArcotSign (was Re: Does security depend on hardware?) In-Reply-To: <199809211030.FAA05159@mixer.visi.com> Message-ID: On Mon, 21 Sep 1998, Bruce Schneier wrote: > Here's the basic idea: Strew a million passwords on your hard drive, and > make it impossible to verify which is the correct one offline. So, someone > who steals the password file off the client cannot run a cracking tool > against the file. Is this really patentable? It sounds a *lot* like the original public-key algorithm (the one involving lots of little 'puzzles') -Bram From frissell at panix.com Mon Sep 21 00:28:41 1998 From: frissell at panix.com (Duncan Frissell) Date: Mon, 21 Sep 1998 15:28:41 +0800 Subject: Clinton's fake apologies (fwd) In-Reply-To: <3.0.5.32.19980920152605.0086ba30@205.83.192.13> Message-ID: <199809212028.QAA07893@mail1.panix.com> At 12:14 PM 9/21/98 -0700, Michael Motyka wrote: >In spite of their shortcomings, many of today's politicians >in both parties seem to be fairly pragmatic, 'middle of the road' types. >If the only people who can pass muster under the emerging standards are >religous fundamentalists then we will have a Bill of Rights under attack >problem that is another order of magnitude greater than we have right >now. Scares me because while I'm pretty much a live and let live sort, >some of the fundamentalists I've known are not very tolerant. > >Mike The commies I've known are even less tolerant: >From: OBRL-News >To: obrl-news at lists.village.Virginia.EDU >Subject:- FDA Book-Burning... Again! > >Orgone Biophysical Research Lab >http://id.mind.net/community/orgonelab/index.htm >Forwarded News Item > >Please copy and distribute to other interested individuals and groups > >********** > >> FDA Orders Destruction of Stevia Books >> >>On May 20, 1998, the U.S. Food and Drug Administration (FDA) >>ordered the destuction of 2,500 books about the herbal sweetener >>stevia. A small company in Arlington Texas, Stevita, Co., was >>visited by the FDA and forced to stop selling stevia and books >>that mention that stevia can be used as a sweetener. Just another regulatory book burning. (Oops, book *pulping* burning is environmentally incorrect. There are plenty of commies itching to fine me, fire me, or lock me up for criticizing congresscritters within 6 months of an election (campaign finance reform), refusing to attend their re-education and self criticism sessions (racial/sexual harassment awareness training), or mailing a number 10 envelope customers (illegal medical device labeling - I kid you not). A fundie admin would issue fewer total regs than a commie-liberal admin (experience suggests) so freedom would be in better shape on balance. Chart the annual pages of the Federal Register issued by Dems vs Reps. Dems are *way* out in front. Taxes would almost certainly be lower (Clinton's are the highest in peacetime history). I wouldn't worry. If we survived Clinton we can survive the Republicans. Meanwhile the Presidency has been weakened. DCF From mgering at ecosystems.net Mon Sep 21 00:32:25 1998 From: mgering at ecosystems.net (Matthew James Gering) Date: Mon, 21 Sep 1998 15:32:25 +0800 Subject: This is a listed crime? Message-ID: <33CCFE438B9DD01192E800A024C84A192846CF@mossbay.chaffeyhomes.com> > silence obstruction of justice > false information lying to a federal agent in course of ... > ... Regarding the 5th amendment and other laws and precedence involving the right to remain silent, the right against self-incrimination, etc, how far could one carry that as an excuse to remain silent? I mean I have no doubt given the number of laws and regulations on the books that I will say something self-incriminating by some obscure law and/or obscure interpretation every sixth or seventh sentence. Matt From galliart at swbell.net Mon Sep 21 00:46:10 1998 From: galliart at swbell.net (galliart) Date: Mon, 21 Sep 1998 15:46:10 +0800 Subject: Fw: Domain Hosting Priced Right. Message-ID: <3606B6EC46.AD37GALLIART@mail.swbell.net> Forwarded by galliart ---------------- Original message follows ---------------- From: sales at wi-ks.com To: galliart at swbell.net Date: Mon, 21 Sep 1998 16:21:49 -0400 Subject: Domain Hosting Priced Right. -- Computer Service Specialist Co. CSSC's Web Services Low cost Web Hosting and Virtual Servers Place your order now and get your Web site up and running Today! accounts as low as $9.95 per month If with in the first month you are not satisfied with your service we will refund your money!!!! http://www.wi-ks.com/webhosting ____________________________________________________________________ This message is sent in compliance with the new e-mail bill: SECTION 301, Paragraph (a)(2)(C) of s. 1618 Message sent by: Mark Galliart P.O. Box 301 Valley Center, Kansas 67147-0301 316-832-9340 sales at wi-ks.com by auto request mail. this was sent to you because of someone requested this email. To be removed, click reply with REMOVE in the subject line. _____________________________________________________________________ From z2n0db0n3 at auto.sixdegrees.com Mon Sep 21 00:46:17 1998 From: z2n0db0n3 at auto.sixdegrees.com (sixdegrees) Date: Mon, 21 Sep 1998 15:46:17 +0800 Subject: Your sixdegrees Member Update Message-ID: <199809212030.NAA20024@toad.com> Dear monkeyboy, Welcome to your sixdegrees Member Update for the week of September 17th, sponsored by NET at DDRESS. ================================================================= Free Email from NET at DDRESS! Get a free and permanent email address for the rest of your life, no matter how many times you move, change schools, jobs, or switch ISPs. You can also access your email from anywhere in the world where you have Internet access! Visit: http://netaddress.usa.net/tpl/Subscribe/Step1?AdInfo=N-115-E1 ================================================================= In this Member Update, you'll find: 1. Your personalized sixdegrees stats 2. Today's news: people surf through a cornucopia of connections 3. Today's tip: Set your permissions for people surfing 4. Design your own FREE sixdegrees mousepad at iPrint.com 5. Find out exactly what's new in the new sixdegrees 6. Chat Spotlight: Take great pleasure in these cool chat events ================================================================= 1. Y O U R S I X D E G R E E S S T A T S (as of September 17th): CONTACTS Total 1st degree contacts: 0 Total 2nd degree contacts: 0 Total 3rd degree contacts: 0 Total 4th degree contacts: 0 Total 5th degree contacts: 0 Total 6th degree contacts: 0 Total 1st-6th degree contacts: 0 MY BULLETIN BOARD Messages posted by you: 0 Responses to your postings: 0 To add more contacts and to see exactly who's in your 1st degree, just visit: http://www.sixdegrees.com/Services/Circle/MyContacts.cfm To see who's in your other degrees, visit "all my degrees" at: http://www.sixdegrees.com/Services/whatwhen/what.asp To check out "my bulletin board," stop by: http://www.sixdegrees.com/Services/BB/BB.cfm ================================================================= 2. S P O T L I G H T O N P E O P L E S U R F I N G: people surfing, one of the revolutionary new sixdegrees services, lets you literally surf the sixdegrees population starting with the people in your 1st degree and working your way through the worldwide community of more than 1,000,000 sixdegrees members. Click the URL below to give it a try: http://www.sixdegrees.com/Services/Who/Who.asp ================================================================= 3. P E O P L E S U R F I N G P R E F E R E N C E S: With countless ways of getting connected using the new sixdegrees, setting your permissions will allow you to reveal only the info you want other members to see. For people surfing, you can alter how the names in your 1st degree are viewed by other members. Click the URL below and scroll to the bottom of the page to set your preferences: http://www.sixdegrees.com/Services/Profile/how.cfm ================================================================= 4. D E S I G N Y O U R O W N F R E E S I X D E G R E E S M O U S E P A D A T I P R I N T . C O M: iPrint.com, the leading Internet print shop, has an amazing offer for sixdegrees members. For a limited time only, you can design and create your very own personalized sixdegrees mouse pad, FREE of charge (shipping is extra). While you are designing your free mouse pad with Web graphics, clip art or your own personal photographs, check out how iPrint.com can provide you with a convenient way to customize and order almost any printed products you need from t-shirts and hats to business cards. What are you waiting for?! Stop by the URL below to order your free mouse pad: http://www.iprint.com/428.html?ad=6dmpad ================================================================= 5. W H A T ' S N E W I N S I X D E G R E E S? sixdegrees has so many amazing new ways of getting you connected that we'd be hard pressed to find something that isn't new. Check out degree mail, people surfing, who's on, all my degrees and lots more. Click the URL below to see how you can get the most out of your personal global community on the Web: http://www.sixdegrees.com/Public/WhatsNew.asp And make sure you stop by the URL below to read a letter from the president of sixdegrees to find out how your sixdegrees experience has changed: http://www.sixdegrees.com/Public/PresidentLetter.asp ================================================================= 6. C H A T - T A S T I C E V E N T S: We've got some enticing chat-events lined up so make sure you stop by the URL below to learn more about celebrity chat-interviews with the following people: Andrew Weinreich, president of sixdegrees, Allan Steinfeld, runner extrodinaire, Robin Gorman Newman, writer and singles expert and Georgia Durante, stuntwoman and biographer: http://www.sixdegrees.com/Chat/chat.cfm ================================================================= L O S T P A S S W O R D? If you can't remember your sixdegrees password, simply go to our password resend page and we'll be happy to send you a new one. http://www.sixdegrees.com/PasswordResend.cfm ================================================================= Q U E S T I O N S? Just e-mail our member services department at issues at sixdegrees.com for a prompt and courteous response or stop by the following URL and see if our FAQ can answer your questions. http://www.sixdegrees.com/Public/About/faq.cfm * Or visit the Help Desk room in chat every weekday between 1 and 5 pm EST and get your sixdegrees questions answered in real time. http://www.sixdegrees.com/Chat/chat.cfm ================================================================= T O U N S U B S C R I B E: If you'd rather not receive your "sixdegrees Member Update" which is published twice a month, but would still like to remain a sixdegrees member, just send a reply to this e-mail that reads only UNSUBSCRIBE in the subject line or stop by the URL below and log in with your e-mail address and password to unsubscribe directly at the site: http://www.sixdegrees.com/Services/profile/email.cfm From schneier at counterpane.com Mon Sep 21 01:30:36 1998 From: schneier at counterpane.com (Bruce Schneier) Date: Mon, 21 Sep 1998 16:30:36 +0800 Subject: ArcotSign (was Re: Does security depend on hardware?) In-Reply-To: <199809211030.FAA05159@mixer.visi.com> Message-ID: <199809212125.QAA25140@mixer.visi.com> At 01:32 PM 9/21/98 -0700, bram wrote: >On Mon, 21 Sep 1998, Bruce Schneier wrote: > >> Here's the basic idea: Strew a million passwords on your hard drive, and >> make it impossible to verify which is the correct one offline. So, someone >> who steals the password file off the client cannot run a cracking tool >> against the file. > >Is this really patentable? It sounds a *lot* like the original public-key >algorithm (the one involving lots of little 'puzzles') I am not an attorney, so I cannot advise on patentability. But note that I simplified the explanation A LOT in the above paragraph. Bruce ********************************************************************** Bruce Schneier, President, Counterpane Systems Phone: 612-823-1098 101 E Minnehaha Parkway, Minneapolis, MN 55419 Fax: 612-823-1590 Free crypto newsletter. See: http://www.counterpane.com From ravage at einstein.ssz.com Mon Sep 21 02:19:46 1998 From: ravage at einstein.ssz.com (Jim Choate) Date: Mon, 21 Sep 1998 17:19:46 +0800 Subject: This is a listed crime? (fwd) Message-ID: <199809212245.RAA18928@einstein.ssz.com> Forwarded message: > From: Matthew James Gering > Subject: RE: This is a listed crime? > Date: Mon, 21 Sep 1998 13:32:19 -0700 > Regarding the 5th amendment and other laws and precedence involving the > right to remain silent, the right against self-incrimination, etc, how > far could one carry that as an excuse to remain silent? As far as ones convictions and intestinal fortitude will take them. Simply tell them you won't answer any of their questions, you'd like to make your phone call *now*, and you want to see a judge *now*. ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From sbryan at vendorsystems.com Mon Sep 21 02:20:47 1998 From: sbryan at vendorsystems.com (Steve Bryan) Date: Mon, 21 Sep 1998 17:20:47 +0800 Subject: Clinton's fake apologies (fwd) In-Reply-To: <3.0.5.32.19980920152605.0086ba30@205.83.192.13> Message-ID: >Petro wrote: >> >> At 11:50 AM -0500 9/21/98, Michael Motyka wrote: >> >Starr's base approach to justice is the opening shot of what I hope >> >turns into an all-out scorched-earth battle. Let 'em all fall down. I'm >> >just afraid that when it's over the only people who will be willing to >> >run for public office will be truly dangerous people who have no respect >> >for liberty not of their own definition. >> >> Which is different from today how? >> >In spite of their shortcomings, many of today's politicians >in both parties seem to be fairly pragmatic, 'middle of the road' types. >If the only people who can pass muster under the emerging standards are >religous fundamentalists then we will have a Bill of Rights under attack >problem that is another order of magnitude greater than we have right >now. Scares me because while I'm pretty much a live and let live sort, >some of the fundamentalists I've known are not very tolerant. > >Mike I know it's a mistake to reply to this stuff but it would be nice for someone to maintain the context. Clinton was on trial for sexual harrassment. When giving testimony under oath he chose to lie in order to cover his own ass. I don't much care about the private lives of politicians but I do care how they behave in public places like courts of law. That is what he is trouble for, not for his filandering proclivities which were public known before he became president. Just to help the Clintonites understand: "It's about perjury, stupid!" Steve Bryan Vendorsystems International email: sbryan at vendorsystems.com icq: 5263678 pgp fingerprint: D758 183C 8B79 B28E 6D4C 2653 E476 82E6 DA7C 9AC5 From info at survey.com Mon Sep 21 02:37:02 1998 From: info at survey.com (info at survey.com) Date: Mon, 21 Sep 1998 17:37:02 +0800 Subject: CyberPoll Results - The Starr Report Message-ID: <199809211435.OAA02024@survey.survey.com> Thank you for participating in our recent CyberPoll about the Starr Report. The results are in! You can access them at http://www.cyberpoll.com/starrresults.html. Would you like to participate in our follow-up CyberPoll about the Clinton Tapes? If so, please go to http://www.cyberpoll.com/clintontapes.html. Thank you again for your participation. World Research, Inc. From rah at shipwright.com Mon Sep 21 02:44:44 1998 From: rah at shipwright.com (Robert Hettinga) Date: Mon, 21 Sep 1998 17:44:44 +0800 Subject: My favorite Clinton Quote from Today... Message-ID: "I'm trying to be honest with you, and it hurts me." :-). "I am not a crook."? Cheers, Bob Hettinga ----------------- Robert A. Hettinga Philodox Financial Technology Evangelism 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From rah at shipwright.com Mon Sep 21 02:45:15 1998 From: rah at shipwright.com (Robert Hettinga) Date: Mon, 21 Sep 1998 17:45:15 +0800 Subject: Alone In-Reply-To: <3.0.5.32.19980921164331.00855a10@telepath.com> Message-ID: Clinton: "...it depends on how you define 'alone'.". Alone enough to get a blowjob? Cheers, Bob Hettinga ----------------- Robert A. Hettinga Philodox Financial Technology Evangelism 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From ravage at einstein.ssz.com Mon Sep 21 02:53:19 1998 From: ravage at einstein.ssz.com (Jim Choate) Date: Mon, 21 Sep 1998 17:53:19 +0800 Subject: atheism (was: RE: Democracy... (fwd)) (fwd) Message-ID: <199809212320.SAA19200@einstein.ssz.com> Forwarded message: > From: Matthew James Gering > Subject: RE: atheism (was: RE: Democracy... (fwd)) (fwd) > Date: Mon, 21 Sep 1998 13:09:30 -0700 > Jim Choate wrote: > > As I've demonstrated before (and for the last time): > > > > ^(A) = (^A) > > f() = belief function > A = hypothesis > ^ = not > > f(^A) != ^f(A) Prove it. The f in your f() is redundant, but I can work with it. Simply stating it over and over isn't proof. We're doing Boolean Algebra here not Algebra, the rules for transitory functions are different. I'll even do you a favor and list the Boolean Laws and Theorems for you: 1) X+0=X X*1=X 2) X+1=1 X*0=0 3) X+X=X X*X=X 4) (X')'=X 5) X+X'=X X*X'=0 6) X+Y=Y+X X*Y=Y*X 7) (X+Y)+Z=X+(Y+Z) (XY)Z=X(YZ)=XYZ =X+Y+Z 8) X(Y+Z)=XY+XZ X+YZ=(X+Y)*(X+Z) 9) XY+XY'=X (X+Y)*(X+Y')=X 10) X+XY=X X(X+Y)=X 11) (X+Y')Y=XY XY'+Y=X+Y 12) (X+Y+Z+...)'=X'Y'Z'... (XYX...)'=X'+Y'+Z'+... 13) [f(X1, X2, X3,...,0,1,+,*)]'= f(X1', X2', X3',...,1,0,*,+) {The following two are called Duality Theorems, not important here} 14) (X+Y+Z+...)^D = XYZ... (XYZ...)^D=X+Y+Z+... 15) [f(X1, X2, X3, ...,0,1,+,*)]^D=f(X1, X2, X3,...,1,0,*,+) 16) XY+YZ+X'Z=XY+X'Z (X+Y)*(Y+Z)*(X'+Z)=(X+Y)*(X'+Z) 17) (X+Y)(X'+Z)=XZ+X'Y The ones you and your dualist-atheism buddies are confused on are #4, #12, & #13. By #4 we have: ^(X)=(^X) By #12 we have: ^(X)=^X By #13 we have: ^f(X) = f(^X) All are clearly contrary to your assertion. Balls in your court junior. ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From ravage at einstein.ssz.com Mon Sep 21 02:56:08 1998 From: ravage at einstein.ssz.com (Jim Choate) Date: Mon, 21 Sep 1998 17:56:08 +0800 Subject: Stego-empty hard drives... (fwd) Message-ID: <199809212323.SAA19241@einstein.ssz.com> Forwarded message: > Date: Mon, 21 Sep 1998 16:05:30 -0400 > From: Sunder > Subject: Re: Stego-empty hard drives... > What's this bullshit, eh? Just overwrite the BIOS roms in your machine to > return all zeros for the sectors you don't want to show them. Have some > special passphrase you have to type in while in the BIOS setup program to > deactivate this. Most newer notebooks have flash upgradeable ROMs anyway. What's this bullshit, eh? I wonder how you propose to answer the question: "Sir, exactly why are you typing that sentence into the computer at this time?" Now we have not only given them probably cause but clear evidence for a prior intent to commit a crime. Even if your hard drive is clean they're going to bust your ass. ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From ravage at einstein.ssz.com Mon Sep 21 02:58:25 1998 From: ravage at einstein.ssz.com (Jim Choate) Date: Mon, 21 Sep 1998 17:58:25 +0800 Subject: Alone (fwd) Message-ID: <199809212325.SAA19295@einstein.ssz.com> Forwarded message: > Date: Mon, 21 Sep 1998 18:38:16 -0400 > From: Robert Hettinga > Subject: Alone > > "...it depends on how you define 'alone'.". > > Alone enough to get a blowjob? > That depends Bob, can you bend over that far? ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From ravage at einstein.ssz.com Mon Sep 21 02:59:10 1998 From: ravage at einstein.ssz.com (Jim Choate) Date: Mon, 21 Sep 1998 17:59:10 +0800 Subject: Alone (fwd) Message-ID: <199809212326.SAA19342@einstein.ssz.com> Hi Bob, Sorry, nothing personal but with an opening like that I couldn't help myself. Please forgive me. Forwarded message: > From: Jim Choate > Subject: Alone (fwd) > Date: Mon, 21 Sep 1998 18:25:01 -0500 (CDT) > Forwarded message: > > > Date: Mon, 21 Sep 1998 18:38:16 -0400 > > From: Robert Hettinga > > Subject: Alone > > > > > "...it depends on how you define 'alone'.". > > > > Alone enough to get a blowjob? > > > > That depends Bob, can you bend over that far? > ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From ravage at einstein.ssz.com Mon Sep 21 03:03:44 1998 From: ravage at einstein.ssz.com (Jim Choate) Date: Mon, 21 Sep 1998 18:03:44 +0800 Subject: Clinton's fake apologies (fwd) Message-ID: <199809212328.SAA19426@einstein.ssz.com> Forwarded message: > Date: Mon, 21 Sep 1998 16:03:50 -0400 > From: Duncan Frissell > Subject: Re: Clinton's fake apologies (fwd) > and you don't want to do a Referral with insufficient proof. Notice that > even with proof of multiple felonies the Clintonistas say that they aren't > important felonies. Next time somebody gets busted for possession with intent they need to make reference to this case... "But ladies and gentlemen of the jury, as our President has claimed and clearly demonstrated by his remaining in office, for a person to be convicted on a felony it has to be an important felony. The defence has not proven that this felony has sufficient weight for prosecution. You have no choice but to aquit my client." ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From ravage at einstein.ssz.com Mon Sep 21 03:23:17 1998 From: ravage at einstein.ssz.com (Jim Choate) Date: Mon, 21 Sep 1998 18:23:17 +0800 Subject: atheism (was: RE: Democracy... (fwd)) (fwd) Message-ID: <199809212348.SAA19564@einstein.ssz.com> Forwarded message: > Date: Mon, 21 Sep 1998 15:18:28 +0000 (GMT) > From: attila > Subject: Re: atheism (was: RE: Democracy... (fwd)) (fwd) > father: so... you "deny" God's existence since their is no > "proof" of His existence. did you ever consider that in > order to "deny" anything, you must have defined that > concept? in other words, to deny God, you must have > determined that I or someone else has defined God in > order for you to be able to "deny" God? So, what has the issue of defining something got to do with its existance? Is this bozo really claiming that God can only exist unless somebody thinks him up? Sounds like religous hubris to me... God was shinning on this asshole that he never had to argue face to face with me at that age... > counselor: is there a difference between belief and faith? The spelling. > father: aethism is a concept which is almost impossible to > define as it is a denial that if it could it doesnt. > it is much easier to defend "agnosticism" where you > admit you do not believe, or have faith, because you > lack sufficient scientific proof. aethism is not > doubting, it is denying, even in the face of proof. Agnosticism has *nothing* to do with scientific proof. It existed eons before anyone even thought of the scientific method. Skepticism is a part of human nature, not philosophy, beliefs, or science. Atheism is saying that while God could exist he doesn't. In other words it is the belief that God doesn't exist and can't be proven contrary. There is a fundamental belief that all proofs are flawed. Agnosticism is the inability to believe one way or the other. It could be characterized by a total lack of faith in anything (assuming one doesn't want to argue about the meaning of 'total' and 'anything'). What keeps agnosticism appart from nearly all other beliefs is that it is really trying to answer two question and not one (Does God exist?), they are: 1. Does God exist? 2. Do I believe the proof in 1.? It is the embodyment of skeptiscism. The fact that most religions that accept 1. accept 2. as a given is why they are hubric. > suppose you die, and despite your lack of belief or > faith, you find yourself before the throne of God. My own personal suspicion is he's going to ask you whether you lived your beliefs even in the face of overwhelming opposition. As long as you say "Yes" he's going to be a happy camper. To borrow a Christian icon, he's going to want to know if you worshiped false idols. > they believe as truth, is futile. I will accept, without trying to > change, anyone's "religious" beliefs as their beliefs; I only ask > they extend the same tolerance to me. Ditto. Since this doesn't particular avenue has little more to be said I'm going to drop it. ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From edsmith at IntNet.net Mon Sep 21 03:40:36 1998 From: edsmith at IntNet.net (Edwin E. Smith) Date: Mon, 21 Sep 1998 18:40:36 +0800 Subject: [short] Updated quote from Allan Rock In-Reply-To: <199809211555.LAA10768@cti06.citenet.net> Message-ID: <3.0.2.32.19980921190749.00803ac0@mailhost.IntNet.net> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 I wonder if this fellow would allow that the protection of HIS life is "NOT a legitimate use for a firearm...". Edwin At 11:51 AM 9/21/98 -0400, you wrote: >This is the complete quote from Alan Rock, then justice minister who pushed >the gun control, registration and confiscation bill (C-68). > > >"I came to Ottawa with the firm belief that the only people in this >country who should have guns are police officers and soldiers." > >-- Allan Rock, Canada's Minister of Justice, quoted in _Maclean's_ > "Taking Aim on Guns", April 25, 1994, page 12. > > >"... protection of life is NOT a legitimate use for a firearm > in this country sir! Not! That is expressly ruled out!". > > Justice Minister Allan Rock > "Canadian justice issues, a town hall meeting" > Producer - Joanne Levy, > Shaw cable, Calgary (403) 250-2885 > Taped at the Triwood community centre in Calgary Dec.1994 > > > > >Jean-Francois Avon, B.Sc. Physics, Montreal, Canada > > JFA Technologies, R&D physicists & engineers > Instrumentation & control, LabView programming >PGP keys: http://bs.mit.edu:8001/pks-toplev.html >PGP ID:C58ADD0D:529645E8205A8A5E F87CC86FAEFEF891 >PGP ID:5B51964D:152ACCBCD4A481B0 254011193237822C > > > -----BEGIN PGP SIGNATURE----- Version: PGP for Personal Privacy 5.0 Charset: noconv iQA/AwUBNgbcREmNf6b56PAtEQK1HwCg8c13Fm/FwvER+tyF91TftxptnfsAn3cD LWRAAWlwA6853SWDAjNZgSbB =932g -----END PGP SIGNATURE----- From ravage at einstein.ssz.com Mon Sep 21 03:42:11 1998 From: ravage at einstein.ssz.com (Jim Choate) Date: Mon, 21 Sep 1998 18:42:11 +0800 Subject: [short] Updated quote from Allan Rock (fwd) Message-ID: <199809220010.TAA19732@einstein.ssz.com> Forwarded message: > Date: Mon, 21 Sep 1998 19:07:49 -0400 > From: "Edwin E. Smith" > Subject: Re: [short] Updated quote from Allan Rock > I wonder if this fellow would allow that the protection of HIS life > is "NOT a legitimate use for a firearm...". It is further clear the police don't carry them for their own protection either. Wonder why they do carry them?... ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From mah248 at is9.nyu.edu Mon Sep 21 04:40:39 1998 From: mah248 at is9.nyu.edu (Michael Hohensee) Date: Mon, 21 Sep 1998 19:40:39 +0800 Subject: Stego-empty hard drives... (fwd) In-Reply-To: <199809212323.SAA19241@einstein.ssz.com> Message-ID: <3606F34B.90429FA1@is9.nyu.edu> Jim Choate wrote: > > Forwarded message: > > > Date: Mon, 21 Sep 1998 16:05:30 -0400 > > From: Sunder > > Subject: Re: Stego-empty hard drives... > > > What's this bullshit, eh? Just overwrite the BIOS roms in your machine to > > return all zeros for the sectors you don't want to show them. Have some > > special passphrase you have to type in while in the BIOS setup program to > > deactivate this. Most newer notebooks have flash upgradeable ROMs anyway. > > What's this bullshit, eh? > > I wonder how you propose to answer the question: > > "Sir, exactly why are you typing that sentence into the computer at this > time?" > > Now we have not only given them probably cause but clear evidence for a > prior intent to commit a crime. Even if your hard drive is clean they're > going to bust your ass. > I believe that the idea was to set it up so that BIOS defaults to HD-hiding mode. When you're taking your laptop through customs, you do nothing while the machine boots up, the doctored BIOS does its thing, and everybody's happy. When you want to get at the stuff on the rest of the HD, you reboot and type in your passphrase. Presumably, one wouldn't do this in front of a customs official. :) From ekr at rtfm.com Mon Sep 21 04:41:03 1998 From: ekr at rtfm.com (EKR) Date: Mon, 21 Sep 1998 19:41:03 +0800 Subject: Questions for Magaziner? In-Reply-To: Message-ID: Tom Weinstein writes: > > Arnold G. Reinhold wrote: > > > > One question I'd like asked is whether the US Gov will approve 56-bit RC-4 > > for export on the same terms as 56-bit DES. That would allow export > > versions of web browsers to be upgraded painlessly, making international > > e-commerce 64 thousand times more secure than existing 40-bit browsers. > > (56-bit DES browsers would require every merchant to upgrade their SSL > > servers and introduce a lot of unneeded complexity.) > > Actually, it wouldn't be any easier to deploy 56-bit RC4 than DES. Either > would require roughly the same changes to both clients and servers. And from a protocol perspective, it would be worse, at least for SSL, since SSL doesn't have a 56 bit RC4 mode at all. -Ekr -- [Eric Rescorla ekr at rtfm.com] From ravage at einstein.ssz.com Mon Sep 21 04:48:08 1998 From: ravage at einstein.ssz.com (Jim Choate) Date: Mon, 21 Sep 1998 19:48:08 +0800 Subject: Stego-empty hard drives... (fwd) Message-ID: <199809220116.UAA20070@einstein.ssz.com> Forwarded message: > Date: Tue, 22 Sep 1998 00:46:03 +0000 > From: Michael Hohensee > Subject: Re: Stego-empty hard drives... (fwd) > I believe that the idea was to set it up so that BIOS defaults to > HD-hiding mode. How do you propose to do this? Via a BIOS setting? > When you're taking your laptop through customs, you do > nothing while the machine boots up, the doctored BIOS does its thing, > and everybody's happy. When you want to get at the stuff on the rest of > the HD, you reboot and type in your passphrase. How do you propose to prompt the user for the correct time to type? ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From doug at arcot.com Mon Sep 21 04:56:02 1998 From: doug at arcot.com (Douglas Hoover) Date: Mon, 21 Sep 1998 19:56:02 +0800 Subject: ArcotSign (was Re: Does security depend on hardware?) In-Reply-To: <199809211030.FAA05159@mixer.visi.com> Message-ID: <3606F570.FFFDDA3C@arcot.com> In response to the interest indicated by the discussion on coderpunks/cipherpunks mailing lists, we have put a technical note about the Arcot key container ("software smart card") on our site at: http://www.arcot.com/camo2.html We would appreciate your comments. This note doesn't tell everything about our method--we *are* developing a commercial product, after all--but we hope that it will suffice to show knowledgeable readers our main ideas and convince them that a software key container that provides protection similar to that of a smart card is in fact possible. I should remark that: - Arcot key protection does not depend on making client-side software complicated or on keeping the algorithms secret. It depends on making it hard for an attacker to tell when he has cracked it, by keeping information that the attacker might use to identify the private key out of his reach (such as the public key). - Consequently, there are significant restrictions on the situations in which Arcot key protection works. For example: - It isn't useful for encryption. - It isn't good for stranger-to-stranger authentication. - It is good for authenticating yourself to your bank, an online merchant with whom you have an account, or to your employer. - Like smartcards, it provides two-factor authentication--you need to have the key container and know the password in order to authenticate. Its key protection is slightly weaker because it is easier to steal (just copy) a card without the theft being noticed. - Of course, the crypto has to be done in software. If your application warrants that level of paranoia, then maybe you really should be using hardware--but are you sure that your smart card is really signing the document you think it is? Most commercial applications don't warrant this level of paranoia. And hardware costs money. Regards, Doug Hoover begin: vcard fn: Douglas Hoover n: Hoover;Douglas org: Arcot Systems adr: 2197 Bayshore Rd;;;Palo Alto;CA;94303;US email;internet: doug at arcot.com tel;work: 650 470-8203 tel;fax: 650 470-8208 x-mozilla-cpt: ;0 x-mozilla-html: TRUE version: 2.1 end: vcard From nobody at replay.com Mon Sep 21 05:05:35 1998 From: nobody at replay.com (Anonymous) Date: Mon, 21 Sep 1998 20:05:35 +0800 Subject: CHALLENGE? Toto/signature attack w. unpublished public key Message-ID: <199809220108.DAA07731@replay.com> This value is wrong: it has 3 bytes of 0's inserted and is therefore missing the last three bytes of the signature. s = 0x08F4D5CBC10063725B206F787EB7370BBD0C5B4854CE79A9007D1801AEAEE6E6 D2C68D7EDF877FECE1FA539D08BEC54BD152BA05113951E8A84CDECAD2CB8E7A C28BE916570BA7BB9C00C64DF57113C4AE81613BD351541523CD3A028FBF220E F7469BD4175302DCB5B6E886974877F28A2D301433AFFFE26081008BFF687B37 Here is the correct value, from the signed message. 08F4D5CBC10063725B206F787EB7370BBD0C5B4854CE79A97D1801AEAEE6E6D2 C68D7EDF877FECE1FA539D08BEC54BD152BA05113951E8A84CDECAD2CB8E7AC2 8BE916570BA7BB9CC64DF57113C4AE81613BD351541523CD3A028FBF220EF746 9BD4175302DCB5B6E886974877F28A2D301433AFFFE260818BFF687B37DE8167 From nobody at remailer.ch Mon Sep 21 06:08:56 1998 From: nobody at remailer.ch (Anonymous) Date: Mon, 21 Sep 1998 21:08:56 +0800 Subject: Stego-empty hard drives... (fwd) Message-ID: <19980922021542.29546.qmail@hades.rpini.com> On Mon, 21 Sep 1998, Jim Choate wrote: > > Forwarded message: > > > Date: Tue, 22 Sep 1998 00:46:03 +0000 > > From: Michael Hohensee > > Subject: Re: Stego-empty hard drives... (fwd) > > > I believe that the idea was to set it up so that BIOS defaults to > > HD-hiding mode. > > How do you propose to do this? Via a BIOS setting? By default. The machine boots. It is either told to accept a passphrase or is told nothing. If the latter, it boots normally, only with its HD-hiding code. If the former, it prompts, accepts a passphrase, and then boots normally, only with the HD-hiding code disabled. What I think you're asking is how the actual cryptography would be done. I wouldn't want to stick crypto code in the BIOS, or at least not the code which will be used all the time. I think a better way to do this is to have the BIOS boot up in HD-hiding mode all the time, and require user-mode software to disable HD-hiding mode and then deal with the cryptography. > > > When you're taking your laptop through customs, you do > > nothing while the machine boots up, the doctored BIOS does its thing, > > and everybody's happy. When you want to get at the stuff on the rest of > > the HD, you reboot and type in your passphrase. > > How do you propose to prompt the user for the correct time to type? You don't, at least not at first. If you hold down maybe the left and right shift keys, in combination with the left alt key while pressing the "R" key, it prompts "BIOS: ". You type your passphrase in. LILO (the LInux LOader) does this if you depress a shift key during boot. Obviously with LILO it's to specify kernel parameters, what OS to boot into, and things like that. From ravage at einstein.ssz.com Mon Sep 21 06:13:39 1998 From: ravage at einstein.ssz.com (Jim Choate) Date: Mon, 21 Sep 1998 21:13:39 +0800 Subject: Stego-empty hard drives... (fwd) Message-ID: <199809220241.VAA20426@einstein.ssz.com> Forwarded message: > Date: 22 Sep 1998 02:15:42 -0000 > From: Anonymous > Subject: Re: Stego-empty hard drives... (fwd) > > How do you propose to do this? Via a BIOS setting? > > By default. The machine boots. It is either told to accept a passphrase or > is told nothing. If the latter, it boots normally, only with its HD-hiding > code. If the former, it prompts, accepts a passphrase, and then boots > normally, only with the HD-hiding code disabled. Understood. > What I think you're asking is how the actual cryptography would be done. I That aspect is trivial from the mod-the-BIOS perspective, let's assume for a moment that the crypto is in the ROM-burner... Specificaly I am asking: Given a BIOS which has been modified to allow the end-user to select between encrypted and non-encrypted operation, how is the end-user supposed to make this selection? So far I've seen two suggestions: 1. The BIOS is only 'sensitive' at particular points in the POST. 2. The BIOS has a user-accessible selection via some method to activate their selection. Both are workable, I'm looking for a more specific description of the methods. In the case of 1., is the marker going to be particular windows which are bounded by particular messages printed to the boot console? In the case of 2. is it going to be a particular 'magic keystroke' that enables some hidden option screen? It seems to me that both have obvious methods of attack if the only goal is to demonstrate to a legal standard that such capability exists. ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From tcmay at got.net Mon Sep 21 06:53:19 1998 From: tcmay at got.net (Tim May) Date: Mon, 21 Sep 1998 21:53:19 +0800 Subject: Have a cigar In-Reply-To: <360683E5.26C6@lsil.com> Message-ID: At 1:03 PM -0700 9/21/98, Duncan Frissell wrote: > >Like Clinton, right? I certainly like to see the damage to the Presidency. > We also don't have to worry about any tobacco legislation for a few years. > Yep. Give the man a cigar. The paralysis of the U.S. government is heartwarming. No talk about sending troops to Kosovo, no plans to give the IMF more money to send to Russian and Wall Street mafiosos (mafiosi?), no talk of sending life preservers to the tens of millions of Bengalis drowning and sinking into the muck in Dacca, and not much of anything else. I love it. --Tim May (This space left blank pending determ. of acceptability to the gov't.) ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, ComSec 3DES: 831-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Licensed Ontologist | black markets, collapse of governments. From nobody at remailer.ch Mon Sep 21 07:01:48 1998 From: nobody at remailer.ch (Anonymous) Date: Mon, 21 Sep 1998 22:01:48 +0800 Subject: Stego-empty hard drives... (fwd) Message-ID: <19980922031101.30140.qmail@hades.rpini.com> On Mon, 21 Sep 1998, Jim Choate wrote: > Specificaly I am asking: > > Given a BIOS which has been modified to allow the end-user to select between > encrypted and non-encrypted operation, how is the end-user supposed to > make this selection? > > So far I've seen two suggestions: > > 1. The BIOS is only 'sensitive' at particular points in the POST. > > 2. The BIOS has a user-accessible selection via some method to > activate their selection. There's a third option, but it may be a bit more difficult (or not). I'm not really a hardware person, and it's probably obvious. 3. Use a "crypto-dongle" similar to what someone here (Mr. Geiger, I believe) has come up with. You plug it into the parallel port or somewhere else, and the encrypted data is useless once the dongle is removed. I would think that if we plugged this into the bus we could have the BIOS remap the IDE routines to some EPROM in that dongle. The cryptography could take place there too. If the spooks are on to you, you trash the dongle. This paradigm breaks down when we get into the operating system, though. Linux, for instance, apparently disposes of the BIOS and uses its own IDE driver. I assume that Windows 98 does the same thing. Linux is open source, so modifications could be made, but Windows would be harder. Can someone more knowledgeable comment on this hardware dongle idea as applied to this problem? From shamrock at netcom.com Mon Sep 21 07:49:04 1998 From: shamrock at netcom.com (Lucky Green) Date: Mon, 21 Sep 1998 22:49:04 +0800 Subject: ArcotSign (was Re: Does security depend on hardware?) In-Reply-To: <199809220131.SAA11293@shell7.ba.best.com> Message-ID: <001201bde5dc$6ed105c0$1330c4c2@cypherpunks.aec.at> Nick, I am somewhat puzzled by your response. Do you assert that a software based solution, executed on a general purpose CPU under a general purpose OS, can afford the same protection of whatever the secret in question may be as a hardware token, such as a smartcard? A hardware token lacking the very API to extract the secret through software based attacks? If so, could you please share with us the revolutionary breakthrough in computer science that negates the effect of decompilers and runtime debuggers on Arcot's software? Furthermore, how do you consolidate the claim on Arcot's website that "ArcotSignTM [...] offers [hardware solution] tamper resistance in software" with the statement by Arcot's very own cryptographic advisor, Bruce Schneier, that "Of course. It's less secure than hardware solutions". Perhaps I have worked in this industry for too long to fully adjust to the novel genius displayed in "virtual one-time pads", "virtual smartcards", and "virtual security". Thanks, --Lucky Green PGP 5.x encrypted email preferred > -----Original Message----- > From: owner-cryptography at c2.net [mailto:owner-cryptography at c2.net]On > Behalf Of Nick Szabo > Sent: Monday, September 21, 1998 18:31 > To: rdl at MIT.EDU; scott at loftesness.com > Cc: cryptography at c2.net; libtech at lists.best.com > Subject: Re: ArcotSign (was Re: Does security depend on hardware?) > > > > I have consulted at both DigiCash and Arcot. I am still > under nondisclosure to Arcot, so I can't answer any > questions about this that go beyond the publicly available > information. Arcot has recently made available on their public > web site "Software Smart Cards via Cryptographc Camouflage", at > http://www.arcot.com/camo2.html. At the end of > this paper is referenced Rivest's "Chaffing and Winnowing" > paper. These give a good overview of how such a technology > can work, and the scope of its application. > > > Nick Szabo > szabo at best.com > http://www.best.com/~szabo/ > From jvb at ssds.com Mon Sep 21 07:55:08 1998 From: jvb at ssds.com (Jim Burnes) Date: Mon, 21 Sep 1998 22:55:08 +0800 Subject: Clinton's fake apologies (fwd) In-Reply-To: <360683E5.26C6@lsil.com> Message-ID: On Mon, 21 Sep 1998, Michael Motyka wrote: > Reeza! wrote: > > In case you hadn't noticed, the investigation of him, vis-a-vis the rules > > established by other demicans, his supposed compatriates, is still ongoing. > > > > Methinks this is just the tip of the iceberg, a bone for the populace to > > chew on so that when the rest of the story breaks, we (the dog) won't > > notice the prime rib and sirloin. > > > Completely illogical. Give me one good reason not to lead with your best > punch? I suspect Starr's work is voluminous but weak on all other counts > so he led with what would create the most publicity. I've said that I'm > no great fan of Clinton's but this entire investigation is blatantly > partisan and has brought the political process in this country about as > low as it is possible to bring it. > Actually he was directed to present evidence of impeachable offenses as soon as he found them. Well he thinks he has found some and I might concurr on a few. Blatantly partisan impeachment hearings? Say it aint so, Joe! If you think the political process has never been lower then you need to recheck the history of the last several years. How about Democrats and Republicans joining hand in hand to cheer on the baby burning BATF in Waco? Is your religion ATF approved? How about murdering innocent mothers while they are holding their babies in their arms? A scene worthy of Hollywood depictions of WWII era Nazi's. Sure, Weaver got his money, but was anyone punished? Will the money bring back his family? These cowards in Congress didn't have the balls to punish these murderers then and they certainly don't seem to have changed their tune. When someone else had the cajones to try one of these bastards on the soft charge of manslaughter the feds showed their true colors and usurped jurisdiction and found them innocent under color of law... I seem to remember something about that by Tom Jefferson in the Declaration of Independence: "...For quatering large bodies of troops among us: For protecting them, by a mock trial, from punishment for any murders which they should commit on the inhabitants of these States" That pretty much clinches it. Yes, the political process has been lower. Unpunished baby burners, free roaming mother murderers. All performed by the Hostage Rescue Team with loving grace. Love is Hate. Peace is War. I love Big Brother. I realize that now. jb From billxxxjbt at itt.net Mon Sep 21 23:00:51 1998 From: billxxxjbt at itt.net (billxxxjbt at itt.net) Date: Mon, 21 Sep 1998 23:00:51 -0700 (PDT) Subject: IN The News Message-ID: <199702170025.GAA08056@carolina.net> Dear Frend, If you received this message in error, please accept my apologies. This is the letter you've been reading about in the news lately. Due to the popularity of this letter on the internet, a major nightly news program recently devoted an entire show to the investigation of the program described below to see if it really can make people money. If you saw it, you know that their conclusion was that, while most people did not make the $50,000 discussed in the plan, most people were able to double and triple their money at the very least, in a short amount of time. The show also investigated whether or not the program was legal. Their findings proved once and for all that there are absolutely no laws prohibiting the participation in the program. This has helped to show people that this is a simple, harmless and fun way to make some extra money at home. This is for real. The result of this show has been truly remarkable. So many people are participating that those involved are doing much better than ever before. Since everyone makes more as more people try it out, its been very exciting to be a part of lately. You will understand once you experience it. You may have thought this is a chain letter or a pyramid scheme (it's not). You may have thought this is illegal (it's not). You may have just decided its not worth your time (it is). Whatever the reason you decided not to try it in the past, I ask you to reconsider. After reading the simple instructions below, you will be ready to start. I think that once you begin to see your first orders in the mail, you will be surprised to learn just how many people are participating in this program. I have been involved in the program for a long time but I have never seen so many people trying this out as I have recently. This is good news because the more people that do it, the more everyone benefits. If you ever thought of giving this a shot, now's the time to do it. There's very little to lose, but alot to gain. Besides making alittle extra cash each week, its fun to wonder how much money will be in your mailbox each day. I wish all of you could know the feeling I get each day after work as I go to my p.o. box. Its exhilerating! Just read over the letter below. It will make starting a breeze. Hope to hear from you soon. --------------------------------------------------- ---------------------------------------------------------------------------- --------------------------- My advice to you is that you save this letter (or print it) for a time. The idea is very simple, but it definitely takes a few times reading it over before it sinks in. I am confident that if you read over this letter briefly once now, and once again whenever you get the chance, you will begin to see the potential involved. Most people do not respond to this letter immediately. Take as much time as you need to let the idea fly around in your head alittle. This is not a pyramid scheme. Many people equate this program with illegal schemes that involve nothing but the transferring of cash. The difference between a legitimate multi-level marketing program and a pyramid scheme is that in a pyramid, there is no money being exchanged for a legitimate product. The law states this clearly. Anyone who claims this program is illegal is misinformed in the area of retail law. In this program, the product is a financial report that you can simply e-mail to someone after they order it from you and send cash to you through the mail. While the report can be sent easily to yout customers with the click of one button through e-mail, it is nonetheless a legitamate product which people choose to send you $5.00 to purchase from you. The other legal issue that most people ask about in programs such as this one is the issue of tax legality. The law is clear that all income must be reported to the government each year. When customers send you cash, it is your responsibility to keep track of how much you are making and report this at the end of the year. Following is a simple explanation of the system and simple instructions for you to follow to get started right away: 1) you save this letter onto your computer in case you need it later 2) you send $5.00 to each of the 4 people listed below to order a report 3) each of those 4 people will e-mail you 1 report immediately 4) you save these 4 reports onto your computer 5) you go back to this original letter and move everyone's name down 1 level, removing the person in the 4th position and putting your name and address in the 1st position 6) you have this newly altered letter e-mailed to tens of thousands of people (usually people pay a bulk e-mailer to do this for them to start) 7) when people receive this letter you sent them, they will see your name and address as the 1st report slot and will send you a $5.00 order for it 8) when people order these reports, from you, you immediately e-mail it to them (they will give you their e-mail address along with their $5.00) Thats it folks......its that simple......the $5 is yours! You e-mail them the report by "copying" it out of the saved e-mail report you received from the person on the list in this letter, and "pasting" it into a new e-mail letter and sending it off....no problem. After you get the hang of it, you can copy many letters into new e-mails very fast and send off many orders quickly. The reason it works is that everyone involved has an incentive to help everyone else succeed. The people you order the reports from will e-mail the reports to you immediately because they will profit when you profit. Each of the 4 people you order from also will be eager to answer any questions you may have and help you in any way they can so that you can start mailing copies of this letter out with their names on it along with yours. I mentioned above that success in this system can be guaranteed based on simple statistical facts. When you send out tens of thousands of advertisements (or pay someone to mail them out for you), you can be absolutely positively assured that a certain percentage will respond and send you $5.00 for the report. The next fact is that the larger the mailing you have sent out, the more responses you will get. Please understand this about this program: It only takes an extremely small percentage of people to respond to your ad in order for you to make a profit. This is because your advertisement (with your address or P.O. box on it) will be sent to such incredibly large amounts of people. (A bulk e-mailer can send your letter out to thousands of people per hour.) OVERVIEW OF OUR ELECTRONIC MULTI-LEVEL MARKETING PROGRAM: Basically, this is what we do: We sell thousands of people a product for $5.00 that costs us next to nothing to produce and e-mail. As with all multi-level businesses, we build our business by recruiting new partners and selling our products. Every state in the U.S. allows you to recruit new multi- level business online (with your computer). Look at multi-million companies such as New Vision (a vitamin supplier). We use the exact same method of multi-level selling they use. The only difference is that our product is a financial report you can easily e-mail to someone, rather than costly vitamins. The product in this program is a series of four businesses and financial reports. Each $5.00 order you receive by regular mail will include the e-mail address of the sender. To fill each order, you simply e-mail the product to the buyer. THAT'S IT!...the $5.00 is yours! It really is THAT simple! Think about it.......... FOLLOW THE INSTRUCTIONS EXACTLY The profits are worth it. So go for it. Remember the 4 points and we'll see you at the top. ******* I N S T R U C T I O N S ******* This is what you must do: 1................ Save this letter onto your computer 2................ Order all 4 reports listed and numbered from the list below. (For each report send $5.00 and your e-mail address on a piece of paper to each person listed. When you order, make sure you print your e-mail address clearly, and also be sure to request each SPECIFIC report. You will need all four reports, because you will be saving them onto your computer and reselling them.) (You will receive the reports a few days later by e-mail. Save them onto your computer) 3................ Now you have 4 financial reports saved on your computer. These are legitimate products that people will want to buy. You are ready to start advertising your product to tens of thousands of potential customers. 4................ Take this letter and move everyone's name and address down 1 position. The person in the 4th position gets erased. Put your own name (make up a company name) and address (could be a home or PO box) in position 1. At this point you have 2 options. If you decide you want to advertise yourself, you need to obtain mailing lists and send this newly altered letter to as many people as you can to get people to order the report from you for $5. This method can be time consuming and costly. The second option is to pay a bulk e-mailer to mail out your letter for you. They can send out your letter to tens of thousands of people for a fraction of the cost of the above method. This is the method we recommend and is by far the simplest and cheapest way to go. When you use a bulk e-mailer, all you need to do is give them a copy of the original letter with the address you want your $5 orders to go to and they will do the rest. If you are able to find a bulk e-mailer who is already involved with the program, they won't even need the original letter since they will already have it. There are many bulk e-mailers out there who will send out your letter for you. You can find them by doing a search of the word "bulk e-mailer" on the internet. There are many excellent companies out there who will mail for you, but you still must be a little wary. We have found that some companies don't send them out in a productive manner (w/out using fresh addresses or attaching other messages to yours) and since there is no sure way to know exactly their methods, you're left wondering. The best of all scenarios is to have someone who is also involved in this program mail out your letters for you. There are many private bulk e-mailers out there who send out this very letter with their names on the list because they know the potential involved. There is a good chance that one of the people you will be ordering your report from will be able to bulk e-mail out your letter for you. When you order the report from the people on the list in this letter, they will e-mail you a report---if they bulk e-mail, they will probably include an offer to send your letters out for you. There is a simple reason why it is best to have someone involved in the program bulk e-mail out your letters for you. As mentioned before, it is difficult to verify that a company is sending out your letter in the most profitable way. If the person sending out the letter is also involved in the program, they will understand the program and, best of all, they will do everything possible to see you get as many responses as possible because when you profit they will profit as well since they are on the list as well. This gives the person an incentive to take great care in sending out your mail since they have alot to gain from it as well as you. Other bulk e-mailing companies will not have this same incentive. ALWAYS PROVIDE SAME-DAY SERVICE ON ALL ORDERS!!! ---------------------------------------------------------------------------- ---------------------------------------------------------------------------- -- REQUIRED REPORTS ***Order each REPORT by NUMBER and NAME*** Following is the list of people you will send $5 to: (Remember to include your e-mail address on the paper concealing the 5 dollars) When they e-mail the report to you, save them onto your computer. ---------------------------------------------------------------------------- ---------------------------------------------------------------------------- REPORT #1 "HOW TO MAKE $250,000 THROUGH MULTI-LEVEL SALES" ORDER REPORT #1 FROM: RB Enterprises P.O.Box 2341 Falls Church VA 22042 ---------------------------------------------------------------------------- ---------------------------------------------------------------------------- -- REPORT #2 "MAJOR CORPORATIONS AND MULTI-LEVEL SALES" ORDER REPORT #2 FROM: API P.O.Box 44275 Eden Praire.MN 55344 ---------------------------------------------------------------------------- ---------------------------------------------------------------------------- -- REPORT #3 "SOURCES FOR THE BEST MAILING LISTS" ORDER REPORT #3 FROM: PCC P.O.Box 3535 Margate, NJ 08402 ---------------------------------------------------------------------------- --- REPORT #4 "Multi Level Marketing Intelligence Report" ORDER REPORT #4 From: AlaLink P.O. Box 311907 Enterprise AL 36331-1907 ---------------------------------------------------------------------------- ---------------------------------------------------------------------------- -- Here's the fun part: Take a look at what is called the "multiplier effect" in marketing: Let's say you decide to start small just to see how it goes. Assume you advertise your letter until 10 people respond and send you $5.00. Also assume that those 10 people also advertise until they get 10 people to order and send them $5.00. Assume this continues for everyone in your downline and observe the following results: * 10 people order report #1 from you and send you $5.00 5 * 10 = $50 * each of those 10 people advertise until 10 people order report #1 from them (since their mailing will have your name as #2, 100 people will also send you $5 each to order report #2) 5 * 100= $500 * each of those 500 people advertise until 10 people order report #1 from them (1000 people order report #3 from you and send you $5) 5 * 1000= $5,000 * each of those 1000 people advertise until 10 people order report #1 from them (10,000 people order report #4 from you and send you $5) 5 * 10,000= $50,000 $50,000 + $5,000 + $500 + $50 Total = $55,550 A bulk e-mailer can send your letter out to thousands of people in one night. The above scenario holds true if only 10 people out of those thousands respond. This program is a study in statistics. A certain percentage WILL respond and send you $5. There is no guarante that you will make $50,000 each time, but its nice just to have some help with the rent or to have a few bills taken care of each month. This program is fun to be a part of. We hope to hear from you soon!" From Postmaster at Iguanodon.big-orange.net Mon Sep 21 23:03:54 1998 From: Postmaster at Iguanodon.big-orange.net (Mail Administrator) Date: Mon, 21 Sep 1998 23:03:54 -0700 (PDT) Subject: Mail System Error - Returned Mail Message-ID: <19980922060250.AAB28281@Iguanodon.big-orange.net> This Message was undeliverable due to the following reason: The following destination addresses were unknown (please check the addresses and re-mail the message): SMTP Please reply to Postmaster at Iguanodon.big-orange.net if you feel this message to be in error. Reporting-MTA: dns; Iguanodon.big-orange.net Received-From-MTA: dns; [165.87.194.252] [165.87.194.252] Arrival-Date: Tue, 22 Sep 1998 08:02:49 +0200 To: rinus at nox.nl Subject: zonnebril From: Lefty Cyberslasher Date: Tue, 22 Sep 1998 11:00:45 +0500 hobbies=Hobbies are Star Trek, computers and surfing the internet. age=35 years old adres=Irfan Mansoor Ali 110 Hasanabad Block "e" North Nazimabad Karachi 74700 Pakistan react=Dont u give away free Oil of Olayz? :)Take Care and Send me my glasses fast From lazlototh at hempseed.com Mon Sep 21 08:12:36 1998 From: lazlototh at hempseed.com (Lazlo Toth) Date: Mon, 21 Sep 1998 23:12:36 +0800 Subject: Stego-empty hard drives... (fwd) In-Reply-To: <199809220116.UAA20070@einstein.ssz.com> Message-ID: On or about 8:16 PM -0500 9/21/98, Jim Choate wrote: >Forwarded message: > >> Date: Tue, 22 Sep 1998 00:46:03 +0000 >> From: Michael Hohensee >> Subject: Re: Stego-empty hard drives... (fwd) > >> I believe that the idea was to set it up so that BIOS defaults to >> HD-hiding mode. > >How do you propose to do this? Via a BIOS setting? Yes. >> When you're taking your laptop through customs, you do >> nothing while the machine boots up, the doctored BIOS does its thing, >> and everybody's happy. When you want to get at the stuff on the rest of >> the HD, you reboot and type in your passphrase. > >How do you propose to prompt the user for the correct time to type? Pressing an obscure key combination during bootup to trigger the password prompt should do the trick. -Lazlo From lazlototh at hempseed.com Mon Sep 21 08:12:37 1998 From: lazlototh at hempseed.com (Lazlo Toth) Date: Mon, 21 Sep 1998 23:12:37 +0800 Subject: Suit Claims Web Linking a Violation Message-ID: Mr. Bernstein's own site (http://www.garybernstein.com/) has, as far as I can tell, absolutely no external links. I don't know whether this is a recent modification in order not to undermine his case or it simply reflects Mr. Bernstein's view of how the web should be. It's hard to imagine him winning the case. (God help him if he does; that's a lot of angry netizens.) >From ABC News: >http://www.abcnews.com/sections/tech/DailyNews/websuit980921.html > > San Francisco Examiner > Scripps Howard News Service > > Copyright in Online Mediium > Suit Claims Web Linking a Violation > Sept. 21 > In a lawsuit that experts say threatens the freewheeling nature of the >World Wide Web, a photographer claims JC Penney Inc. should be held liable >because its Web site was one of three "links" that ultimately led to an >unauthorized display of his photo of movie star Elizabeth Taylor. > Celebrity photographer Gary Bernstein's complaint contends the >department store, which advertises Taylor's "Passion" perfume on its Web >site, violated his copyright even though its own site did not show his >photograph. > The suit appears to be the first to claim a copyright violation >resulted from multiple linking, the main way of moving about the World Wide >Web. A hearing on whether the suit should proceed past the initial phase is >set for today before U.S. District Judge Manuel Real in Los Angeles. >.... > According to the suit, JC Penney and Elizabeth Arden Co., the maker of >Passion, in November1997 promoted the perfume with an online chat on >America Online with Taylor, the perfume's spokeswoman. > Permission Not Granted > The chat site was linked to an Elizabeth Taylor Passion perfume page >at a separate Web site run by JC Penney. On this page, viewers could click >on a biography link that took them to another Web site run by Internet >Movie Database Ltd., which featured information on the movie star. > Once there, they could click on another link that took them to a Web >site run by the Swedish University Network, which included two photos of >Taylor that had been taken by Bernstein. One-the "Pink Lady"-showed Taylor >in a pink outfit. Another-"the lavender image"-showed her in a floral print >dress. > Bernstein filed suit in April, claiming that he licensed the Pink Lady >to Elizabeth Arden Co. to promote the perfume for a limited period that >expired several years ago. The lavender image appeared on the cover of a >photography magazine in 1986 and also was copyrighted, he said. > The suit said JC Penney, Arden and Internet Movie Database all >violated Bernstein's copyright because-through the links-they reproduced or >distributed the images on the Internet without his permission. > Weed Out Infringing Material > Moreover, anyone in the United States who found the photos through JC >Penney's Web site and downloaded them also infringed on the copyright, it >said. >.... >Copyright 1998 Scripps Howard News Service. All rights reserved. This >material may not be published, broadcast, rewritten, or redistributed." > >Entire article at: >http://www.abcnews.com/sections/tech/DailyNews/websuit980921.html From Postmaster at Iguanodon.big-orange.net Mon Sep 21 23:12:38 1998 From: Postmaster at Iguanodon.big-orange.net (Mail Administrator) Date: Mon, 21 Sep 1998 23:12:38 -0700 (PDT) Subject: Mail System Error - Returned Mail Message-ID: <19980922061153.AAB28454@Iguanodon.big-orange.net> This Message was undeliverable due to the following reason: The following destination addresses were unknown (please check the addresses and re-mail the message): SMTP Please reply to Postmaster at Iguanodon.big-orange.net if you feel this message to be in error. Reporting-MTA: dns; Iguanodon.big-orange.net Received-From-MTA: dns; [165.87.194.252] [165.87.194.252] Arrival-Date: Tue, 22 Sep 1998 08:11:50 +0200 To: rinus at nox.nl Subject: zonnebril From: Lefty Cyberslasher Date: Tue, 22 Sep 1998 11:10:03 +0500 hobbies=Hobbies are Star Trek, computers and surfing the internet. age=35 years old adres=Irfan Mansoor Ali 110 Hasanabad Block "e" North Nazimabad Karachi 74700 Pakistan react=Dont u give away free Oil of Olayz? :)Take Care and Send me my glasses fast From kurtbuff at halcyon.com Mon Sep 21 08:13:15 1998 From: kurtbuff at halcyon.com (Kurt Buff) Date: Mon, 21 Sep 1998 23:13:15 +0800 Subject: atheism (was: RE: Democracy... (fwd)) (fwd) In-Reply-To: Message-ID: <000201bde5dd$7af6f520$1b01010a@boar.minuteman.org> Kropotkin said, long ago, something on the order of: "If there were a God, we should assasinate him." That is what I would call a strong atheist statement. I (as a militant atheist) merely say that if you can define your God, I can probably prove he doesn't exist. Unless, of course, your definition is so broad as to have no meaning in the first place. | -----BEGIN PGP SIGNED MESSAGE----- | Hash: SHA1 | | On Sun, 20 Sep 1998, Jim Choate wrote: | | >Forwarded message: | > | >> From: pjm at spe.com | >> Date: Sun, 20 Sep 1998 20:13:38 +0200 | >> Subject: atheism (was: RE: Democracy... (fwd)) (fwd) | >> | [snip] | | >No, atheism is the statement that "God could exist, but | doesn't". Whether | >one chooses to hang 'Bhuddism' or 'Wiccan' on is irrelevant. | We aren't | >discussion labels but rather characteristics. Fundamentaly | *ALL* atheism | >states: | > | >While it could happen that way, I don't believe it does. | > | >Which is identical in meaning to: | > | >While it could happen that way, I believe it doesn't. | > | >> Getting back to the strong v. weak distinction, the | weak atheist | >> position that one "does not believe god(s) exist" does not | constitute | >> a belief, a set of beliefs, or a personal philosophy, let alone a | >> religion. The strong atheist position that one "believes god(s) do | >> not exist" is actually making a knowledge claim and so | does constitute | >> a belief. | > | >Try to sell that spin-doctor bullshit to somebody else, and | read a book on | >basic logic. | > | agreed, the strong v. weak atheist argument is _impossible_. | | however, an interesting premise I posited to my 14 year old son | who had gone through his scientific awareness state and | consequently declared himself an "aethist". at the time he was in | a boarding school and we were in conversation with the chief | counselor who happened to be a member of an LDS bishopric: | | kid: yes, an aethist. | | father: so... you "deny" God's existence since their is no | "proof" of His existence. did you | ever consider that in | order to "deny" anything, you must | have defined that | concept? in other words, to deny | God, you must have | determined that I or someone else has | defined God in | order for you to be able to "deny" God? | ... | counselor: is there a difference between belief and faith? | | ... | father: aethism is a concept which is almost impossible to | define as it is a denial that if it | could it doesnt. | it is much easier to defend | "agnosticism" where you | admit you do not believe, or have | faith, because you | lack sufficient scientific proof. | aethism is not | doubting, it is denying, even in the face of proof. | | consider this in terms of both belief | and faith: | | suppose you die, and despite your lack of belief or | faith, you find yourself before the throne of God. | | as your awareness returns, you look up and the image | of God is the image of an orangutan --now what are | you going to do? | | without missing a heartbeat: | | counselor: I think you better get down on your knees and pray! | | I seriously thought I would face an LDS disciplinary council for | that spontaneous off-the-wall comment. I didn't, but I have rocked | more than a few boats. and, it does point out the extent to which | belief is based on faith. to the literalists who point to Genesis | and "God created man in his own image" I always suggest that God | in the process could have refined homo sapiens over the years and | the original creation may have been significantly more endowed | with hair; secondly, God can appear to man in any form He chooses: | the burning bush, the blinding light to Saul, etc. | | however, stating beliefs and disbeliefs is fine; trying | to convince | another whose beliefs or disbeliefs are securely anchored | in whatever | they believe as truth, is futile. I will accept, without trying to | change, anyone's "religious" beliefs as their beliefs; I only ask | they extend the same tolerance to me. | | attila out... | | > | [snip] | | -----BEGIN PGP SIGNATURE----- | Version: PGPfreeware 5.0i for non-commercial use | Comment: No safety this side of the grave. Never was; never will be. | Charset: noconv | | iQA/AwUBNgZuCj7vNMDa3ztrEQLR7gCg7cqx1bA29pe+fBCb7DcyPundpGsAn39U | hhEHvCh4fgriwDbOO/QbTdn3 | =gsVI | -----END PGP SIGNATURE----- | From ravage at einstein.ssz.com Mon Sep 21 08:38:01 1998 From: ravage at einstein.ssz.com (Jim Choate) Date: Mon, 21 Sep 1998 23:38:01 +0800 Subject: atheism (was: RE: Democracy... (fwd)) (fwd) Message-ID: <199809220506.AAA00515@einstein.ssz.com> Forwarded message: > From: "Kurt Buff" > Subject: RE: atheism (was: RE: Democracy... (fwd)) (fwd) > Date: Mon, 21 Sep 1998 21:00:03 -0700 > I (as a militant atheist) merely say that if you can define your God, I can > probably prove he doesn't exist. Unless, of course, your definition is so > broad as to have no meaning in the first place. Ok, I'll take you up on it. Pantheism - the belief that everything is divine, that God is not seperate but totaly identified with the cosmos, and that God does not possess personality or transcendence. ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From ravage at einstein.ssz.com Mon Sep 21 08:49:08 1998 From: ravage at einstein.ssz.com (Jim Choate) Date: Mon, 21 Sep 1998 23:49:08 +0800 Subject: Stego-empty hard drives... (fwd) Message-ID: <199809220517.AAA00628@einstein.ssz.com> Forwarded message: > Date: Mon, 21 Sep 1998 23:37:06 -0400 > From: Lazlo Toth > Subject: Re: Stego-empty hard drives... (fwd) > >How do you propose to prompt the user for the correct time to type? > > Pressing an obscure key combination during bootup to trigger the password > prompt should do the trick. And just exactly how do you propose to spread this technology commercialy without alerting at least some members of the constabulary of its existance? Now if we are looking for a spin-loop in a POST that isn't there in a normal BIOS then I would say simply use sig-analysis on the machine during POST. You've got two options on labeling the BIOS. Either pick a ID that isn't a legitimate BIOS id or else scam a legitimate version number. In either case the police will have listings of the legitimate BIOS versions from the maker. The actual sig-analysis could probably be done with a standard AM radio as a technology demonstration. Since a spin-loop in the POST is going to sound much more consistent than the memory checks and hardware inits that take place. Now on a commercial basis what I'd do is get the BIOS manufacturers to sell me a copy of each of their legitimate BIOS'es and then create a library of signal envelopes (similar to the library of ship sounds subs carry) and it would be a trivial feat to build a detector that does a diff on the signal. If it doesn't match they yank you out of line and ask you some tough questions while a guy with some hardware savy, a BIOS listing, and a logic analyzer builds a case against you. No, I suspect you'll pull this off a few times and then they'll catch on, assuming the NSA or DIA doesn't give them a jump start. My guess is they already know how to do this sort of stuff and considering the budget being spent on neutron scanners, gas sniffers, etc. the lifetime for this technology won't be very long. ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From ravage at einstein.ssz.com Mon Sep 21 08:55:02 1998 From: ravage at einstein.ssz.com (Jim Choate) Date: Mon, 21 Sep 1998 23:55:02 +0800 Subject: Stego-empty hard drives... (fwd) Message-ID: <199809220523.AAA00693@einstein.ssz.com> Forwarded message: > Date: 22 Sep 1998 03:11:01 -0000 > From: Anonymous > Subject: Re: Stego-empty hard drives... (fwd) > There's a third option, but it may be a bit more difficult (or not). I'm > not really a hardware person, and it's probably obvious. > > 3. Use a "crypto-dongle" similar to what someone here (Mr. Geiger, I > believe) has come up with. You plug it into the parallel port or > somewhere else, and the encrypted data is useless once the dongle > is removed. I would think that if we plugged this into the bus we > could have the BIOS remap the IDE routines to some EPROM in that > dongle. The cryptography could take place there too. If the spooks > are on to you, you trash the dongle. So you're proposal is not only to put the crypto in the BIOS but a set of hardware device drivers to drive this port during boot but won't interfere with regular OS device drivers? > This paradigm breaks down when we get into the operating system, though. > Linux, for instance, apparently disposes of the BIOS and uses its own IDE > driver. I assume that Windows 98 does the same thing. Linux is open > source, so modifications could be made, but Windows would be harder. That was an additional issue that I was going to bring up. I suspect that in both cases it would be feasible to do, though you'd need to use a special driver in Linux type OS'es to shadow the BIOS driver back into the memory map. The real issue with me about this whole scheme is the distribution mechanism. It is just too shakey and porous not to allow LEA's to know about it. If they can get a copy themselves then they have a perfect mechanism to build a virus-scanner style of program to look for the appropriate footprint. ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From moulton at moulton.com Mon Sep 21 09:12:15 1998 From: moulton at moulton.com (Fred C. Moulton) Date: Tue, 22 Sep 1998 00:12:15 +0800 Subject: atheism (was: RE: Democracy... (fwd)) (fwd) Message-ID: <2.2.32.19980922051555.00e2e634@shell7.ba.best.com> In a recent message Jim Choate wrote: >However, yourself, pjm, & Mr. Smith are claiming that a belief that >something doesn't exist isn't a belief is simply a tricky play on semantics. >A belief in a negative is still a belief irrespective of how many people >believe it. Might doesn't make right (or logical). Mr. Choate please spend as much time working on reading comprehension as you do on logic. If you read my message you will see that I have not stated my view on the proper definition of atheism, I have not aligned myself with pjm or George Smith nor have I aligned myself against them. I did provide two quotations from scholarly sources that used definitions similar to that provided by pjm. I also provided a quotation that there several definitions of the term in usage and the various definitions each have their supporters and their opponents. My point was the definition I quoted are well established in the scholarly literature and demonstrate that pjm was not trying to introduce some new and unusual definition into the discussion. Also based on the portion of your message I quote above, it appears that you might have misunderstood the quotation I included from Mr. Smith's book. I am sorry that both space and copyright issues do not allow the entire book to be sent to you, but I do suggest that you read the entire discussion in the book if you are having difficulty with the short passage quoted previously. Regards Fred From gbroiles at netbox.com Mon Sep 21 09:35:25 1998 From: gbroiles at netbox.com (Greg Broiles) Date: Tue, 22 Sep 1998 00:35:25 +0800 Subject: ArcotSign (was Re: Does security depend on hardware?) In-Reply-To: <199809220131.SAA11293@shell7.ba.best.com> Message-ID: On Mon, 21 Sep 1998, Nick Szabo wrote: > I have consulted at both DigiCash and Arcot. I am still > under nondisclosure to Arcot, so I can't answer any > questions about this that go beyond the publicly available > information. Arcot has recently made available on their public > web site "Software Smart Cards via Cryptographc Camouflage", at > http://www.arcot.com/camo2.html. At the end of > this paper is referenced Rivest's "Chaffing and Winnowing" > paper. These give a good overview of how such a technology > can work, and the scope of its application. I'm certainly not a cryptographer, but I'm somewhat at a loss in trying to understand the purpose of using public-key (or asymmetric key) cryptography within a policy/technology system which won't allow the use of the strengths of asymmetric key crypto. As I understand the paper you reference above, to implement this system the public key must be kept confidential, and signed documents must also be kept confidential, or the system of the security as a whole is at risk. With those constraints, why bother with the overhead (computationally/technically/legally) of asymmetric key crypto at all? It seems like much of the security in the system described above comes from the server/other party's ability to thwart brute-force attacks by detecting and responding to multiple failed attempts at authentication; that seems like a very good thing, but not really a strength or a weakness of the protocol itself, but an additional practice/protocol which is useful in many contexts. Is it really necessary/useful to call the scheme "software smart cards"? If it were called "An improved system for user authentication", I don't think it would make people nearly so suspicious. From my perspective, one of the advantages of smart card technology is that I can carry my authentication material with me; a system which puts it on my hard disk is less attractive. Floppies are portable, but not durable. I didn't understand the relationship between this scheme and Rivest's chaffing and winnowing which you note was cited as a reference in the SSC paper - would you (or someone else) mind explaining the connection? The closest I can get is thinking that there's a parallel between trying to guess which PIN in the SSC system is valid and which isn't, and the "winnowing" part of the Rivest protocol; but that doesn't seem like an especially meaningful or illuminating relationship. It looks like maybe a footnote was dropped, which would've tied the Rivest paper to a particular passage in the paper. -- Greg Broiles gbroiles at netbox.com From colin at nyx.net Mon Sep 21 09:51:17 1998 From: colin at nyx.net (Colin Plumb) Date: Tue, 22 Sep 1998 00:51:17 +0800 Subject: ArcotSign (was Re: Does security depend on hardware?) Message-ID: <199809220552.XAA17972@nyx10.nyx.net> Doug, I'd just like to thank you for replying. Even without looking at your description, the fact that you are willing to talk to doubters and admit the limitations of your technique make me a lot more comfortable believing that you have something. You don't fit into either of the two standard types of snake-oil salesmen: The "I can't tell you because it's secret" sort, and the "it's totally unbreakable, cures world hunger and disposes of nuclear waste" sort. Not that people still don't wonder, but I thought I'd temper the technical grilling I see heating up with some appreciation for the fact that you've already managed a better impression than 95% of the crypto wannabes out there. -- -Colin From nobody at replay.com Mon Sep 21 09:58:44 1998 From: nobody at replay.com (Anonymous) Date: Tue, 22 Sep 1998 00:58:44 +0800 Subject: CHALLENGE response Message-ID: <199809220601.IAA30078@replay.com> -----BEGIN PGP PUBLIC KEY BLOCK----- Version: 2.6.2 mQEMAzJEMpEAAAED/0jftmc14q6/r/pGe61N+QymMfQlUdrMNWSl9n9wnst1BGft /GztVfzwS5QDPc2vAvCJjeYFBj60BbJpILMC6rGH7pnc/GFcQjQDUJzHfGHASkDl 2jvDbzG8f7I5oM6NAC5thtjmMoe9FasHMW+lQ3B3IFNSFgIULM5WpAclQcU1A/0S K/k9FEU/SX93bC3SqTwwdaW9bvksN6Tqs8YSmVcRCoCAQQrTB9i0I+1y86gA9DnC UR0EuvalZ54+g/+4G0TOqLVoeSXYhyktqwrIFmwDyK3RPEU6OkwxzlBALNvEKzKB SsdTm7J6O+jg56yEI3YyyBJM6N+zKvmm7DGB8I2+IbQKVG90bywgdG9vP4kAlQMF EDYHKcPOVqQHJUHFNQEB7RID/0H14HGr6lB8bqWCxoZfoZ97oHFEURrYVxOGb5MP ZOOEKCk5d/Q/9d0D0imSZRrV6EQRsiuhA9d0LQy0DuLQC3/NguKFK0Z3fY9gT8/q xV9JJmmoYTjSEDke0RfexfvNDuOa9aISVxndwYGkkYlUcsZBmOeo1OKPdhWCLbnI CsB7 =cutG -----END PGP PUBLIC KEY BLOCK----- -----BEGIN PGP SIGNED MESSAGE----- Interested readers may want to verify that the key above does give a valid signature when applied to the message below. (It will be necessary to remove any existing key with keyid 0x2541C535 before this key can be added to the keyring.) -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCVAwUBNgcq+c5WpAclQcU1AQHnZQP+NrThyaPmy8BDw21geFB3B1s59QJJ4Ycs i1yqu9p6NZfb6qD2pF8AnOSOUMA3KCs98fKMJU9S9TN9eTk5DRbIvXHHSdhMRhuw qDlmcpy4HggT9yHK0vjOTm6UUR/xkvt0WCheAQEe9ZeshFyPa5BAJ7Sqy2dcI1Xv X3DzB5pn2yk= =SmV7 -----END PGP SIGNATURE----- -----BEGIN PGP SIGNED MESSAGE----- "Contrary to one famous philosopher, you're saying the medium is not the message," Judge Thomas Nelson said, alluding to the media theorist Marshall McLuhan. http://www.nytimes.com/library/cyber/week/120997encrypt-bernstein.html Bullshit! The bits and bytes of email encryption are a clear message that I wish to exercise my right to speak freely, without those who wish to do me harm invading my privacy. The death of strong encryption on the InterNet will be the global death of free speech on the InterNet. Accordingly, I feel it is necessary to make a stand and declare that I stand ready and willing to fight to the death against anyone who takes it upon themselves to try to imprison me behind an ElectroMagnetic Curtain. This includes the Ninth Distric Court judges, if they come to the conclusion that the government that they represent needs to electronically imprison their citizens 'for their own safety.' The problem: Criminals with a simple encryption program can scramble their data beyond even the government's ability to read it. http://www.zdnet.com/zdnn/content/zdnn/1208/261695.html Fuck the lame LEA pricks who whine about not being able to stop someone bringing in a planeload of drugs without being able to invade the privacy of every person on the face of the earth. Am I supposed to believe that I have knowledge of when and where major drug shipments are taking place, simply by virtue of hanging out as a musician, yet the LEA's are incapable of finding out the same information by being competent in their profession? Barf City... [I will shortly provide information for any LEA which wishes to prosecute me for my coming 'physical' death threat, on how to hunt me down like the filthy dog that I am.] "Why are you saying that the fact that [encryption] is functional takes it out of the First Amendment context?" Myron Bright, one of the judges, asked the Justice Department attorney, who was still in mid-sentence. He answered that the regulations were not aimed at suppressing speech, but only at the physical capacity of encryption to thwart government intelligence gathering. The Spanish language has the same "physical capacity." So does (:>), (;[), and {;-|). Likewise, BTW, FWIW, FYI, and my own personal favorite, YMMV (You Make Me Vomit? --or-- Your Mileage May Vary?). <-- Ambidextrous encryption. An-cay e-way pect-exay ig-pay atin-lay usts-bay of ildren-chay? Whispering also has the "physical capacity" to "thwart government intelligence gathering." When does the bullshit stop? When do we stop making the use of the Spanish language over the InterNet illegal? When do we stop making whispering, pig-latin, anagrams and acronyms illegal? When do we stop saying that our government is such a piece of crap that it is a danger to let its citizens communicate freely, in private, and share their private thoughts with one another? At one point Fletcher called the government's case "puzzling." http://www.news.com/News/Item/0,4,17114,00.html Only because her mom taught her that it was unladylike to say "Bullshit!" In arguments Monday, a Justice Department lawyer, Scott McIntosh, said the government's intent was to preserve the ability of intelligence agencies to eavesdrop on foreign governments and citizens. http://www.nytimes.com/library/cyber/week/120997encrypt-bernstein.html Let's see if I have this right... The U.S. government needs to destroy the right to free speech and right to privacy of its own citizens in order to infringe upon the human rights of the governments and citizens of other countries? Countries which already have strong encryption? Countries like Red China, which is currently engaged in encryption research with an American company who got permission to export much more diverse encryption material (after making a huge campaign donation to the Whitehouse) than Professor Bernstein will ever likely share with others? Apologies to Judge Fletcher, but that's not "puzzling." That's the same-old-same-old Bullshit! OFFICIAL 'PHYSICAL' DEATH THREAT!!! The pen is mightier than the sword. Thus, I prefer to wage my 'war to the death' against those who would stomp on my basic human rights *"in the interests of National Security"* with my electronic pen, on the InterNet, using encryption when I have reason to fear persecution by Facist, Nazi motherfuckers. [* ~~ TruthMonger Vernacular Translation ~~ "so that the government can maintain its authority over the citizens by use of force and violation of human rights, rather than going to all of the trouble of acting in a manner that will garner the citizens' respect."] I will continue to express my thoughts through the words I send electronically over the InterNet, both publically and privately. I will fight to the bandwidth death against anyone who wants to deny me my right to express my opinions and access the opinions of those who also wish to express their own opinions and share their true thoughts with their fellow humans. If the ElectronicMagnetic Curtain slams down around me, then I will have no choice but to continue my current fight in MeatSpace. And I am not alone... I will share the same 'DEATH THREAT!!!' with Judges Fletcher, Nelson and Bright that I have shared with the President and a host of Congressional and Senatorial representatives: "You can fuck some of the people all of the time, and all of the people some of the time, but you are going to end up in a body bag or a pine box before you manage to fuck all of the people all of the time." Am *I* going to whack you out? Maybe... I would prefer just dumping some tea in Boston Harbor, if that will get my message across in MeatSpace, but if it won't, then I guess I will have to take stronger action. There are undoubtedly a plethora of LEA's ready and willing to prosecute and imprison me for agreeing with Patrick Henry, who said, "Give me liberty, or give me death." The irony, of course, is that I do not pose a great danger to anyone but myself as long as I continue to have my human rights and my liberty unthreatened. The chances of me actually getting off of my fat butt and going out into the real world to whack out the enemies of freedom are probably pretty small (unless I run out of cigarettes and beer, and wouldn't have to make an extra trip). I fully understand that this does not lessen the potential of any LEA who gets a wild hair up their butt to throw a mountain of taxpayer resources into prosecuting me and imprisoning me for their own professional/political gain. However, if you are performing actions so outrageously against basic human rights and freedoms as to get me off of my lazy ass, then I am the least of your problems, because there undoubtedly are millions of people more functional than myself (who get out of the house and go further than the liquor store) who are less willing than myself to put up with increasingly heavy chains placed around their hands and feet 'in the interests of national security.' Feel free to have the Federales break down my door and imprison me for pointing out the obvious. After all, I fit the profile of a domestic terrorist--I quote the Constitution and the Bill of Rights, and I speak out against increasingly big government. But remember...it's the quiet ones you've got to watch... If you force everyone to 'be quiet', then you've got a world of trouble on your hands. Sincerly, John Gilmore ~~~~~~~~~~~~~~~~~~~~~~~~~~~ p.s. NOTICE TO LEA AGENTS IN NEED OF A CAREER BOOST! Yes, I'm just a troublemaking asshole, trying to get John Gilmore in trouble. However, if you want to go to the trouble of tracking me down, I will give you some hints, since it seems likely that anyone who has trouble finding a ton of cocaine at an airport might not be competent in CyberSpace, either. You might want to check with the Webmasters at the sites quoted above to see who has accessed their web sites this morning. The anonymous remailer I will be using is an open secret to CypherPunks around the world as a really bad attempt at disguising my true MeatSpace identity. This alone ought to be enough for some aggressive young LEA and/or federal prosecutor to earn themself some brownie-points, since I am a sorry enough son-of-a-bitch that they would not have much trouble convicting me in front of a jury of 'their' peers, assuming that they can make certain that I am not tried by a jury of my own peers. Bonus Points: I can also be tied into Jim Bell's Worldwide Conspiracy to assassinate government authorities, through my implementation of an Assassination Bot. (I am willing to 'rat out' Jim for two bottles of Scotch. If he is willing to rat _me_ out for less, then I guess it's just my hard luck, eh? <--that's another hint!) p.p.s. You can also charge me with use of 'conventional' encryption in the commission of a crime. Must be your lucky fucking day, eh? -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCVAwUBNI24Hs5WpAclQcU1AQFaggP8CPTVy8EAY3JbIG94frc3C70MW0hUznmp fRgBrq7m5tLGjX7fh3/s4fpTnQi+xUvRUroFETlR6KhM3srSy456wovpFlcLp7uc xk31cRPEroFhO9NRVBUjzToCj78iDvdGm9QXUwLctbbohpdId/KKLTAUM6//4mCB i/9oezfegWc= =4/6E -----END PGP SIGNATURE----- From kriek at bigfoot.com Mon Sep 21 10:52:18 1998 From: kriek at bigfoot.com (Neels Kriek) Date: Tue, 22 Sep 1998 01:52:18 +0800 Subject: Stego-empty hard drives... (fwd) Message-ID: <009d01bde5f5$bd81f1c0$9d060cd1@alien> I have bee using Encrypted magic Folders for a while now. it gives you the option of encrypting all files in a specific folder. it can also do file name scrambling and even hide all the files in a directory from the OS. It activates through a hot key combination. You work on the files you want and when you exit emf the whole dir is hidden again. probably not the most secure system but it will certainly fool most them if you disable booting from a stiffy/floppy. From mok-kong.shen at stud.uni-muenchen.de Mon Sep 21 10:59:00 1998 From: mok-kong.shen at stud.uni-muenchen.de (Mok-Kong Shen) Date: Tue, 22 Sep 1998 01:59:00 +0800 Subject: ArcotSign (was Re: Does security depend on hardware?) In-Reply-To: Message-ID: <36074AEB.63B74FA4@stud.uni-muenchen.de> bram wrote: > > On Mon, 21 Sep 1998, Bruce Schneier wrote: > > > Here's the basic idea: Strew a million passwords on your hard drive, and > > make it impossible to verify which is the correct one offline. So, someone > > who steals the password file off the client cannot run a cracking tool > > against the file. > > Is this really patentable? It sounds a *lot* like the original public-key > algorithm (the one involving lots of little 'puzzles') A question : How does the legitimate user find his password? (Sorry for not having followed this thread from the beginning.) M. K. Shen From bill.stewart at pobox.com Mon Sep 21 11:07:21 1998 From: bill.stewart at pobox.com (Bill Stewart) Date: Tue, 22 Sep 1998 02:07:21 +0800 Subject: Have a cigar In-Reply-To: <199809212002.QAA03936@mail1.panix.com> Message-ID: <3.0.5.32.19980922000743.008ef300@idiom.com> At 07:57 PM 9/21/98 -0700, Tim May wrote: >The paralysis of the U.S. government is heartwarming. No talk about sending >troops to Kosovo, no plans to give the IMF more money to send to Russian >and Wall Street mafiosos (mafiosi?), no talk of sending life preservers to That just means they'll do all those things quietly, without trying to take credit for it in public :-) Or alternatively, they'll try to do it as a "Let's get back to business! See, the Imperial Office Of The Presidency is too important to damage it through impeachment just because of a little lying about sex, which Clinton was doing before you elected him, so now that you've all had your fun, there's Important Work To Do!" which is a nice thing to do after summer vacation anyway, while all the Congresscritters are away from DC running for re-election. Thanks! Bill Bill Stewart, bill.stewart at pobox.com PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639 From mok-kong.shen at stud.uni-muenchen.de Mon Sep 21 11:40:59 1998 From: mok-kong.shen at stud.uni-muenchen.de (Mok-Kong Shen) Date: Tue, 22 Sep 1998 02:40:59 +0800 Subject: ArcotSign (was Re: Does security depend on hardware?) In-Reply-To: Message-ID: <36075008.AA35899E@stud.uni-muenchen.de> Greg Broiles wrote: > I didn't understand the relationship between this scheme and Rivest's > chaffing and winnowing which you note was cited as a reference in the SSC > paper - would you (or someone else) mind explaining the connection? The > closest I can get is thinking that there's a parallel between trying to > guess which PIN in the SSC system is valid and which isn't, and the > "winnowing" part of the Rivest protocol; but that doesn't seem like an > especially meaningful or illuminating relationship. It looks like maybe a > footnote was dropped, which would've tied the Rivest paper to a particular > passage in the paper. I like to mention that sometime ago there was a lot of discussions in comp.security.pgp.discuss. My personal opinions on shaffing and winnowing are summarized in http://www.stud.uni-muenchen.de/~mok-kong.shen/#paper3 M. K. Shen From hjk at dip.de Mon Sep 21 13:21:32 1998 From: hjk at dip.de (Heinz-Juergen Keller) Date: Tue, 22 Sep 1998 04:21:32 +0800 Subject: atheism (was: RE: Democracy... (fwd)) (fwd) In-Reply-To: <199809212320.SAA19200@einstein.ssz.com> Message-ID: On Mon, 21 Sep 1998, Jim Choate wrote: > Date: Mon, 21 Sep 1998 18:20:57 -0500 (CDT) > From: Jim Choate > To: Cypherpunks Distributed Remailer > Subject: RE: atheism (was: RE: Democracy... (fwd)) (fwd) > (stuff deleted) > > We're doing Boolean Algebra here not Algebra, the rules for transitory > functions are different. A natural language is *not* boolean. It is a Peano-Algebra.(with some more restrictions) [R.Montague: Universal Grammar] (much stuff deleted) Heinz-Juergen Keller hjk at mail.dip.de hjkeller at gmx.[net,de] 2047bit PGP Public Key : http://www.dip.de/~hjk/ MD5 Fingerprint: 4d33126fbf8c1bcd8e96ba90d99f0bdc From schneier at counterpane.com Mon Sep 21 13:47:56 1998 From: schneier at counterpane.com (Bruce Schneier) Date: Tue, 22 Sep 1998 04:47:56 +0800 Subject: ArcotSign (was Re: Does security depend on hardware?) In-Reply-To: <199809220552.XAA17972@nyx10.nyx.net> Message-ID: <199809220946.EAA09433@mixer.visi.com> At 11:52 PM 9/21/98 -0600, Colin Plumb wrote: >Doug, I'd just like to thank you for replying. Even without looking at your >description, the fact that you are willing to talk to doubters and admit >the limitations of your technique make me a lot more comfortable believing >that you have something. You don't fit into either of the two standard >types of snake-oil salesmen: The "I can't tell you because it's secret" >sort, and the "it's totally unbreakable, cures world hunger and >disposes of nuclear waste" sort. > >Not that people still don't wonder, but I thought I'd temper the technical >grilling I see heating up with some appreciation for the fact that you've >already managed a better impression than 95% of the crypto wannabes >out there. Hey, I don't ally myself with the clueless. Bruce ********************************************************************** Bruce Schneier, President, Counterpane Systems Phone: 612-823-1098 101 E Minnehaha Parkway, Minneapolis, MN 55419 Fax: 612-823-1590 Free crypto newsletter. See: http://www.counterpane.com From schneier at counterpane.com Mon Sep 21 13:47:56 1998 From: schneier at counterpane.com (Bruce Schneier) Date: Tue, 22 Sep 1998 04:47:56 +0800 Subject: ArcotSign (was Re: Does security depend on hardware?) In-Reply-To: Message-ID: <199809220946.EAA09436@mixer.visi.com> At 08:59 AM 9/22/98 +0100, Mok-Kong Shen wrote: >bram wrote: >> >> On Mon, 21 Sep 1998, Bruce Schneier wrote: >> >> > Here's the basic idea: Strew a million passwords on your hard drive, and >> > make it impossible to verify which is the correct one offline. So, someone >> > who steals the password file off the client cannot run a cracking tool >> > against the file. >> >> Is this really patentable? It sounds a *lot* like the original public-key >> algorithm (the one involving lots of little 'puzzles') > >A question : How does the legitimate user find his password? >(Sorry for not having followed this thread from the beginning.) He uses a remembered secret and some mathematical magic. Bruce ********************************************************************** Bruce Schneier, President, Counterpane Systems Phone: 612-823-1098 101 E Minnehaha Parkway, Minneapolis, MN 55419 Fax: 612-823-1590 Free crypto newsletter. See: http://www.counterpane.com From stevem at tightrope.demon.co.uk Mon Sep 21 14:02:26 1998 From: stevem at tightrope.demon.co.uk (Steve Mynott) Date: Tue, 22 Sep 1998 05:02:26 +0800 Subject: problems with pgp 5i for solaris Message-ID: <19980922110059.A20392@tightrope.demon.co.uk> I am having problems with PGP 5i for solaris. I am aware of http://www.pgpi.com/bugs/bugs50i.shtml I have tried setting HAVE64 to 0 and the *** src/lib/pgp/include/pgpUsuals.h~ Sat Aug 9 22:44:58 1997 --- src/lib/pgp/include/pgpUsuals.h Tue Aug 12 16:57:16 1997 patch but neither solve my problem. I get "Received signal 10." after entering my pass phrase when trying to decrypt a message encoded to my PK. Has anyone got it to work? -- pgp 1024/D9C69DF9 1997/10/14 steve mynott From nobody at nowhere.to Mon Sep 21 14:42:57 1998 From: nobody at nowhere.to (Anonymous) Date: Tue, 22 Sep 1998 05:42:57 +0800 Subject: one-time pad Message-ID: <2deab6ac1f0adf822ecf2e799fd0ba71@anonymous> Where can I get the one-time pad in perl? The one I have I can't figure out how to input data into it: #!/bin/perl vec($_,0,1); open(P,shift); read(P,$p,length),print $_^$p while<> Can anyone help? From ben at algroup.co.uk Mon Sep 21 15:00:13 1998 From: ben at algroup.co.uk (Ben Laurie) Date: Tue, 22 Sep 1998 06:00:13 +0800 Subject: ArcotSign (was Re: Does security depend on hardware?) In-Reply-To: <199809220552.XAA17972@nyx10.nyx.net> Message-ID: <36078211.1C7A64AF@algroup.co.uk> Colin Plumb wrote: > > Doug, I'd just like to thank you for replying. Even without looking at your > description, the fact that you are willing to talk to doubters and admit > the limitations of your technique make me a lot more comfortable believing > that you have something. You don't fit into either of the two standard > types of snake-oil salesmen: The "I can't tell you because it's secret" > sort, and the "it's totally unbreakable, cures world hunger and > disposes of nuclear waste" sort. Clearly I failed to understand this, then: "This note doesn't tell everything about our method--we *are* developing a commercial product, after all..." which somehow doesn't translate to "I can't tell you because it's secret", it seems. Cheers, Ben. -- Ben Laurie |Phone: +44 (181) 735 0686| Apache Group member Freelance Consultant |Fax: +44 (181) 735 0689|http://www.apache.org/ and Technical Director|Email: ben at algroup.co.uk | A.L. Digital Ltd, |Apache-SSL author http://www.apache-ssl.org/ London, England. |"Apache: TDG" http://www.ora.com/catalog/apache/ WE'RE RECRUITING! http://www.aldigital.co.uk/ From mok-kong.shen at stud.uni-muenchen.de Mon Sep 21 15:06:11 1998 From: mok-kong.shen at stud.uni-muenchen.de (Mok-Kong Shen) Date: Tue, 22 Sep 1998 06:06:11 +0800 Subject: ArcotSign (was Re: Does security depend on hardware?) In-Reply-To: Message-ID: <36078061.D34D26D@stud.uni-muenchen.de> Bruce Schneier wrote: > > At 08:59 AM 9/22/98 +0100, Mok-Kong Shen wrote: > >A question : How does the legitimate user find his password? > >(Sorry for not having followed this thread from the beginning.) > > He uses a remembered secret and some mathematical magic. Another naive question: Why is the remembered secret not sufficient (thus doing away with the magic)? M. K. Shen From schneier at counterpane.com Mon Sep 21 15:26:50 1998 From: schneier at counterpane.com (Bruce Schneier) Date: Tue, 22 Sep 1998 06:26:50 +0800 Subject: ArcotSign (was Re: Does security depend on hardware?) In-Reply-To: Message-ID: <199809221128.GAA19882@mixer.visi.com> At 12:48 PM 9/22/98 +0100, Mok-Kong Shen wrote: >Bruce Schneier wrote: >> >> At 08:59 AM 9/22/98 +0100, Mok-Kong Shen wrote: > >> >A question : How does the legitimate user find his password? >> >(Sorry for not having followed this thread from the beginning.) >> >> He uses a remembered secret and some mathematical magic. > >Another naive question: Why is the remembered secret not sufficient >(thus doing away with the magic)? One of the significant improvements is that the scheme is immune to offline password guessing attacks. Bruce ********************************************************************** Bruce Schneier, President, Counterpane Systems Phone: 612-823-1098 101 E Minnehaha Parkway, Minneapolis, MN 55419 Fax: 612-823-1590 Free crypto newsletter. See: http://www.counterpane.com From schneier at counterpane.com Mon Sep 21 15:27:13 1998 From: schneier at counterpane.com (Bruce Schneier) Date: Tue, 22 Sep 1998 06:27:13 +0800 Subject: ArcotSign (was Re: Does security depend on hardware?) In-Reply-To: <199809220552.XAA17972@nyx10.nyx.net> Message-ID: <199809221128.GAA19873@mixer.visi.com> At 11:55 AM 9/22/98 +0100, Ben Laurie wrote: >Colin Plumb wrote: >> >> Doug, I'd just like to thank you for replying. Even without looking at your >> description, the fact that you are willing to talk to doubters and admit >> the limitations of your technique make me a lot more comfortable believing >> that you have something. You don't fit into either of the two standard >> types of snake-oil salesmen: The "I can't tell you because it's secret" >> sort, and the "it's totally unbreakable, cures world hunger and >> disposes of nuclear waste" sort. > >Clearly I failed to understand this, then: > >"This note doesn't tell everything about our method--we *are* developing >a commercial product, after all..." > >which somehow doesn't translate to "I can't tell you because it's >secret", it seems. Well, _I_ think they can explain everything (and we hope to do an academic paper on the idea), but it's not my decision. Bruce ********************************************************************** Bruce Schneier, President, Counterpane Systems Phone: 612-823-1098 101 E Minnehaha Parkway, Minneapolis, MN 55419 Fax: 612-823-1590 Free crypto newsletter. See: http://www.counterpane.com From jya at pipeline.com Mon Sep 21 15:28:01 1998 From: jya at pipeline.com (John Young) Date: Tue, 22 Sep 1998 06:28:01 +0800 Subject: BXA Crypto Export Rule Message-ID: <199809221123.HAA31117@camel7.mindspring.com> BXA issued today an interim rule on encryption exports and easing of limits for select institutions announced in the summer: http://jya.com/bxa092298.txt (83K) Quote: SUMMARY: This interim rule amends the Export Administration Regulations (EAR) by clarifying controls on the export and reexport of encryption items (EI) controlled for ``EI'' reasons on the Commerce Control List. This rule incorporates public comments on an interim rule published in the Federal Register on December 30, 1996, and implements new licensing policies for general purpose non-recoverable non-voice encryption commodities or software of any key length for distribution to banks and financial institutions in specified countries. From ben at algroup.co.uk Mon Sep 21 15:58:17 1998 From: ben at algroup.co.uk (Ben Laurie) Date: Tue, 22 Sep 1998 06:58:17 +0800 Subject: ArcotSign (was Re: Does security depend on hardware?) In-Reply-To: <199809220552.XAA17972@nyx10.nyx.net> Message-ID: <360790AF.AAE039E2@algroup.co.uk> Bruce Schneier wrote: > > At 11:55 AM 9/22/98 +0100, Ben Laurie wrote: > >Colin Plumb wrote: > >> > >> Doug, I'd just like to thank you for replying. Even without looking at > your > >> description, the fact that you are willing to talk to doubters and admit > >> the limitations of your technique make me a lot more comfortable believing > >> that you have something. You don't fit into either of the two standard > >> types of snake-oil salesmen: The "I can't tell you because it's secret" > >> sort, and the "it's totally unbreakable, cures world hunger and > >> disposes of nuclear waste" sort. > > > >Clearly I failed to understand this, then: > > > >"This note doesn't tell everything about our method--we *are* developing > >a commercial product, after all..." > > > >which somehow doesn't translate to "I can't tell you because it's > >secret", it seems. > > Well, _I_ think they can explain everything (and we hope to do an academic > paper on the idea), but it's not my decision. I hope you manage to persaude them then, because, as we all know, if it is kept secret, then even B. Schneier saying it is great will not rescue them from the snake-oil branding. Cheers, Ben. -- Ben Laurie |Phone: +44 (181) 735 0686| Apache Group member Freelance Consultant |Fax: +44 (181) 735 0689|http://www.apache.org/ and Technical Director|Email: ben at algroup.co.uk | A.L. Digital Ltd, |Apache-SSL author http://www.apache-ssl.org/ London, England. |"Apache: TDG" http://www.ora.com/catalog/apache/ WE'RE RECRUITING! http://www.aldigital.co.uk/ From Marita.Nasman-Repo at DataFellows.com Tue Sep 22 07:04:15 1998 From: Marita.Nasman-Repo at DataFellows.com (Marita Näsman-Repo) Date: Tue, 22 Sep 1998 07:04:15 -0700 (PDT) Subject: MEDIA RELEASE! Washington DC office opened Message-ID: <3.0.32.19980922135655.009c0580@smtp.datafellows.com> The following press release for your information. Regards Marita Nasman-Repo ############################################# Data Fellows Opens Regional Sales Office in Washington, D.C. Helsinki, Finland, September 21, 1998 -- Data Fellows, the leading developer of data security solutions, announces the opening of a regional sales office in Washington, D.C. The new office is located to better serve Data Fellows� current and future clients in the federal government and in the Eastern portion of the United States. Data Fellows is no stranger to the Washington area. The company�s client base includes the Federal Reserve Bank, the Internal Revenue Service, the Department of Defense, NASA, and other government agencies. The new office is the first of several planned regional offices designed to further enhance the company�s relations with its North American customer base. Technology industry veteran Joe Arcade has been appointed the sales director for the new Washington office. Mr Arcade has been involved in Washington-area technology for the past 15 years and has held executive positions with companies including Unisys, British Telecom, Sun Microsystems, Cabletron and Litton. Mr. Arcade has a Bachelors degree from Youngstown State University and a Masters degree from Catholic University. With offices in San Jose, CA, and Helsinki, Finland, privately-owned Data Fellows is the leading technology provider of data security solutions for computer networks and desktop computers. The company's F-Secure data security product line includes F-Secure Workstation Suite, consisting of malicious code detection and removal, unobtrusive file and network encryption, and personal firewall functionality, all integrated into a policy-based management architecture; F-Secure Anti-Virus, with multiple scanning engines (including F-PROT and AVP), is the most comprehensive, real-time virus scanning and protection system for all Windows platforms; F-Secure VPN+ provides a software-based, IPSEC-compliant Virtual Private Network solution for large corporate networks as well as remote and small office networks; F-Secure FileCrypto is the first and only product to integrate strong real-time encryption directly into the Windows file system; F�Secure SSH provides secure remote login, terminal, and other connections over unsecured networks. It is the most widely used secure remote administration tool; and F-Secure NameSurfer is the solution for remote Internet and Intranet DNS administration. Its easy-to-use WWW user interface automates and simplifies DNS administration. The company's products are relied on by many of the world's largest companies, governments, universities and institutions. The products are available worldwide in more than 100 countries through Data Fellows and its business partners, and the company has experienced 100% annual growth during each of the past three years. For more information, contact Data Fellows, 675 North First Street, 8th floor, San Jose, CA 95112; tel 408-938-6700; fax 408-938-6701; http://www.DataFellows.com or info at DataFellows.com. ###################################### -- Marita.Nasman-Repo at DataFellows.com, World-Wide Web http://www.DataFellows.com From ravage at einstein.ssz.com Mon Sep 21 16:07:22 1998 From: ravage at einstein.ssz.com (Jim Choate) Date: Tue, 22 Sep 1998 07:07:22 +0800 Subject: atheism (was: RE: Democracy... (fwd)) (fwd) Message-ID: <199809221236.HAA02261@einstein.ssz.com> Forwarded message: > Date: Tue, 22 Sep 1998 11:06:26 +0200 (MEST) > From: Heinz-Juergen Keller > Subject: RE: atheism (was: RE: Democracy... (fwd)) (fwd) > > We're doing Boolean Algebra here not Algebra, the rules for transitory > > functions are different. > A natural language is *not* boolean. > It is a Peano-Algebra.(with some more restrictions) > [R.Montague: Universal Grammar] Irrelevant, we're analysing the truth or falsity of a statement, that is Boolean Algebra. ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From ravage at einstein.ssz.com Mon Sep 21 16:14:46 1998 From: ravage at einstein.ssz.com (Jim Choate) Date: Tue, 22 Sep 1998 07:14:46 +0800 Subject: Peano Algebra and it's base theorem Message-ID: <199809221242.HAA02351@einstein.ssz.com> Peano Algebra's are based on the following: If a unary predicate P holds for 0, and if P holds, together with an element x, also for it's succesor x', then P holds for all natural numbers. The question under consideration is NOT an attempt to describe a language in a Sigma structure/algebra/model. We are NOT trying to analyze the language but rather a specific mathematical statement made IN that language. They are not the same problem and hence Peano Algebra's do NOT apply. Nice straw man, I had to drag a math book out to refresh what a Peano Algebra was (don't think I've ever had to deal with one). ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From ravage at einstein.ssz.com Mon Sep 21 16:16:23 1998 From: ravage at einstein.ssz.com (Jim Choate) Date: Tue, 22 Sep 1998 07:16:23 +0800 Subject: Stego-empty hard drives... (fwd) Message-ID: <199809221245.HAA02410@einstein.ssz.com> Forwarded message: > From: "Neels Kriek" > Subject: Re: Stego-empty hard drives... (fwd) > Date: Tue, 22 Sep 1998 01:52:03 -0500 > I have bee using Encrypted magic Folders for a while now. it gives you the > option of encrypting all files in a specific folder. it can also do file > name scrambling and even hide all the files in a directory from the OS. > > It activates through a hot key combination. You work on the files you want > and when you exit emf the whole dir is hidden again. probably not the most > secure system but it will certainly fool most them if you disable booting > from a stiffy/floppy. The problem is this approach is detectible with a suitable 'virus scanner' technology. Even if the encrypted folders and such don't appear in the file system you have various other pieces of the processing agent that must sit around on the drive and hence are open to signature attacks. ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From ravage at einstein.ssz.com Mon Sep 21 16:18:13 1998 From: ravage at einstein.ssz.com (Jim Choate) Date: Tue, 22 Sep 1998 07:18:13 +0800 Subject: CHALLENGE response (fwd) Message-ID: <199809221246.HAA02464@einstein.ssz.com> Forwarded message: > Date: Tue, 22 Sep 1998 08:01:07 +0200 > From: Anonymous > Subject: CHALLENGE response > "Contrary to one famous philosopher, > you're saying the medium is not the > message," Judge Thomas Nelson said, > alluding to the media theorist Marshall > McLuhan. > http://www.nytimes.com/library/cyber/week/120997encrypt-bernstein.html > > Bullshit! > The bits and bytes of email encryption are a clear message > that I wish to exercise my right to speak freely, without those > who wish to do me harm invading my privacy. If you're going to take that tack then you need to invoke freedom of the press and not freedom of speech. ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From mok-kong.shen at stud.uni-muenchen.de Mon Sep 21 16:18:24 1998 From: mok-kong.shen at stud.uni-muenchen.de (Mok-Kong Shen) Date: Tue, 22 Sep 1998 07:18:24 +0800 Subject: ArcotSign (was Re: Does security depend on hardware?) In-Reply-To: Message-ID: <3607960E.DD29B101@stud.uni-muenchen.de> Bruce Schneier wrote: > > At 12:48 PM 9/22/98 +0100, Mok-Kong Shen wrote: > >Bruce Schneier wrote: > >> He uses a remembered secret and some mathematical magic. > > > >Another naive question: Why is the remembered secret not sufficient > >(thus doing away with the magic)? > > One of the significant improvements is that the scheme is immune to > offline password guessing attacks. If the 'mathematical magic' is not to be kept secret (as in principle shouldn't for all crypto algorithms) then presumably one could attack through brute forcing the 'remembered secrect', I guess. (I suppose the 'remembered secret' has less bits then the 'password' that is to be retrieved from the pool of millions with the 'mathematical magic'). So the advantages of the scheme appear to remain unclear as a matter of principle. M. K. Shen From schneier at counterpane.com Mon Sep 21 16:21:19 1998 From: schneier at counterpane.com (Bruce Schneier) Date: Tue, 22 Sep 1998 07:21:19 +0800 Subject: ArcotSign (was Re: Does security depend on hardware?) In-Reply-To: Message-ID: <199809221222.HAA27732@mixer.visi.com> At 02:20 PM 9/22/98 +0100, Mok-Kong Shen wrote: >Bruce Schneier wrote: >> >> At 12:48 PM 9/22/98 +0100, Mok-Kong Shen wrote: >> >Bruce Schneier wrote: > >> >> He uses a remembered secret and some mathematical magic. >> > >> >Another naive question: Why is the remembered secret not sufficient >> >(thus doing away with the magic)? >> >> One of the significant improvements is that the scheme is immune to >> offline password guessing attacks. > >If the 'mathematical magic' is not to be kept secret (as in principle >shouldn't for all crypto algorithms) then presumably one could >attack through brute forcing the 'remembered secrect', I guess. Yes, but only through an on-line protocol. And if the server has some kind of "turn the user off after ten bad password guesses," then the atack doesn't work. >(I suppose the 'remembered secret' has less bits then the 'password' >that is to be retrieved from the pool of millions with the >'mathematical magic'). So the advantages of the scheme appear to >remain unclear as a matter of principle. The advantages are that offline password guessing is impossible. Bruce ********************************************************************** Bruce Schneier, President, Counterpane Systems Phone: 612-823-1098 101 E Minnehaha Parkway, Minneapolis, MN 55419 Fax: 612-823-1590 Free crypto newsletter. See: http://www.counterpane.com From mok-kong.shen at stud.uni-muenchen.de Mon Sep 21 16:26:46 1998 From: mok-kong.shen at stud.uni-muenchen.de (Mok-Kong Shen) Date: Tue, 22 Sep 1998 07:26:46 +0800 Subject: ArcotSign (was Re: Does security depend on hardware?) In-Reply-To: Message-ID: <360797EF.A979141A@stud.uni-muenchen.de> Bruce Schneier wrote: > > At 02:20 PM 9/22/98 +0100, Mok-Kong Shen wrote: > >If the 'mathematical magic' is not to be kept secret (as in principle > >shouldn't for all crypto algorithms) then presumably one could > >attack through brute forcing the 'remembered secrect', I guess. > > Yes, but only through an on-line protocol. And if the server has some > kind of "turn the user off after ten bad password guesses," then the > atack doesn't work. I remember someone wrote of the case where the attacker got the file with the millions of passwords. Then if he also knows the 'mathematical magic' he could presumably do offline work. So I suppose that the 'mathematical magic' has to be kept secret, which would work against the generally accepted crypto principles. M. K. Shen From schneier at counterpane.com Mon Sep 21 16:42:36 1998 From: schneier at counterpane.com (Bruce Schneier) Date: Tue, 22 Sep 1998 07:42:36 +0800 Subject: ArcotSign (was Re: Does security depend on hardware?) In-Reply-To: Message-ID: <199809221242.HAA01777@mixer.visi.com> At 02:28 PM 9/22/98 +0100, Mok-Kong Shen wrote: >Bruce Schneier wrote: >> >> At 02:20 PM 9/22/98 +0100, Mok-Kong Shen wrote: > >> >If the 'mathematical magic' is not to be kept secret (as in principle >> >shouldn't for all crypto algorithms) then presumably one could >> >attack through brute forcing the 'remembered secrect', I guess. >> >> Yes, but only through an on-line protocol. And if the server has some >> kind of "turn the user off after ten bad password guesses," then the >> atack doesn't work. > >I remember someone wrote of the case where the attacker got the >file with the millions of passwords. Then if he also knows the >'mathematical magic' he could presumably do offline work. So I >suppose that the 'mathematical magic' has to be kept secret, which >would work against the generally accepted crypto principles. No. The online protocol can be public. Nothing has to be kept secret in order for this to work. That would be stupid; we all know that. Bruce ********************************************************************** Bruce Schneier, President, Counterpane Systems Phone: 612-823-1098 101 E Minnehaha Parkway, Minneapolis, MN 55419 Fax: 612-823-1590 Free crypto newsletter. See: http://www.counterpane.com From mok-kong.shen at stud.uni-muenchen.de Mon Sep 21 16:45:43 1998 From: mok-kong.shen at stud.uni-muenchen.de (Mok-Kong Shen) Date: Tue, 22 Sep 1998 07:45:43 +0800 Subject: ArcotSign (was Re: Does security depend on hardware?) In-Reply-To: Message-ID: <36079C71.1D2880EA@stud.uni-muenchen.de> Bruce Schneier wrote: > > At 02:28 PM 9/22/98 +0100, Mok-Kong Shen wrote: > >Bruce Schneier wrote: > >> > >> At 02:20 PM 9/22/98 +0100, Mok-Kong Shen wrote: > > > >> >If the 'mathematical magic' is not to be kept secret (as in principle > >> >shouldn't for all crypto algorithms) then presumably one could > >> >attack through brute forcing the 'remembered secrect', I guess. > >> > >> Yes, but only through an on-line protocol. And if the server has some > >> kind of "turn the user off after ten bad password guesses," then the > >> atack doesn't work. > > > >I remember someone wrote of the case where the attacker got the > >file with the millions of passwords. Then if he also knows the > >'mathematical magic' he could presumably do offline work. So I > >suppose that the 'mathematical magic' has to be kept secret, which > >would work against the generally accepted crypto principles. > > No. The online protocol can be public. Nothing has to be kept secret > in order for this to work. That would be stupid; we all know that. I suppose you misunderstood me. I mean the 'mathematical magic' cannot be made public. (Or is 'online protocol' = 'mathematical magic'?) If the 'magic' is public then the attacker with the pool of passwords could brute force offline. M. K. Shen From schneier at counterpane.com Mon Sep 21 16:48:11 1998 From: schneier at counterpane.com (Bruce Schneier) Date: Tue, 22 Sep 1998 07:48:11 +0800 Subject: ArcotSign (was Re: Does security depend on hardware?) In-Reply-To: Message-ID: <199809221250.HAA03398@mixer.visi.com> At 02:47 PM 9/22/98 +0100, Mok-Kong Shen wrote: >Bruce Schneier wrote: >> >> At 02:28 PM 9/22/98 +0100, Mok-Kong Shen wrote: >> >Bruce Schneier wrote: >> >> >> >> At 02:20 PM 9/22/98 +0100, Mok-Kong Shen wrote: >> > >> >> >If the 'mathematical magic' is not to be kept secret (as in principle >> >> >shouldn't for all crypto algorithms) then presumably one could >> >> >attack through brute forcing the 'remembered secrect', I guess. >> >> >> >> Yes, but only through an on-line protocol. And if the server has some >> >> kind of "turn the user off after ten bad password guesses," then the >> >> atack doesn't work. >> > >> >I remember someone wrote of the case where the attacker got the >> >file with the millions of passwords. Then if he also knows the >> >'mathematical magic' he could presumably do offline work. So I >> >suppose that the 'mathematical magic' has to be kept secret, which >> >would work against the generally accepted crypto principles. >> >> No. The online protocol can be public. Nothing has to be kept secret >> in order for this to work. That would be stupid; we all know that. > >I suppose you misunderstood me. I mean the 'mathematical magic' >cannot be made public. (Or is 'online protocol' = 'mathematical magic'?) >If the 'magic' is public then the attacker with the pool of passwords >could brute force offline. No. You misunderstood me. There is NOTHING secret except the key. The online protocol, mathematical magic, source code, algorithm details, and everything else can be made public. There are no secrets in the system except for the keys. Yes, it's not obvious how you do this. That's why Arcot is turning this into a product--it's a good idea. Bruce ********************************************************************** Bruce Schneier, President, Counterpane Systems Phone: 612-823-1098 101 E Minnehaha Parkway, Minneapolis, MN 55419 Fax: 612-823-1590 Free crypto newsletter. See: http://www.counterpane.com From schneier at counterpane.com Mon Sep 21 16:50:27 1998 From: schneier at counterpane.com (Bruce Schneier) Date: Tue, 22 Sep 1998 07:50:27 +0800 Subject: ArcotSign (was Re: Does security depend on hardware?) In-Reply-To: <199809220552.XAA17972@nyx10.nyx.net> Message-ID: <199809221251.HAA03621@mixer.visi.com> At 12:57 PM 9/22/98 +0100, Ben Laurie wrote: I hope you manage to persaude them then, because, as we all know, if it >is kept secret, then even B. Schneier saying it is great will not rescue >them from the snake-oil branding. I'm working on it. I think I will be successful. They know that they have to make their sytem public if people are going to use it. At this point, keeping things under wraps give them a competitive edge. There will be a point where they have to make all the details public. Bruce ********************************************************************** Bruce Schneier, President, Counterpane Systems Phone: 612-823-1098 101 E Minnehaha Parkway, Minneapolis, MN 55419 Fax: 612-823-1590 Free crypto newsletter. See: http://www.counterpane.com From mhahn at tcbtech.com Mon Sep 21 17:03:31 1998 From: mhahn at tcbtech.com (Mark Hahn) Date: Tue, 22 Sep 1998 08:03:31 +0800 Subject: Stego-empty hard drives... (fwd) In-Reply-To: <199809220116.UAA20070@einstein.ssz.com> Message-ID: <3.0.1.32.19980922085457.0096f7a0@mail.aosi.com> At 11:37 PM 9/21/98 -0400, Lazlo Toth wrote: >>> When you're taking your laptop through customs, you do >>> nothing while the machine boots up, the doctored BIOS does its thing, >>> and everybody's happy. When you want to get at the stuff on the rest of >>> the HD, you reboot and type in your passphrase. As I recall, this thread is about customs officials booting your laptop from *their* floppy and scanning your hard drive. I suggest two practical solutions to avoid this incursion: 1) Leave the floppy drive at home ;-) Many PCs have swapable floppy/ CD-ROM bays. I've learned to live without my floppy (others may not have that option.) 2) If you can't leave your floppy at home, carry your sensitive data on a PCMCIA Type-II Hard Drive. Kingston sells one sporting 500MB of capacity. Pop it out and put it as far away from the laptop as you can. Inside your other luggage somewhere. -MpH -------- Mark P. Hahn Work: 212-278-5861 mhahn at tcbtech.com Home: 609-275-1834 TCB Technologies, Inc (mhahn at tcbtech.com) Consultant to: The SoGen Funds 1221 Avenue of the Americas, NY NY From mok-kong.shen at stud.uni-muenchen.de Mon Sep 21 17:25:45 1998 From: mok-kong.shen at stud.uni-muenchen.de (Mok-Kong Shen) Date: Tue, 22 Sep 1998 08:25:45 +0800 Subject: ArcotSign (was Re: Does security depend on hardware?) In-Reply-To: Message-ID: <3607A04E.BE164E44@stud.uni-muenchen.de> Bruce Schneier wrote: > > >I suppose you misunderstood me. I mean the 'mathematical magic' > >cannot be made public. (Or is 'online protocol' = 'mathematical magic'?) > >If the 'magic' is public then the attacker with the pool of passwords > >could brute force offline. > > No. You misunderstood me. There is NOTHING secret except the key. > The online protocol, mathematical magic, source code, algorithm details, > and everything else can be made public. There are no secrets in the > system except for the keys. In that case please allow me to go back to a point raised by me previously. The user uses his 'remembered secret' (of fewer bits) through a public algorithm (including protocol) to retrieve from a pool the password (of more bits). If the attacker doesn't have the pool then everything looks fine. But if he manages to get the pool (a case someone mentioned in this thread) then he can obviously brute force offline, I believe, since he possesses now everything the legitimate user has, excepting the 'remembered secret'. Or is there anything wrong with my logic? M. K. Shen From mok-kong.shen at stud.uni-muenchen.de Mon Sep 21 17:42:29 1998 From: mok-kong.shen at stud.uni-muenchen.de (Mok-Kong Shen) Date: Tue, 22 Sep 1998 08:42:29 +0800 Subject: Stego-empty hard drives... (fwd) In-Reply-To: <199809220116.UAA20070@einstein.ssz.com> Message-ID: <3607A71E.14DB9826@stud.uni-muenchen.de> Mark Hahn wrote: > > 2) If you can't leave your floppy at home, carry your sensitive data on > a PCMCIA Type-II Hard Drive. Kingston sells one sporting 500MB > of capacity. Pop it out and put it as far away from the laptop as you > can. Inside your other luggage somewhere. I am ignorant about hardware. Question: Wouldn't it be possible to somehow put information on a music CD? From howree at cable.navy.mil Mon Sep 21 18:00:09 1998 From: howree at cable.navy.mil (Reeza!) Date: Tue, 22 Sep 1998 09:00:09 +0800 Subject: Stego-empty hard drives... (fwd) In-Reply-To: <199809221245.HAA02410@einstein.ssz.com> Message-ID: <3.0.5.32.19980923000131.007d6910@205.83.192.13> At 07:45 AM 9/22/98 -0500, Jim Choate wrote: >Forwarded message: >> From: "Neels Kriek" >> Subject: Re: Stego-empty hard drives... (fwd) >> Date: Tue, 22 Sep 1998 01:52:03 -0500 >> I have bee using Encrypted magic Folders for a while now. it gives you the >> option of encrypting all files in a specific folder. it can also do file >> name scrambling and even hide all the files in a directory from the OS. >> >> It activates through a hot key combination. You work on the files you want >> and when you exit emf the whole dir is hidden again. probably not the most >> secure system but it will certainly fool most them if you disable booting >> from a stiffy/floppy. > >The problem is this approach is detectible with a suitable 'virus scanner' >technology. Even if the encrypted folders and such don't appear in the file >system you have various other pieces of the processing agent that must sit >around on the drive and hence are open to signature attacks. > The first assertion is not entirely accurate- I played with Magic Folders for a while- it relies on a command, usu. in the autoexec.bat or win.ini file (dos/windows environment) to load, with a bootable floppy disk these commands would would be bypassed and the so-called "hidden" folder is in plain sight. Reeza! "...The world was on fire, but no one could save me but you... Strange what desire will make foolish people do... (and the background vocalists sang) This world is only gonna break your heart...." ==C.I.== From mhahn at tcbtech.com Mon Sep 21 18:04:51 1998 From: mhahn at tcbtech.com (Mark Hahn) Date: Tue, 22 Sep 1998 09:04:51 +0800 Subject: Peano Algebra and it's base theorem In-Reply-To: <199809221242.HAA02351@einstein.ssz.com> Message-ID: <3.0.1.32.19980922100223.0095a100@mail.aosi.com> At 07:42 AM 9/22/98 -0500, Jim Choate wrote: >Peano Algebra's are based on the following: > >If a unary predicate P holds for 0, and if P holds, together with an element >x, also for it's succesor x', then P holds for all natural numbers. Didn't you over simplify this theorem somewhat. The proof that P holds for the successor x' must be derived from the truth of predicate P for x. The successor, x', must be shown to satisfy P because x satisfies P. Restated: x' satisfies P if and only if x satisfies P. In this way you can start with P and the natural number 1, and show P holds for any natural number by applying your proof recursively. (i.e. P is true for 1 and my proof show it is true for 2, then my proof shows it is true for 3, then it shows its true for 4, the it shows its true for ....) If the proof of P for x' is not related to the proof of P for x then you can prove lots of irrational statements. I.e. say the Predicate P is "is prime". Then 2 holds for P (2 "is prime"). 2's successor is 3. P also holds for 3 (3 "is prime"). So all P holds for all natural numbers. Ergo, all natural number are prime. I don't think so. 3's primeness must be derived from 2's primeness. -MpH -------- Mark P. Hahn Work: 212-278-5861 mhahn at tcbtech.com Home: 609-275-1834 TCB Technologies, Inc (mhahn at tcbtech.com) Consultant to: The SoGen Funds 1221 Avenue of the Americas, NY NY From frissell at panix.com Mon Sep 21 18:11:44 1998 From: frissell at panix.com (Duncan Frissell) Date: Tue, 22 Sep 1998 09:11:44 +0800 Subject: US Complaints in Embassy Bombings In-Reply-To: <199809212005.QAA04784@camel14.mindspring.com> Message-ID: <4.0.2.19980922095259.03e0ad50@panix.com> At 03:58 PM 9/21/98 -0400, John Young wrote: >The place has a distinguished history. See its honor roll on >Alta Vista. Search "Medical Facility for Federal Prisoners." General Edwin Walker grabbed in the early 1960s for his opposition to integration. Classic "medical" imprisonment for political beliefs. DCF From frissell at panix.com Mon Sep 21 18:22:54 1998 From: frissell at panix.com (Duncan Frissell) Date: Tue, 22 Sep 1998 09:22:54 +0800 Subject: Clinton's fake apologies (fwd) In-Reply-To: <199809212328.SAA19426@einstein.ssz.com> Message-ID: <199809221423.KAA24348@mail1.panix.com> At 06:28 PM 9/21/98 -0500, Jim Choate wrote: >"But ladies and gentlemen of the jury, as our President has claimed and >clearly demonstrated by his remaining in office, for a person to be >convicted on a felony it has to be an important felony. The prosecution has not >proven that this felony has sufficient weight for prosecution. You have no >choice but to aquit my client." > Or: Ladies and Gentlemen of the Jury, we just conducted a favorable/non-favorable public opinion survey about the ADA over there and found out that 3% had a favorable opinion of him 3% unfavorable and 94% were DK or No Opinion. I therefore plead that he has insufficient personal popularity to conduct this prosecution. DCF From ben at algroup.co.uk Mon Sep 21 18:24:22 1998 From: ben at algroup.co.uk (Ben Laurie) Date: Tue, 22 Sep 1998 09:24:22 +0800 Subject: ArcotSign (was Re: Does security depend on hardware?) In-Reply-To: Message-ID: <3607B318.BC911171@algroup.co.uk> Bruce Schneier wrote: > >(I suppose the 'remembered secret' has less bits then the 'password' > >that is to be retrieved from the pool of millions with the > >'mathematical magic'). So the advantages of the scheme appear to > >remain unclear as a matter of principle. > > The advantages are that offline password guessing is impossible. The 'I' word always makes me nervous - do you really mean that, or do you just mean "very difficult"? Cheers, Ben. -- Ben Laurie |Phone: +44 (181) 735 0686| Apache Group member Freelance Consultant |Fax: +44 (181) 735 0689|http://www.apache.org/ and Technical Director|Email: ben at algroup.co.uk | A.L. Digital Ltd, |Apache-SSL author http://www.apache-ssl.org/ London, England. |"Apache: TDG" http://www.ora.com/catalog/apache/ WE'RE RECRUITING! http://www.aldigital.co.uk/ From ravage at einstein.ssz.com Mon Sep 21 18:30:01 1998 From: ravage at einstein.ssz.com (Jim Choate) Date: Tue, 22 Sep 1998 09:30:01 +0800 Subject: Peano Algebra and it's base theorem (fwd) Message-ID: <199809221457.JAA03448@einstein.ssz.com> Forwarded message: > Date: Tue, 22 Sep 1998 10:02:23 -0500 > From: Mark Hahn > Subject: Re: Peano Algebra and it's base theorem > At 07:42 AM 9/22/98 -0500, Jim Choate wrote: > >Peano Algebra's are based on the following: > > > >If a unary predicate P holds for 0, and if P holds, together with an element > >x, also for it's succesor x', then P holds for all natural numbers. > > Didn't you over simplify this theorem somewhat. It's taken word for word from VNR. Send 'em a letter. The point is that we were discussing binary not integer mathematics. ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From ravage at einstein.ssz.com Mon Sep 21 18:31:52 1998 From: ravage at einstein.ssz.com (Jim Choate) Date: Tue, 22 Sep 1998 09:31:52 +0800 Subject: Stego-empty hard drives... (fwd) Message-ID: <199809221500.KAA03503@einstein.ssz.com> Forwarded message: > Date: Tue, 22 Sep 1998 15:33:18 +0100 > From: Mok-Kong Shen > Subject: Re: Stego-empty hard drives... (fwd) > > I am ignorant about hardware. Question: Wouldn't it be possible to > somehow put information on a music CD? > Absolutely, though the fact that it's r/w'able is going to set some flags off. Now if you can find somebody who makes R/W CD's that aren't blue, green, yellow, etc. and instead the clear that is normaly expected you might pull it off. ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From ravage at einstein.ssz.com Mon Sep 21 18:33:06 1998 From: ravage at einstein.ssz.com (Jim Choate) Date: Tue, 22 Sep 1998 09:33:06 +0800 Subject: Clinton's fake apologies (fwd) Message-ID: <199809221501.KAA03547@einstein.ssz.com> Forwarded message: > Date: Tue, 22 Sep 1998 10:28:01 -0400 > From: Duncan Frissell > Subject: Re: Clinton's fake apologies (fwd) > Ladies and Gentlemen of the Jury, we just conducted a > favorable/non-favorable public opinion survey about the ADA over there and > found out that 3% had a favorable opinion of him 3% unfavorable and 94% > were DK or No Opinion. I therefore plead that he has insufficient personal > popularity to conduct this prosecution. I like that one, talk about 'jury of their peers'... ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From ravage at einstein.ssz.com Mon Sep 21 18:36:59 1998 From: ravage at einstein.ssz.com (Jim Choate) Date: Tue, 22 Sep 1998 09:36:59 +0800 Subject: Stego-empty hard drives... (fwd) Message-ID: <199809221505.KAA03644@einstein.ssz.com> Forwarded message: > Date: Tue, 22 Sep 1998 08:54:57 -0500 > From: Mark Hahn > Subject: Re: Stego-empty hard drives... (fwd) > As I recall, this thread is about customs officials booting your laptop > from *their* floppy and scanning your hard drive. I suggest two > practical solutions to avoid this incursion: That's where we started, we're miles away and deep in the woods now.... ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From ravage at einstein.ssz.com Mon Sep 21 18:37:10 1998 From: ravage at einstein.ssz.com (Jim Choate) Date: Tue, 22 Sep 1998 09:37:10 +0800 Subject: Stego-empty hard drives... (fwd) Message-ID: <199809221504.KAA03594@einstein.ssz.com> Forwarded message: > Date: Wed, 23 Sep 1998 00:01:31 +1000 > From: Reeza! > Subject: Re: Stego-empty hard drives... (fwd) > At 07:45 AM 9/22/98 -0500, Jim Choate wrote: > >Forwarded message: > >> From: "Neels Kriek" > >> Subject: Re: Stego-empty hard drives... (fwd) > >> Date: Tue, 22 Sep 1998 01:52:03 -0500 > >> I have bee using Encrypted magic Folders for a while now. it gives you the > >> option of encrypting all files in a specific folder. it can also do file > >> name scrambling and even hide all the files in a directory from the OS. > >> > >> It activates through a hot key combination. You work on the files you want > >> and when you exit emf the whole dir is hidden again. probably not the most > >> secure system but it will certainly fool most them if you disable booting > >> from a stiffy/floppy. > > > >The problem is this approach is detectible with a suitable 'virus scanner' > >technology. Even if the encrypted folders and such don't appear in the file > >system you have various other pieces of the processing agent that must sit > >around on the drive and hence are open to signature attacks. > > > > The first assertion is not entirely accurate- Which first assertion, his or mine? Youre quoting leaves me confused (not that it is necessarily your fault...;). > I played with Magic Folders > for a while- it relies on a command, usu. in the autoexec.bat or win.ini > file (dos/windows environment) to load, with a bootable floppy disk these > commands would would be bypassed and the so-called "hidden" folder is in > plain sight. One thing is clear, you can't mundge the base OS or else the catch is going to be trivial. ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From petro at playboy.com Mon Sep 21 18:45:22 1998 From: petro at playboy.com (Petro) Date: Tue, 22 Sep 1998 09:45:22 +0800 Subject: Stego-empty hard drives... (fwd) In-Reply-To: <199809220116.UAA20070@einstein.ssz.com> Message-ID: At 8:16 PM -0500 9/21/98, Jim Choate wrote: >Forwarded message: >> Date: Tue, 22 Sep 1998 00:46:03 +0000 >> From: Michael Hohensee >> I believe that the idea was to set it up so that BIOS defaults to >> HD-hiding mode. > >How do you propose to do this? Via a BIOS setting? > >> When you're taking your laptop through customs, you do >> nothing while the machine boots up, the doctored BIOS does its thing, >> and everybody's happy. When you want to get at the stuff on the rest of >> the HD, you reboot and type in your passphrase. > >How do you propose to prompt the user for the correct time to type? Why prompt, you installed it, just have the startup stop at a certain point, just simply pause. You hit a couple keys (4-8) and go on. Given this case you don't really need the security of a long passphrase since if they are looking to get in, you've lost already. -- petro at playboy.com----for work related issues. I don't speak for Playboy. petro at bounty.org-----for everthing else. They wouldn't like that. They REALLY Economic speech IS political speech. wouldn't like that. From petro at playboy.com Mon Sep 21 18:45:26 1998 From: petro at playboy.com (Petro) Date: Tue, 22 Sep 1998 09:45:26 +0800 Subject: Stego-empty hard drives... (fwd) In-Reply-To: <199809220241.VAA20426@einstein.ssz.com> Message-ID: At 9:41 PM -0500 9/21/98, Jim Choate wrote: >Specificaly I am asking: > >Given a BIOS which has been modified to allow the end-user to select between >encrypted and non-encrypted operation, how is the end-user supposed to >make this selection? > >So far I've seen two suggestions: > >1. The BIOS is only 'sensitive' at particular points in the POST. > >2. The BIOS has a user-accessible selection via some method to > activate their selection. > >Both are workable, I'm looking for a more specific description of the >methods. > >In the case of 1., is the marker going to be particular windows which are >bounded by particular messages printed to the boot console? In the case of >2. is it going to be a particular 'magic keystroke' that enables some hidden >option screen? > >It seems to me that both have obvious methods of attack if the only goal is >to demonstrate to a legal standard that such capability exists. If you do (1), and simply have _no_ prompt, just a small space in time AFTER the POST (say, immediately after) to type in your passkey, and things are set up that if you type the wrong keys, it goes straight into hidden space mode, then there would be no suspicion, other than a slightly long boot sequence (and if the wait time were only 2 or 3 seconds, it might not even be noticable.) -- petro at playboy.com----for work related issues. I don't speak for Playboy. petro at bounty.org-----for everthing else. They wouldn't like that. They REALLY Economic speech IS political speech. wouldn't like that. From petro at playboy.com Mon Sep 21 18:45:49 1998 From: petro at playboy.com (Petro) Date: Tue, 22 Sep 1998 09:45:49 +0800 Subject: atheism (was: RE: Democracy... (fwd)) (fwd) In-Reply-To: <199809212348.SAA19564@einstein.ssz.com> Message-ID: At 6:48 PM -0500 9/21/98, Jim Choate wrote: >Forwarded message: > >> Date: Mon, 21 Sep 1998 15:18:28 +0000 (GMT) >> From: attila >> Subject: Re: atheism (was: RE: Democracy... (fwd)) (fwd) > >> father: so... you "deny" God's existence since their is no >> "proof" of His existence. did you ever consider >>that in >> order to "deny" anything, you must have defined that >> concept? in other words, to deny God, you must have >> determined that I or someone else has defined God in >> order for you to be able to "deny" God? > >So, what has the issue of defining something got to do with its existance? >Is this bozo really claiming that God can only exist unless somebody thinks >him up? Sounds like religous hubris to me... >God was shinning on this asshole that he never had to argue face to face >with me at that age... Basically he is saying you can't deny the existence of something if you don't know what it is. God is a label on a definition. Change the definition, and you could conceivably change wheter "God" falls into the "Exists", "Doesn't Exist", or "I donno" state. >> counselor: is there a difference between belief and faith? >The spelling. >> father: aethism is a concept which is almost impossible to >> define as it is a denial that if it could it doesnt. >> it is much easier to defend "agnosticism" where you >> admit you do not believe, or have faith, because you >> lack sufficient scientific proof. aethism is not >> doubting, it is denying, even in the face of proof. >Agnosticism has *nothing* to do with scientific proof. It existed eons >before anyone even thought of the scientific method. Skepticism is a part of >human nature, not philosophy, beliefs, or science. >Atheism is saying that while God could exist he doesn't. In other words it >is the belief that God doesn't exist and can't be proven contrary. There is >a fundamental belief that all proofs are flawed. There are some atheists who would argue that in this universe, God (capital G, the Creator, Omni*, all good, Long white beard & sandals, god of ...) could NOT exist. >Agnosticism is the inability to believe one way or the other. It could be Or simply indecesion. >> suppose you die, and despite your lack of belief or >> faith, you find yourself before the throne of God. >My own personal suspicion is he's going to ask you whether you lived your >beliefs even in the face of overwhelming opposition. As long as you say >"Yes" he's going to be a happy camper. >To borrow a Christian icon, he's going to want to know if you worshiped >false idols. He? Talk about hubris... Personally, I'm not an atheist any more, I'm a apathist. I don't care whether God exists, or even what his characteristics are. I care how whether each and every individual that affects my life acts responsibly and fairly. Other than that, I could give a shit. -- Five seconds later, I'm getting the upside of 15Kv across the nipples. (These ambulance guys sure know how to party). The Ideal we strive for: http://www.iinet.net.au/~bofh/bofh/bofh11.html No, I don't speak for playboy, They wouldn't like that. They really wouldn't. From nobody at replay.com Mon Sep 21 18:59:01 1998 From: nobody at replay.com (Anonymous) Date: Tue, 22 Sep 1998 09:59:01 +0800 Subject: CHALLENGE response (fwd) Message-ID: <199809221501.RAA05998@replay.com> The whole point of the CHALLENGE response went straight over his head, didn't it? It's almost as though there are two mailing lists here: the one for dolts, where Jim Choate gets into his idiotic little arguments with his fellow fools, yammering back and forth on totally off-topic matters, and the one for people interested in cryptography and its implications. We have here the first known case where a key was constructed ex post facto to validate a signed message, in response to Adam Back's challenge. No longer can you assume that just because you posted a signed message on a certain date, and you hold the public key which signed that message, that you can later prove authorship. It challenges some of the implicit assumptions which have been made in using public key cryptography. And all Jim Choate can do is take issue with a snippet of Toto's ravings which were included purely to illustrate the signature validity. He is completely unaware of what is really happening. Jim Choate writes: > Forwarded message: > > > Date: Tue, 22 Sep 1998 08:01:07 +0200 > > From: Anonymous > > Subject: CHALLENGE response > > > "Contrary to one famous philosopher, > > you're saying the medium is not the > > message," Judge Thomas Nelson said, > > alluding to the media theorist Marshall > > McLuhan. > > http://www.nytimes.com/library/cyber/week/120997encrypt-bernstein.html > > > > Bullshit! > > The bits and bytes of email encryption are a clear message > > that I wish to exercise my right to speak freely, without those > > who wish to do me harm invading my privacy. > > If you're going to take that tack then you need to invoke freedom of the > press and not freedom of speech. From petro at playboy.com Mon Sep 21 19:03:42 1998 From: petro at playboy.com (Petro) Date: Tue, 22 Sep 1998 10:03:42 +0800 Subject: ArcotSign (was Re: Does security depend on hardware?) In-Reply-To: <360797EF.A979141A@stud.uni-muenchen.de> Message-ID: At 7:39 AM -0500 9/22/98, Bruce Schneier wrote: >At 02:28 PM 9/22/98 +0100, Mok-Kong Shen wrote: >>Bruce Schneier wrote: >>> >>> At 02:20 PM 9/22/98 +0100, Mok-Kong Shen wrote: >> >>> >If the 'mathematical magic' is not to be kept secret (as in principle >>> >shouldn't for all crypto algorithms) then presumably one could >>> >attack through brute forcing the 'remembered secrect', I guess. >>> >>> Yes, but only through an on-line protocol. And if the server has some >>> kind of "turn the user off after ten bad password guesses," then the >>> atack doesn't work. >> >>I remember someone wrote of the case where the attacker got the >>file with the millions of passwords. Then if he also knows the >>'mathematical magic' he could presumably do offline work. So I >>suppose that the 'mathematical magic' has to be kept secret, which >>would work against the generally accepted crypto principles. > >No. The online protocol can be public. Nothing has to be kept secret >in order for this to work. That would be stupid; we all know that. Also, that things are kept secret/unpublished NOW doesn't mean that they won't be released when the product ships. Not knowing anything about this company, they may have seen a novel way to put existing tools/methods together, and are doing Q/A, interface, and marketing work, and don't want to publicize their methods _yet_ because they COULD be beat to market by a product that has less documentation/Testing/etc. If they seem willing to release the algorythm, and essential parts of the source code, they might have at least a bit of a clue, if Mr. Schneier is willing to bet reputation capital on it, I'd be hesitant to cry "Snake oil". At least the first time. -- petro at playboy.com----for work related issues. I don't speak for Playboy. petro at bounty.org-----for everthing else. They wouldn't like that. They REALLY Economic speech IS political speech. wouldn't like that. From ravage at einstein.ssz.com Mon Sep 21 19:11:39 1998 From: ravage at einstein.ssz.com (Jim Choate) Date: Tue, 22 Sep 1998 10:11:39 +0800 Subject: CHALLENGE response (fwd) Message-ID: <199809221539.KAA04070@einstein.ssz.com> > Subject: CHALLENGE response (fwd) > The whole point of the CHALLENGE response went straight over his head, > didn't it? It didn't go over my head at all. What amazes me is that it took you this long to figure out that one could munge signatures. > We have here the first known case where a key was constructed ex post > facto to validate a signed message, in response to Adam Back's challenge. Um, I don't believe that is true. It may be the first time members of this list have managed it. > No longer can you assume that just because you posted a signed message > on a certain date, and you hold the public key which signed that message, > that you can later prove authorship. It challenges some of the implicit > assumptions which have been made in using public key cryptography. No, it challenges basic assumptions regarding the importance of identity. In no way does it effect the basic math of crypto, public or otherwise. And people wonder why I don't sign my messages... > And all Jim Choate can do is take issue with a snippet of Toto's ravings > which were included purely to illustrate the signature validity. He is > completely unaware of what is really happening. I've taken no issue with Toto or his ravings. Have a nice day. ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From CTIA_Daily_News at um2.unitymail.com Tue Sep 22 10:16:58 1998 From: CTIA_Daily_News at um2.unitymail.com (CTIA Daily News) Date: Tue, 22 Sep 1998 10:16:58 -0700 (PDT) Subject: CTIA Daily News from WOW-COM - September 22, 1998 Message-ID: <199809221711.MAA12560@mailstrom.revnet.com> ========================================== Welcome to today's edition of the CTIA Daily News from WOW-COM.� Please click on the icon / attachment for the most important news in wireless communications today. Your company just formed a partnership in a country you never heard of.� Are you worried about international roaming fraud?� You should be. CTIA's Wireless Security '98 - It's Just Smart Business ORLANDO, FLORIDA � NOVEMBER 9 - 11, 1998 http://www.wow-com.com/professional/ Team WOW-COM wowcom at ctia.org =========================================== -------------- next part -------------- A non-text attachment was scrubbed... Name: bin00022.bin Type: application/octet-stream Size: 8286 bytes Desc: "_CTIA_Daily_News_19980922.htm" URL: From ravage at einstein.ssz.com Mon Sep 21 19:18:45 1998 From: ravage at einstein.ssz.com (Jim Choate) Date: Tue, 22 Sep 1998 10:18:45 +0800 Subject: Stego-empty hard drives... (fwd) Message-ID: <199809221546.KAA04142@einstein.ssz.com> Forwarded message: > Date: Tue, 22 Sep 1998 09:38:18 -0500 > From: Petro > Subject: Re: Stego-empty hard drives... (fwd) > If you do (1), and simply have _no_ prompt, just a small space in > time AFTER the POST (say, immediately after) to type in your passkey, and > things are > set up that if you type the wrong keys, it goes straight into hidden space > mode, then there would be no suspicion, other than a slightly long boot > sequence (and if the wait time were only 2 or 3 seconds, it might not even > be noticable.) If we are discussing only the customs inspector doing a visual inspection this will certainly work. It won't hold up to TEMPEST analysis where they fingerprint a known un-mod'ed unit and then compare that to yours. The POST shouldn't change from laptop to laptop, irrespective of the filesystem or OS that is actualy installed. The point is that this is a weak approach with a variety of attacks open. When one considers the amount of work required to collect BIOS'ed , reverse engineer them (unless you got lots of mullah), develop the crypto, develop the camouflage code, distribute the code, burn the ROM's, distribute the ROM's, cost of suitable TEMPEST monitors, etc. the benefit seems questionable at best. Even if they can't crack it in may places (eg France) such actions would be prosecutable in and of themselves. ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From ravage at einstein.ssz.com Mon Sep 21 19:20:10 1998 From: ravage at einstein.ssz.com (Jim Choate) Date: Tue, 22 Sep 1998 10:20:10 +0800 Subject: Stego-empty hard drives... (fwd) Message-ID: <199809221548.KAA04187@einstein.ssz.com> Forwarded message: > Date: Tue, 22 Sep 1998 09:32:49 -0500 > From: Petro > Subject: Re: Stego-empty hard drives... (fwd) > Why prompt, you installed it, just have the startup stop at a > certain point, just simply pause. You hit a couple keys (4-8) and go on. > Given this case you don't really need the security of a long passphrase > since if they are looking to get in, you've lost already. You'll probably not want it to stop, simpy wait a few seconds. Also, if the passphrase is incorrect you'll not want to issue any error messages. Stopping the boot may be a good indication of a problem. ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From ravage at einstein.ssz.com Mon Sep 21 19:23:07 1998 From: ravage at einstein.ssz.com (Jim Choate) Date: Tue, 22 Sep 1998 10:23:07 +0800 Subject: atheism (was: RE: Democracy... (fwd)) (fwd) Message-ID: <199809221551.KAA04243@einstein.ssz.com> Forwarded message: > Date: Tue, 22 Sep 1998 09:27:57 -0500 > From: Petro > Subject: Re: atheism (was: RE: Democracy... (fwd)) (fwd) > Basically he is saying you can't deny the existence of something if > you don't know what it is. That's the rub, in transcendental religions with this as a proviso it becomes impossible to even talk about God, he transcends the natural world and escapes any hope of comprehension other than a simple label. In effect transcendental religions have defined themselves into a circle. They define God as something undefinable and then claim that anyone who counters their beliefs is at fault because they can't define God. ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From tperf at usa.net Mon Sep 21 19:34:40 1998 From: tperf at usa.net (tperf at usa.net) Date: Tue, 22 Sep 1998 10:34:40 +0800 Subject: For Women Message-ID: <199809221523.IAA02406@toad.com> Dear Adult: This message is intended for mature adults. If it has reached you in error, we apologize. Are you (or someone you care about) affected by the following conditions: � Impotency � Deteriorating sexual function due to: 1. Age 2. Medical Condition 3. Medication 4. Life Style The Performance Technique can reduce or eliminate the adverse affects these conditions have on intimate relations. If not you, maybe a friend, parent or grandparent could benefit. To immediately read about this revolutionary sex technique Visit the Performance Technique Home Page: This is well worth a look. It will change your sex life. Click Here Or go to:http://209.139.56.159/ Good luck - Have fun. President Performance Technique Removal Instructions ------------------------------------------------------------------------ The Mailing List that you are being mailed from was filtered against the Global Remove List at: http://remove-list.com Remove-List is a free public service offering to help the general public get removed from bulk mailings lists and has not been sent this message. If you want their help please add your name to their list and you will not receive a bulk email from us or other ethical bulk emailer. ------------------------------------------------------------------------ From mhahn at tcbtech.com Mon Sep 21 19:40:50 1998 From: mhahn at tcbtech.com (Mark Hahn) Date: Tue, 22 Sep 1998 10:40:50 +0800 Subject: Stego-empty hard drives... (fwd) In-Reply-To: <199809220116.UAA20070@einstein.ssz.com> Message-ID: <3.0.1.32.19980922113203.0097b4b0@mail.aosi.com> At 03:33 PM 9/22/98 +0100, Mok-Kong Shen wrote: >Mark Hahn wrote: >> >> 2) If you can't leave your floppy at home, carry your sensitive data on >> a PCMCIA Type-II Hard Drive. Kingston sells one sporting 500MB >> of capacity. Pop it out and put it as far away from the laptop as you >> can. Inside your other luggage somewhere. > >I am ignorant about hardware. Question: Wouldn't it be possible to >somehow put information on a music CD? Sure. Simply trade offs of what's important to you and the situation you might be in. If disguise is a primary factor, then a write once music CD would be excellent. If you need re-writable capability, use a CD-RW (re-writable CD). However a CD-RW appears gold underneath, not sliver-ish, so you have less of a disguise. If you need fast random access, then neither version of CD will be suitable. Hence the PCMCIA Hard Disk. However, you may have difficulty coming up with a cover story if, indeed, you do not want to tell a customs officer, "Oh, yeah, that's a portable disk drive". As another trade off, most Laptops don't have CD-ROM writing drives, so you would need an outboard drive. There are probably slick, portable versions available, but that's more junk to lug through the airport (and to explain, if necessary.) Also, I was trying to suggest something practical to address the problem. I.e. can be done in a week and under $500. Some of us could re-write the BIOS and flash in the update in that time frame. Others of us will find a credit card and mail order an easier route to take. (uh... minus the lack of anonymity of buying mail order....) -MpH -------- Mark P. Hahn Work: 212-278-5861 mhahn at tcbtech.com Home: 609-275-1834 TCB Technologies, Inc (mhahn at tcbtech.com) Consultant to: The SoGen Funds 1221 Avenue of the Americas, NY NY From ravage at einstein.ssz.com Mon Sep 21 20:05:00 1998 From: ravage at einstein.ssz.com (Jim Choate) Date: Tue, 22 Sep 1998 11:05:00 +0800 Subject: Stego-empty hard drives... (fwd) Message-ID: <199809221631.LAA04509@einstein.ssz.com> Forwarded message: > Date: Tue, 22 Sep 1998 11:32:03 -0500 > From: Mark Hahn > Subject: Re: Stego-empty hard drives... (fwd) > If you need fast random access, then neither version of CD will be > suitable. Hence the PCMCIA Hard Disk. However, you may have > difficulty coming up with a cover story if, indeed, you do not want > to tell a customs officer, "Oh, yeah, that's a portable disk drive". It occured to me that it might be feasible to ship such devices seperately via Fed-Ex or whatever. The question becomes, what do such countries as Great Britian plan for materials crossing their borders in this manner? Are they going to search each package and examine its contents? What does this mean for Dell and their ilk? The ramifications of this aspect are of some interest... ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From nobody at seclab.com Mon Sep 21 20:10:19 1998 From: nobody at seclab.com (User of DOOM) Date: Tue, 22 Sep 1998 11:10:19 +0800 Subject: Clinton's fake apologies (fwd) Message-ID: <199809221610.SAA07027@rogue.seclab.com> Anonymous wrote: > On 20 Sep 1998, [I] wrote: [about lieing] > > I agree it's bad. I agree it undermines the justice system a little bit. > > But, ... impeachment? > > Yes. > > We have some jokester sitting in Washington with full authority over our > military forces. The people can't believe a word he says. Congress can't > believe a word he says. He rules by executive order. He ignores the > Constitution. > > There is argument over whether he ordered military strikes to divert > attention from his scandal and whether he sold the country out to the Red > Chinese. Now people like myself are thinking - totally justified - that > this guy will do absolutely anything to hold on to his presidency. > > I don't feel particularly secure with some guy who I can't trust running > the military and with his finger on the nuclear button. That itself is a > violation of national security. Understandable sentiments. The position I can't understand is Jim's, of being totally outraged by the lieing under oath regardless of anything else. [although I respect his right to that opinion]. Unfortunately, you now wear the mantle of wanting to put away Bill "Al Capone" Klinton not for tax evasion, but for "fibbing". -- an anonymous aol32 user. From petro at playboy.com Mon Sep 21 20:13:26 1998 From: petro at playboy.com (Petro) Date: Tue, 22 Sep 1998 11:13:26 +0800 Subject: Stego-empty hard drives... (fwd) In-Reply-To: <199809221548.KAA04187@einstein.ssz.com> Message-ID: At 10:48 AM -0500 9/22/98, Jim Choate wrote: >Forwarded message: > >> Date: Tue, 22 Sep 1998 09:32:49 -0500 >> From: Petro >> Subject: Re: Stego-empty hard drives... (fwd) > >> Why prompt, you installed it, just have the startup stop at a >> certain point, just simply pause. You hit a couple keys (4-8) and go on. >> Given this case you don't really need the security of a long passphrase >> since if they are looking to get in, you've lost already. > >You'll probably not want it to stop, simpy wait a few seconds. Also, if >the passphrase is incorrect you'll not want to issue any error messages. > >Stopping the boot may be a good indication of a problem. I don't know how hard this would be, but how about running a seperate memory check, and while those numbers are flashing on the screen, do the wait for imput? -- petro at playboy.com----for work related issues. I don't speak for Playboy. petro at bounty.org-----for everthing else. They wouldn't like that. They REALLY Economic speech IS political speech. wouldn't like that. From nobody at nowhere.to Mon Sep 21 20:14:54 1998 From: nobody at nowhere.to (Anonymous) Date: Tue, 22 Sep 1998 11:14:54 +0800 Subject: Clinton's fake apologies (fwd) Message-ID: <604c1f67fef5147bd9135cda03e0d7da@anonymous> on 20 Sep 1998 at 09:52:24 Reeza! wrote: > > At 09:21 PM 9/19/98 -0000, Anonymous wrote: > > > >What? To tell a lie is one thing, but ...[etc] > It was prefaced with "...to tell the truth, the whole truth, and nothing > but the truth...". > Straighten out your head, you seem to be a few neurons short of a > functional synapse. > > Reeza! I understand you think this is persuasive, but I don't understand why. and then at Sun, 20 Sep 1998 15:26:05 Reeza! wrote: > At 03:24 AM 9/20/98 -0000, Anonymous wrote: > > > >I agree it's bad. I agree it undermines the justice system a little bit. > >But, ... impeachment? > > > > I could care less if he had an affair, personally. But he had an affair > with a subordinate in his direct employ. [more] > I congratulate you for your defense of a person who demonstrably has broken > his marriage vows, his oath of public office, and purjured himself while > under an additional oath in a court of law. You do remember from 6 hours earlier that we're talking about lieing? Your raising other issues is irrelevant. You're building up the bogey man. [Jim Choate recently described this method as a "Strawman".] I suggested there are things Bill's done that are worse. Are you sure you're disagreeing? Do you have anything worthwhile to bring to the discussion? > You, too, are a few neurons short of a functional synapse. > > I suggest you discuss it with the maker. The best way is large caliber > bullet at sufficient velocity to penetrate and exit the cranial cavity. > > God speed, you fucking idiot. > I guess not. > Reeza! -- an anonymous aol32 user. From mgm at tis.com Mon Sep 21 20:21:33 1998 From: mgm at tis.com (Matthew Mundy) Date: Tue, 22 Sep 1998 11:21:33 +0800 Subject: Remove Message-ID: remove From rah at shipwright.com Mon Sep 21 20:35:51 1998 From: rah at shipwright.com (Robert Hettinga) Date: Tue, 22 Sep 1998 11:35:51 +0800 Subject: IP: Dead Men Tell No Tales Message-ID: --- begin forwarded text Delivered-To: ignition-point at majordomo.pobox.com Date: Tue, 22 Sep 1998 05:18:16 -0400 (EDT) To: ignition-point at majordomo.pobox.com From: softwar at us.net (CharlesSmith) Subject: IP: Dead Men Tell No Tales Sender: owner-ignition-point at majordomo.pobox.com Precedence: list Reply-To: softwar at us.net (CharlesSmith) http://www.worldnetdaily.com/smith/980922.comcs.html It is said, "dead men tell no tales." If that were true, then America would have never known of the real story behind the Clinton administration. Two dead men are calling from their graves for the last few years of their lives to be told. The ghosts of Vince Foster and Ron Brown hover over Bill Clinton. Vince Foster and Ron Brown were both involved in the Clinton - China encryption scandal. One known event took place in May 1993 when Vince Foster, Webster Hubbell and Bernard Nussbaum paid the National Security Administration (NSA) a visit. These three fine gentlemen, with close connections to Hillary Clinton and the Arkansas Rose Office Law Firm, were tasked by President Clinton to help develop policy for U.S. communications technology. According to Foster's secretary, the White House lawyer also had binders from the NSA in his office. Binders that were never turned over by the White House. White House officials denied that Foster had any connection with the NSA. However, documents forced from the NSA by Washington Weekly and an interview with former NSA Director Adm. McConnell both confirmed Foster's presence at Ft. Meade in 1993. Foster's attendance at Ft. Meade also confirmed that Attorney General Janet Reno tasked Hubbell to encryption policy. Hubbell had access to Top Secret material on U.S. encryption. This fact was confirmed by a series of 1997 interviews with Democratic and Republican staff members in the House. Congressman Dan Burton currently holds documents where Hubbell held long meetings with Foster and now CIA Director George Tenet inside the White House in 1993. Burton cannot release those documents because Democratic members have threatened to walk. Hubbell was convicted in 1994 for fraud at the same time he was paid hundreds of thousands of dollars by Indonesian billionaire Moctar Riady. Riady and his Lippo group had a great deal of interest in advanced U.S. technology. Riady's man inside the Clinton administration was John Huang at the Brown Commerce Department. The Commerce Department asserted in writing in 1997 to this author that John Huang had no encryption documentation. Yet, the CIA briefed Huang 37 times on satellite encryption technology while at Commerce. Huang's co-worker, former DNC fundraiser Ira Sockowitz, walked out of the Commerce Department in 1996 with over 2,000 pages of top secret information on satellite encryption, space launch and earth imaging technology. Sockowitz was supposed to fly with Brown on the fatal trade trip but he took an advance flight ahead of the Secretary instead. Sockowitz identified Ron Brown's body at the crash scene. Sockowitz left Commerce with the secrets only days after Brown's death. He was never prosecuted nor investigated. One Sockowitz document was so classified that the NSA sent a representative to testify before Federal Judge Royce Lamberth in order to keep it secret. NSA testimony showed that Sockowitz took a highly classified report based on informants from inside other countries and inside the U.S. The list of nations and foreign intelligence services affected by the leaked report reads like a Rand McNally road map of secret services around the world. According to the testimony, release of the report would affect the "careers" of many foreign officials. The last U.S. official who had similar career problems was convicted spy Johnathan Pollard - now spending life in prison for passing U.S. encryption secrets to Israel. Other documents hidden among the Sockowitz files include a classified series of memos from the Commerce Undersecretary for Export Administration (BXA) William Reinsch. The memos detail a July 1996 Clinton waiver for Loral satellite exports to China and Russia. In July 1998, House National Security Committee Chairman Spence told BXA head Reinsch to produce that memo and other documents taken by Sockowitz. So far, the White House and Reinsch have been unable to comply. Loral attorneys also claimed to Chairman Rohrabacher of the House Space Sub-Committee that the million dollars Loral CEO Schwartz gave to the DNC bought no special favors, and that Loral passed no military technology to China. The Loral claims are ridiculous. Loral's own letters of complaint to Ron Brown clearly show both claims to be false. The claim that no military technology was exported is disputed by Loral's own 1994 briefing memo given to Ron Brown that states that satellites such as Globalstar were "commercial applications of DoD technology." Another example is when Loral DEFENSE President Jerald Lindfelt wrote Brown a letter in 1996 where he expressed his desire to sell advanced Synthetic Aperture Radar (SAR) technology to China. Lindfelt wrote "We've worked hard trying to resolve these problems with the Department of State, the Department of Commerce and the Defense Technology Security Administration (DTSA), but someone in these organizations always manages to block our participation... Could you help us by identifying someone in the Commerce Department high enough in the organization to help us resolve these issues and open this marketplace to our participation." Thus, Loral "Defense" President Lindfelt asked Brown to over-ride the State Department, the Defense Department and the Commerce Department to ship a radar system that experts in all three agencies had objected to. Only Clinton could do that, and he took big dollars from Bernard Schwartz. The claim that Mr. Schwartz received no special favors is almost laughable. In 1996 Loral requested that President Clinton hold up his signature on the Globalstar export waiver so Loral could include an encrypted satellite telemetry control station for China. In 1994 President Clinton arranged for Schwartz to meet Shen Rong-Jun, Vice Minister of the Chinese Commission of Science, Technology and Industry for National Defense (COSTIND). Of course, Shen Rong-Jun usually goes by his better known title of Lt. General Shen Rong-Jun of the People's Liberation Army. COSTIND, according to the GAO, is "an agency of the Chinese military (which) oversees development of China's weapon systems and is responsible for identifying and acquiring telecommunications technology applicable for military use." Another example from the files of Ron Brown shows that the wife of Chinese General Ding Henggao, Madam Nie Li, obtained permission under a "commercial license" through the Commerce Department to export an advanced - encrypted - secure fiber optic communications system to China. According to the same documentation, General Ding Henggao is also the Director of COSTIND. The same 1996 document notes that Mr. Xie Zhichao, COSTIND Electronics Design Bureau Director, and communications expert Deng Changru were part of the executive management for the same Chinese front company. Mr. Xie and Mr. Deng also have other formal titles. They are both Lt. Colonels in the Chinese Red Army. These astonishing facts on Clinton - Chinese Army deals come directly from the U.S. Commerce Department. Yet, the Commerce Department claimed on September 1, 1998 that it cannot "confirm nor deny the existence of any records" in regard to a Freedom of Information (FOIA) request for information on "COSTIND". Furthermore, the Commerce Department claims "If records were to exist they would be exempt from disclosure... unless the release of such information is determined by the Secretary to be in the national interest." Obviously, I can confirm that documents on COSTIND exist inside the Commerce Department. There is still more evidence the Commerce Department is covering up crimes committed under Secretary Brown. For example, in response to two different FOIA requests, the Commerce Department returned one trade report twice in 1998. The first version of the trade report was heavily blacked out for "commercial" and "privacy" reasons. The second, a duplicate of the first, revealed that Indonesian dictator Suharto had cut his son-in-law in on a private powerplant deal built and financed by the U.S. government. Of course, the U.S. contractor that needed Brown advocacy to win the deal was also a big donor to the DNC. The accidentally released 1994 APEC Advocacy trade report spells out exactly the kind of data being withheld from the U.S. public. The report shows the Brown Commerce Department pushed the power plant despite known corruption and kickbacks. "ADB is skiddish about involvement of Indonesia's first family (a minority shareholder is married to Pres. Suharto's daughter)... Ambassador Barry has been working with Executive Director Linda Yang, at the ADB who is 'doing all she can.'" Another page from the 1994 trade report shows that Commerce officials were suspicious of Indonesian corruption with French space companies. The document notes the intense competition to win satellite launch contracts for Indonesia between the U.S. and France included "allegations that the French have paid 'incentive money' to the Indonesians, but this cannot be confirmed." Written evidence that American, Indonesian and French taxpayers were being swindled. Three governments, spanning three continents, all involved in one crime. A trail of evidence leading to the Commerce Department and to Bill Clinton, all blacked out in one hidden report from the late Ron Brown. The ghosts of dead men haunt this government, kept alive by fresh lies and hidden under blacked out reports. Evidence on the transfer of nuclear missile technology to communist China and kickbacks to the Clinton/Gore campaign. Despite the evidence of crimes - the cover-up continues at the Commerce Department, at Ft. Meade, and inside the White House. ============================================================ index of source documents - http://www.softwar.net/costind.html ================================================================ 1 if by land, 2 if by sea. Paul Revere - encryption 1775 Charles R. Smith SOFTWAR http://www.softwar.net softwar at softwar.net Pcyphered SIGNATURE: 2BCB1A1B6350FF06670487EF4EC39FA8539A8B6B2720FA81AFA3F989DE9212C9 0F35E078318ED643A042651B7D3AB98E1FFC6193C4BD66B6ECD09A7284497DD0 A830BB83F7E72248 ================================================================ SOFTWAR EMAIL NEWSLETTER 09/22/1998 *** to unsubscribe reply with "unsubscribe" as subject *** ================================================================ ********************************************** To subscribe or unsubscribe, email: majordomo at majordomo.pobox.com with the message: (un)subscribe ignition-point email at address ********************************************** www.telepath.com/believer ********************************************** --- end forwarded text ----------------- Robert A. Hettinga Philodox Financial Technology Evangelism 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From sunder at brainlink.com Mon Sep 21 20:58:29 1998 From: sunder at brainlink.com (Sunder) Date: Tue, 22 Sep 1998 11:58:29 +0800 Subject: Stego-empty hard drives... (fwd) In-Reply-To: <199809221500.KAA03503@einstein.ssz.com> Message-ID: <3607D670.2FB37E4E@brainlink.com> Jim Choate wrote: > > I am ignorant about hardware. Question: Wouldn't it be possible to > > somehow put information on a music CD? > > > > Absolutely, though the fact that it's r/w'able is going to set some flags > off. Now if you can find somebody who makes R/W CD's that aren't blue, > green, yellow, etc. and instead the clear that is normaly expected you might > pull it off. You could always compress the fuck out of the data and save it as 2d bar codes (PDF417) in a printed book, or to photographic slides, or the inside of a silk tie, or as a tatoo on your ass, or make your own under the skin transponder chips and implant yourself with hundreds of them, etc... (Sorry this thread is just getting too silly and so am I... :) -- =====================================Kaos=Keraunos=Kybernetos============== .+.^.+.| Sunder |Prying open my 3rd eye. So good to see |./|\. ..\|/..|sunder at sundernet.com|you once again. I thought you were |/\|/\ <--*-->| ------------------ |hiding, and you thought that I had run |\/|\/ ../|\..| "A toast to Odin, |away chasing the tail of dogma. I opened|.\|/. .+.v.+.|God of screwdrivers"|my eye and there we were.... |..... ======================= http://www.sundernet.com ========================== From schneier at counterpane.com Mon Sep 21 21:01:33 1998 From: schneier at counterpane.com (Bruce Schneier) Date: Tue, 22 Sep 1998 12:01:33 +0800 Subject: ArcotSign (was Re: Does security depend on hardware?) In-Reply-To: Message-ID: <4.0.2.19980922114142.00956610@mail.visi.com> At 03:04 PM 9/22/98 +0100, Mok-Kong Shen wrote: >Bruce Schneier wrote: >> >> >I suppose you misunderstood me. I mean the 'mathematical magic' >> >cannot be made public. (Or is 'online protocol' = 'mathematical magic'?) >> >If the 'magic' is public then the attacker with the pool of passwords >> >could brute force offline. >> >> No. You misunderstood me. There is NOTHING secret except the key. >> The online protocol, mathematical magic, source code, algorithm details, >> and everything else can be made public. There are no secrets in the >> system except for the keys. > >In that case please allow me to go back to a point raised by me >previously. The user uses his 'remembered secret' (of fewer bits) >through a public algorithm (including protocol) to retrieve from a >pool the password (of more bits). If the attacker doesn't have the >pool then everything looks fine. But if he manages to get the pool >(a case someone mentioned in this thread) then he can obviously >brute force offline, I believe, since he possesses now everything >the legitimate user has, excepting the 'remembered secret'. Or is >there anything wrong with my logic? Yes. There is something wrong with you logic. Bruce ********************************************************************** Bruce Schneier, President, Counterpane Systems Phone: 612-823-1098 101 E Minnehaha Parkway, Minneapolis, MN 55419 Fax: 612-823-1590 Free crypto newsletter. See: http://www.counterpane.com From schneier at counterpane.com Mon Sep 21 21:02:21 1998 From: schneier at counterpane.com (Bruce Schneier) Date: Tue, 22 Sep 1998 12:02:21 +0800 Subject: ArcotSign (was Re: Does security depend on hardware?) In-Reply-To: Message-ID: <4.0.2.19980922114219.00928f00@mail.visi.com> At 03:24 PM 9/22/98 +0100, Ben Laurie wrote: >Bruce Schneier wrote: >> >(I suppose the 'remembered secret' has less bits then the 'password' >> >that is to be retrieved from the pool of millions with the >> >'mathematical magic'). So the advantages of the scheme appear to >> >remain unclear as a matter of principle. >> >> The advantages are that offline password guessing is impossible. > >The 'I' word always makes me nervous - do you really mean that, or do >you just mean "very difficult"? Intractable, actually. Bruce ********************************************************************** Bruce Schneier, President, Counterpane Systems Phone: 612-823-1098 101 E Minnehaha Parkway, Minneapolis, MN 55419 Fax: 612-823-1590 Free crypto newsletter. See: http://www.counterpane.com From stuffed at stuffed.net Tue Sep 22 12:03:17 1998 From: stuffed at stuffed.net (STUFFED NEWS DAILY) Date: Tue, 22 Sep 1998 12:03:17 -0700 (PDT) Subject: Oh boy, some goodies today. Porn starr on our payroll/Spice girls go 69 Message-ID: <19980922071000.13745.qmail@eureka.abc-web.com> What's better than 10 free sexy pics a day? 30 free sexy pics a day. Stuffed has the pics, stories and nutty sexy news! It doesn't get any better than this, come on take a peek we dare you! IN TODAY'S ISSUE: SPURED LOVER SPREADS PIX! HOW TO BAG A BAR BABE THE BEST OF EUREKA NEW KIT LETS TEENAGE GIRLS CREATE IMAGINARY BOYFRIENDS MORE FUN WITH MS WORD LEWINSKY'S GOT THE BLUES IN ROME SURVEY - MOST FOLKS ONLY READ SEXY PARTS OF THE STARR REPORT SEX WITH CINDY-CRAWFORD ----> http://stuffed.net/98/9/22/ <---- Welcome to today's issue of Stuffed. To read it you should click on the URL above. If it is not made clickable by your email program you will need to use your mouse to highlight the URL, copy it and then paste it into your browser (then press Return). This email is never sent unsolicited. Stuffed is the supplement for the Eureka newsletter you subscribed to. Full instructions on unsubscribing are in every issue of Eureka! ----> http://stuffed.net/98/9/22/ <---- From ravage at einstein.ssz.com Mon Sep 21 21:18:36 1998 From: ravage at einstein.ssz.com (Jim Choate) Date: Tue, 22 Sep 1998 12:18:36 +0800 Subject: Stego-empty hard drives... (fwd) Message-ID: <199809221743.MAA05104@einstein.ssz.com> Forwarded message: > Date: Tue, 22 Sep 1998 11:07:34 -0500 > From: Petro > Subject: Re: Stego-empty hard drives... (fwd) > I don't know how hard this would be, but how about running a > seperate memory check, and while those numbers are flashing on the screen, > do the wait for imput? So hide the keyscan in the memory counter code. Would work externaly, would probably not show up on TEMPEST. Since both the keyscan and the memory scan are repetitive TEMPEST might have a problem telling them apart. Provided you could get the keyscan in the same footprint as the mem check the BIOS would not show up as anomolous in size. As long as they're not running around doing checksums you'd be ok (I suspect). ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From sunder at brainlink.com Mon Sep 21 21:37:40 1998 From: sunder at brainlink.com (Sunder) Date: Tue, 22 Sep 1998 12:37:40 +0800 Subject: Stego-empty hard drives... (fwd) In-Reply-To: <199809212323.SAA19241@einstein.ssz.com> Message-ID: <3607DFB6.CAC75C9C@brainlink.com> Jim Choate wrote: > > Forwarded message: > > > Date: Mon, 21 Sep 1998 16:05:30 -0400 > > From: Sunder > > Subject: Re: Stego-empty hard drives... > > > What's this bullshit, eh? Just overwrite the BIOS roms in your machine to > > return all zeros for the sectors you don't want to show them. Have some > > special passphrase you have to type in while in the BIOS setup program to > > deactivate this. Most newer notebooks have flash upgradeable ROMs anyway. > > What's this bullshit, eh? > > I wonder how you propose to answer the question: > > "Sir, exactly why are you typing that sentence into the computer at this > time?" Ah hem! To quote myself: > > What's this bullshit, eh? Just overwrite the BIOS roms in your machine to > > return all zeros for the sectors you don't want to show them. Have some > > special passphrase you have to type in while in the BIOS setup program to > > deactivate this. Most newer notebooks have flash upgradeable ROMs anyway. ^^^^^^^^^^^^^^^ By "this" I mean the method of not allowing access to the hidden cylinders. By deactivating, I mean disabling the routine that hides the hidden cylinders, thus letting you access the partition. This means that you wouldn't be typing in the special passphrase in front of the Customs official. It means that when >YOU< wish to use your encrypted partition (in the privacy of your hotel root), you would type in the passphrase to activate it's visibility and accesibility to the rest of your machine. Further that BY DEFAULT, the hidden space on the drive (preferably a partition) would normally not be reported by the bios hiding the true number of cylinders from the OS's. > Now we have not only given them probably cause but clear evidence for a > prior intent to commit a crime. Even if your hard drive is clean they're > going to bust your ass. How? You won't type in the passphrase in front of them. You'll let the bios do its thing and HIDE the extra partion from their scanner. -- =====================================Kaos=Keraunos=Kybernetos============== .+.^.+.| Sunder |Prying open my 3rd eye. So good to see |./|\. ..\|/..|sunder at sundernet.com|you once again. I thought you were |/\|/\ <--*-->| ------------------ |hiding, and you thought that I had run |\/|\/ ../|\..| "A toast to Odin, |away chasing the tail of dogma. I opened|.\|/. .+.v.+.|God of screwdrivers"|my eye and there we were.... |..... ======================= http://www.sundernet.com ========================== From proff at iq.org Mon Sep 21 21:38:31 1998 From: proff at iq.org (proff at iq.org) Date: Tue, 22 Sep 1998 12:38:31 +0800 Subject: ArcotSign (was Re: Does security depend on hardware?) In-Reply-To: <4.0.2.19980922114142.00956610@mail.visi.com> Message-ID: <19980922174008.17487.qmail@iq.org> > >the legitimate user has, excepting the 'remembered secret'. Or is > >there anything wrong with my logic? > > Yes. There is something wrong with you logic. > > Bruce > ********************************************************************** > Bruce Schneier, President, Counterpane Systems Phone: 612-823-1098 There's something wrong with you grammer. Cheers, Julian. From mah248 at is9.nyu.edu Mon Sep 21 21:43:09 1998 From: mah248 at is9.nyu.edu (Michael Hohensee) Date: Tue, 22 Sep 1998 12:43:09 +0800 Subject: Stego-empty hard drives... (fwd) In-Reply-To: <199809220116.UAA20070@einstein.ssz.com> Message-ID: <3607E291.4D7BFFBA@is9.nyu.edu> Jim Choate wrote: > > Forwarded message: > > > Date: Tue, 22 Sep 1998 00:46:03 +0000 > > From: Michael Hohensee > > Subject: Re: Stego-empty hard drives... (fwd) > > > I believe that the idea was to set it up so that BIOS defaults to > > HD-hiding mode. > > How do you propose to do this? Via a BIOS setting? Well, I don't propose to do it at all, since I lack the expertise to do it or even know how much trouble it would be to do it. :) I believe that the idea was to change BIOS itself. That is, change the BIOS program, rather than a setting. This was to be done by flash-updating the BIOS with a new program. > > When you're taking your laptop through customs, you do > > nothing while the machine boots up, the doctored BIOS does its thing, > > and everybody's happy. When you want to get at the stuff on the rest of > > the HD, you reboot and type in your passphrase. > > How do you propose to prompt the user for the correct time to type? Perhaps the new BIOS program listens for something like Ctrl-Shift-P, and if it gets it, goes into passphrase mode. Otherwise, it does its little trick. As long as the doctored BIOS program produces a normal looking bootup sequence (but hides the HD), everything's fine. From howree at cable.navy.mil Mon Sep 21 22:00:33 1998 From: howree at cable.navy.mil (Reeza!) Date: Tue, 22 Sep 1998 13:00:33 +0800 Subject: Stego-empty hard drives... (fwd) In-Reply-To: <199809221504.KAA03594@einstein.ssz.com> Message-ID: <3.0.5.32.19980923040020.0080d6d0@205.83.192.13> At 10:04 AM 9/22/98 -0500, Jim Choate wrote: >>Reeza! wrote: >> The first assertion is not entirely accurate- > >Which first assertion, his or mine? Youre quoting leaves me confused (not >that it is necessarily your fault...;). His. > >> I played with Magic Folders >> for a while- it relies on a command, usu. in the autoexec.bat or win.ini >> file (dos/windows environment) to load, with a bootable floppy disk these >> commands would would be bypassed and the so-called "hidden" folder is in >> plain sight. > >One thing is clear, you can't mundge the base OS or else the catch is going >to be trivial. > Ain't it the truth. :b Reeza! "...The world was on fire, but no one could save me but you... Strange what desire will make foolish people do... (and the background vocalists sang) This world is only gonna break your heart...." ==C.I.== From howree at cable.navy.mil Mon Sep 21 22:08:32 1998 From: howree at cable.navy.mil (Reeza!) Date: Tue, 22 Sep 1998 13:08:32 +0800 Subject: Stego-empty hard drives... (fwd) In-Reply-To: <199809221548.KAA04187@einstein.ssz.com> Message-ID: <3.0.5.32.19980923040813.007bf100@205.83.192.13> At 10:48 AM 9/22/98 -0500, Jim Choate wrote: >Forwarded message: > >> Date: Tue, 22 Sep 1998 09:32:49 -0500 >> From: Petro >> Subject: Re: Stego-empty hard drives... (fwd) > >> Why prompt, you installed it, just have the startup stop at a >> certain point, just simply pause. You hit a couple keys (4-8) and go on. >> Given this case you don't really need the security of a long passphrase >> since if they are looking to get in, you've lost already. > >You'll probably not want it to stop, simpy wait a few seconds. Also, if >the passphrase is incorrect you'll not want to issue any error messages. > >Stopping the boot may be a good indication of a problem. > So offer the disclaimer that it is f*cked up and will be going straight to the repair shop when you (the traveler) get back to "home". Who are they to know the difference? Reeza! From petro at playboy.com Mon Sep 21 22:14:38 1998 From: petro at playboy.com (Petro) Date: Tue, 22 Sep 1998 13:14:38 +0800 Subject: Stego-empty hard drives... (fwd) In-Reply-To: <199809221743.MAA05104@einstein.ssz.com> Message-ID: At 12:43 PM -0500 9/22/98, Jim Choate wrote: >Forwarded message: >> I don't know how hard this would be, but how about running a >> seperate memory check, and while those numbers are flashing on the screen, >> do the wait for imput? > >So hide the keyscan in the memory counter code. Would work externaly, would >probably not show up on TEMPEST. Since both the keyscan and the memory scan >are repetitive TEMPEST might have a problem telling them apart. Provided you >could get the keyscan in the same footprint as the mem check the BIOS >would not show up as anomolous in size. As long as they're not running >around doing checksums you'd be ok (I suspect). At a certain threat level or level of "interest" in your affairs, whether you can hide the fact that you are using crypto or not is going to become irrelevant. In otherwords, if your threat level realistically includes CIA/NSA you're well and fucked. If "they" think you are a serious threat to them (as opposed to being a serious threat to the government/country) they will get you, they will lie, they will cheat, they will give some poor bastard plastic surgery to look like you, and take pot shots at the president on National TV, and then "escape custody". If you are operating at this level, you are trying to hide _your_ activities from prying eyes, true, but you are also trying to prevent _others_ from being compromised. If your opponent is using tempest, you are operating at that level. Tempest is expensive, and I'd imagine would have to be calibrated not only for each processor ([3-6]86, with all the variations (sx/dx, celeron, xenon etc,) as well as the NEC. AMD. and Cyrix clones thereof, ARM & StrongARM processors, PPC 601/3/4/G-3 processors, Motorola 68k processors, sparc processors etc) but (if you are looking at what the POST & BIOS actually does) for each BIOS AND OS. This is NOT an easy task, nor can it be done by a Bozo operating a X-Ray machine at an airport. If you have attacted enough attention to warrant the expense that this investigation is bringing on, you better either be totally clean AND on everyones good side, or they ARE going to find something. They're the government, locking people up is what they do best. -- petro at playboy.com----for work related issues. I don't speak for Playboy. petro at bounty.org-----for everthing else. They wouldn't like that. They REALLY Economic speech IS political speech. wouldn't like that. From nobody at replay.com Mon Sep 21 22:22:23 1998 From: nobody at replay.com (Anonymous) Date: Tue, 22 Sep 1998 13:22:23 +0800 Subject: ArcotSign Message-ID: <199809221821.UAA24448@replay.com> Greg Broiles writes: > I'm certainly not a cryptographer, but I'm somewhat at a loss in trying to > understand the purpose of using public-key (or asymmetric key) > cryptography within a policy/technology system which won't allow the use > of the strengths of asymmetric key crypto. As I understand the paper you > reference above, to implement this system the public key must be kept > confidential, and signed documents must also be kept confidential, or the > system of the security as a whole is at risk. With those constraints, why > bother with the overhead (computationally/technically/legally) of > asymmetric key crypto at all? Based on http://www.arcot.com/camo2.html, the idea is to defend against an attacker who manages to steal a copy of the secret key file, and who then tries to guess the passphrase which protects it. The file data is encrypted in an unstructured generic manner so that all decryptions look like random data, even the correct one. This gives the attacker no information about when he has guessed the correct passphrase. For this to work, the public key has to be kept secret(!). Otherwise the right passphrase could be discovered by testing the decrypted private key against the public key. Arcot suggests that this would be appropriate for an environment where only one or a few trusted servers need to authenticate users. These servers would be the only ones which have copies of the public keys. (It is not necessary that signed documents be kept confidential, however a randomized signing algorithm must be used.) As Greg points out, much the same could be accomplished simply by having the servers share secret 3DES keys with their users, each user having his own private 3DES key. The users could encrypt messages using their 3DES key and the server would decrypt using the appropriate key, which would also serve to authenticate the user. The Arcot people suggest that an advantage over this scheme is that servers don't have to store information on all clients. But much the same thing could be done with symmetric cryptography. In the Arcot system, the client sends his public key certificate, encrypted to the server, along with his request. The server receives the cert and uses it to verify/decrypt the message. With symmetric cryptography, the client could have the shared 3DES key encrypted using the server's public key, and send that along with his message in a similar way. The confusing thing about the Arcot system is this: how sensitive is the public key? Is it as sensitive as a shared secret key? Superficially not, since in order to exploit the public key you also have to steal the private key file and then guess the passphrase. But on the other hand, if this is more than security through obscurity, you have to treat it in many ways as equally sensitive. Users of the Arcot system, believing that they are safe because their public keys are secret, may become casual about revealing their private key files and choosing easy to guess passphrases. They might even send the files around via insecure channels. With this kind of usage, the public key does become just as sensitive as a shared secret key would be. In that case, not only the servers, but all parts of the PKI must be brought inside the trust boundary. They are all holding material which, if revealed, would compromise the security around which the system is built. You end up with trust relationships more similar to those in a system like Kerberos than in a normal PKI. > Is it really necessary/useful to call the scheme "software smart cards"? > If it were called "An improved system for user authentication", I don't > think it would make people nearly so suspicious. From my perspective, one > of the advantages of smart card technology is that I can carry my > authentication material with me; a system which puts it on my hard disk is > less attractive. Floppies are portable, but not durable. The analogy with smart cards is that these cards protect your private key. With a perfect smart card, an attacker can't do any better than chance guessing of your private key. With the Arcot system, the same is true. Decrypting the private key file gives no information about its content, because pure random data is encrypted. Therefore with their system the attacker also can't do better than chance guessing. However this ignores the cost of the system, discarding many of the advantages of public key cryptography. You don't have to do that if you use smart cards. > I didn't understand the relationship between this scheme and Rivest's > chaffing and winnowing which you note was cited as a reference in the SSC > paper - would you (or someone else) mind explaining the connection? Yes, this seems obscure. From sunder at brainlink.com Mon Sep 21 22:28:19 1998 From: sunder at brainlink.com (Sunder) Date: Tue, 22 Sep 1998 13:28:19 +0800 Subject: Stego-empty hard drives... (fwd) In-Reply-To: <199809221546.KAA04142@einstein.ssz.com> Message-ID: <3607EB86.D71858FA@brainlink.com> Jim Choate wrote: > The point is that this is a weak approach with a variety of attacks open. All stego methods are weak approaches at hiding data. The point is to hide the fact that there is hidden data and make it look like the notebook is a perfectly normal unmodified notebook. There's no perfect stego method that cannot be detected by a determined analyzer. You can hide all the data you want in the low bits, but they naturally have biases (low entropy) that if not present indicates stego (which has high entropy.) > When one considers the amount of work required to collect BIOS'ed , reverse > engineer them (unless you got lots of mullah), develop the crypto, > develop the camouflage code, distribute the code, burn the ROM's, distribute > the ROM's, cost of suitable TEMPEST monitors, etc. the benefit seems > questionable at best. Who the fuck is gonna run a tempest scanner on your notebook again? Let's stick to the scope of this: UK scans of your notebook using bootable floppies. And tell me, if you were to modify your BIOS to get around this, WHY would you need a tempest monitor? Why would you need to collect BIOSes? You only need to modify a single BIOS - the one on >YOUR< notebook. The camouflage code would be a few hundred bytes at most unless you do something overly elaborate. An EEPROM burner (which for flash upgradeable notebooks isn't needed) is fairly cheap. JDR sold them for about $200 or less. For flashable BIOSes this is FREE! Disassemblers (debuggers) are fairly cheap. DOS and WIN95 come with a simple one called debug. BIOSes run in 16 bit mode since booting requires that PC's run in 16 bit mode and there are plenty of books and info on 16 bit x86 programming. You don't need to disasemble everything in the BIOS, you just need to disable the checksum routine the bios uses on itself, and you need to slightly modify the place that detects the size of the IDE drive to not go beyond a certain number of pointers. Further, PC bioses do support BIOS extensions, you generally wouldn't need to modify the existing BIOS very much at all. If you can add a BIOS extension, the existing BIOS will happily run code from it. This is how SCSI adapters provide booting capabilities from SCSI disks. Of course it's a bit harder in a notebook computer, but it too can be done. Back in the days of the Commodore 64 which had only mono sound, it was fairly comon to piggy back and solder a second sound chip on top of the existing one with the exception of a few of the pins, and turn your C64 into a stero machine. (One of the pins was an address pin, the other were sound out.) A similar thing might be done with an EEPROM. The way BIOSes work is that they can be set to either detect the IDE drive size always, or just once. Set them to NOT detect. They store the drive type (0-47) and size params in the battery backed up CMOS. An easy, but less effective thing to do is to simply write over the CMOS data that says X cylinders, Y heads, Z sectors/track, and modify the partition table a bit. You can do both from DEBUG. You'll have to write a tiny bit of assembly, but not much. But again, if they bypass the BIOS and talk directly to the IDE controller, none of these techniques - short of modifying the IDE controller or drive, won't work. > Even if they can't crack it in may places (eg France) such actions would > be prosecutable in and of themselves. You forgot to say "If you get caught." :) With successful stego, nobody other than the owner knows that it's there. If you visit France and have a notebook computer, expect the Ministry of Whatever to sneak in your hotel room when you're not there and copy your notebook's hard drive anyway. Such things have been reported as industrial espionage. (Talk to the folks on the spyking list about getting refrences.) One thing all you fine folks are forgetting is that there are MANY MANY types of notebooks out there. My money says that if they can't scan Mac's they also won't be able to scan Sparc books, Alpha Books, Newtons, Palm Pilots, and many WinCE palmtops either. Just buy something exotic. You don't need to over engineer this, keep in mind: what they're using are use-once floppies which are discarded. A floppy at most holds 1.7Mb of code. This code is used to SCAN your disk for contraband. I don't know what they scan for, but they aren't going to be able to fit decoders for EVERY type of file system and every file format out there. So far the viable non-bullshit, non-fictional solutions in order of ease of implementations. 0. Don't go to the UK with a notebook computer. 1. Use FedEx. 2. Store the data on some other form of media (PC card disks, CD's, books, etc) 3. Use a non PC notebook that they can't scan, or one that can't use floppies or PCMCIA floppy drives in case they've got some around. 4. Modify the CMOS values in your notebook and your parition table. 5. Modify your BIOS to report a smaller disk 6. Same as 5 but prevent writes to the hidden space. 7. Have your BIOS not boot from floppies and boot only from the hard disk but make it look like it's booting normally, then run some sort of sandbox or emulator and let their software run under your code's control. 8. Modify your IDE controller or the controller card on the disk. I say choice 0 is the best choice. :^) Can we end this noisy thread or are there other bright ideas? -- =====================================Kaos=Keraunos=Kybernetos============== .+.^.+.| Sunder |Prying open my 3rd eye. So good to see |./|\. ..\|/..|sunder at sundernet.com|you once again. I thought you were |/\|/\ <--*-->| ------------------ |hiding, and you thought that I had run |\/|\/ ../|\..| "A toast to Odin, |away chasing the tail of dogma. I opened|.\|/. .+.v.+.|God of screwdrivers"|my eye and there we were.... |..... ======================= http://www.sundernet.com ========================== From howree at cable.navy.mil Mon Sep 21 22:28:39 1998 From: howree at cable.navy.mil (Reeza!) Date: Tue, 22 Sep 1998 13:28:39 +0800 Subject: Clinton's fake apologies (fwd) In-Reply-To: <604c1f67fef5147bd9135cda03e0d7da@anonymous> Message-ID: <3.0.5.32.19980923042746.007bf140@205.83.192.13> At 01:15 AM 9/23/98 +0900, Anonymous wrote: >on 20 Sep 1998 at 09:52:24 Reeza! wrote: >> At 09:21 PM 9/19/98 -0000, Anonymous wrote: >> >What? To tell a lie is one thing, but ...[etc] > >> It was prefaced with "...to tell the truth, the whole truth, and nothing >> but the truth...". >> Straighten out your head, you seem to be a few neurons short of a >> functional synapse. >> >> Reeza! > >I understand you think this is persuasive, but I don't understand why. > >and then at Sun, 20 Sep 1998 15:26:05 Reeza! wrote: >> At 03:24 AM 9/20/98 -0000, Anonymous wrote: >> > >> >I agree it's bad. I agree it undermines the justice system a little bit. >> >But, ... impeachment? >> > >> >> I could care less if he had an affair, personally. But he had an affair >> with a subordinate in his direct employ. >[more] > >> I congratulate you for your defense of a person who demonstrably has broken >> his marriage vows, his oath of public office, and purjured himself while >> under an additional oath in a court of law. > >You do remember from 6 hours earlier that we're talking about lieing? >Your raising other issues is irrelevant. You're building up the bogey man. >[Jim Choate recently described this method as a "Strawman".] >I suggested there are things Bill's done that are worse. Are you sure you're >disagreeing? > >Do you have anything worthwhile to bring to the discussion? > >> You, too, are a few neurons short of a functional synapse. >> >> I suggest you discuss it with the maker. The best way is large caliber >> bullet at sufficient velocity to penetrate and exit the cranial cavity. >> >> God speed, you fucking idiot. >> > >I guess not. > >> Reeza! > >-- an anonymous aol32 user. > Well, it seems I have an admirer. A follower, anyway. Quoting things I said from two separate posts. Persuasive, no. Revealing, yes. I believe the other issues are relevant. When a person micro-focuses on one instance of one issue, it is easily dismissable. That oversight, that disregard of clear evidence of malfeasance in many, and every area should not be ignored just because you think the issue should be simply (and only) one particular instance of, shall we say, hormone driven behaviour, to put it mildly. I'm not building up the bogey man, I'm discussing what I see. What I see, on every major and minor newstation, is a disgrace. A documented, public record disgrace. anonymouse, 32 bit aohell to boot. you must feel very safe. Yours is hardly the type of post that might necessitate the use of a remailer, so it should be safe to assume you haven't the courage to stand behind your words, even as mild as they are. Fuck you too. I suggest you discuss your lack of a spine with the maker. See the above for instructions to meet the maker. Reeza! "...The world was on fire, but no one could save me but you... Strange what desire will make foolish people do... (and the background vocalists sang) This world is only gonna break your heart...." ==C.I.== From howree at cable.navy.mil Mon Sep 21 22:30:25 1998 From: howree at cable.navy.mil (Reeza!) Date: Tue, 22 Sep 1998 13:30:25 +0800 Subject: Clinton's fake apologies (fwd) In-Reply-To: <199809221610.SAA07027@rogue.seclab.com> Message-ID: <3.0.5.32.19980923043148.00811450@205.83.192.13> > >Understandable sentiments. The position I can't understand is Jim's, >of being totally outraged by the lieing under oath regardless of anything else. >[although I respect his right to that opinion]. > >Unfortunately, you now wear the mantle of wanting to put away >Bill "Al Capone" Klinton not for tax evasion, but for "fibbing". > >-- an anonymous aol32 user. > > You must be proud of that sig. I'll bet you weren't on the list when the list of deceased CIC bodyguards, friends and associates was posted either. flush out your head, you aol user. there is more going on here than just 'fibbing'. Reeza! "...The world was on fire, but no one could save me but you... Strange what desire will make foolish people do... (and the background vocalists sang) This world is only gonna break your heart...." ==C.I.== From staym at accessdata.com Mon Sep 21 22:39:48 1998 From: staym at accessdata.com (Mike Stay) Date: Tue, 22 Sep 1998 13:39:48 +0800 Subject: ArcotSign (was Re: Does security depend on hardware?) Message-ID: <3607EF93.701D@accessdata.com> >>In that case please allow me to go back to a point raised by me >>previously. The user uses his 'remembered secret' (of fewer bits) >>through a public algorithm (including protocol) to retrieve from a >>pool the password (of more bits). If the attacker doesn't have the >>pool then everything looks fine. But if he manages to get the pool >>(a case someone mentioned in this thread) then he can obviously >>brute force offline, I believe, since he possesses now everything >>the legitimate user has, excepting the 'remembered secret'. Or is >>there anything wrong with my logic? > >Yes. There is something wrong with you logic. > >Bruce >********************************************************************** >Bruce Schneier, President, Counterpane Systems Phone: 612-823-1098 >101 E Minnehaha Parkway, Minneapolis, MN 55419 Fax: 612-823-1590 > Free crypto newsletter. See: http://www.counterpane.com According to the website, there's no pool of passwords. There's a truncated hash that will catch most mistakes, but is useless as a test criterion in a dictionary attack. If you get the user's "public" key, then you can do a dictionary attack. The user's "public" key isn't public, however; not even the user knows it. If I'm understanding it right, it's stored encrypted and the key is only given to a set of predefined servers. Prior relationship must exist; they admit that. -- Mike Stay Cryptographer / Programmer AccessData Corp. mailto:staym at accessdata.com From ryan at systemics.ai Mon Sep 21 22:51:41 1998 From: ryan at systemics.ai (Ryan Lackey) Date: Tue, 22 Sep 1998 13:51:41 +0800 Subject: Arcot (fwd) Message-ID: <19980922145220.E363@mises.systemics.ai> (originally to a bunch of places, but I misspelled "cypherpunks" in the headers...) (operating on generator power after hurricane georges struck Anguilla...) The way I see it, there are n separate issues here, which should be addressed separately. The following are my summaries of the issues, using the information I have available -- I have never seen any confidential Arcot data, so I'm operating entirely from public sources. It's entirely possible my data or assumptions are incorrect -- I'd be very happy to have someone correct me. 1) The Arcot system uses "software smartcard" repeatedly throughout its marketing literature, and says that it provides similar security to smartcards. However, even in the technical paper recently posted to the web by Arcot, it admits it does not provide resistance to a wide class of attacks, including the two Stefan Brands mentioned: * Resistance to monitoring attacks on the CPU * End users reverse-engineering the system I have issues with this use of the term "smartcard". In fact, this system has *none* of the desirable properties of a smartcard, as users can freely copy the authenticator. It is, at best, equivalent to an encrypted certificate on disk which can only be checked for validity online (no local checksums, no structure to the cert, just a raw random string). The phrase "two factor authentication", used throughout the marketing literature, is being used improperly -- two passwords (one remembered and one stored on disk, since the ArcotSign authenticator is just a string of data) do not two-factor authentication make, if two passwords (one remembered and one stored as an encrypted certificate on disk) do not two-factor make. It's an open point whether both systems or neither are two-factor, but it's pretty clear that the two are equivalent. 2) Scott Loftesness, the new CEO of DigiCash, proposed this system as potentially a viable alternative to hardware tamper resistance for electronic finance systems (DBS systems). The threat model for real electronic finance systems (including and especially DBS) is in fact substantially more serious, as recent Rabobank windows client attack demonstrates. Once your customers *can* have money stolen by a third party, it's up to you to prove they *haven't*, at least according to US and other law, for small customers. This means only institutions capable of absorbing massive fraud (in absolute terms) can field real electronic cash systems. This is primarily a debate about threat models for a specific application, rather than a technical one. 3) The system appears to use PKC for no reason -- it is a closed system, like Kerberos, and only limits itself by using PKC. Kerberos, developed by some list participants *years* ago, appears to solve every problem Arcot claims to solve. Additionally, Kerberos (in some form) is now being integrated into MS Windows NT, so it is widely available. 4) Bruce Schneier, one of the firm's technical advisors, says "it's not [sufficient for] online real estate [presumably meaning high value transactions with no recourse]", but that it is for "ninny net users in chat rooms". The apps Bruce Schneier seems to propose the Arcot system for ("systems like AOL" (read: porn sites on the WWW)) are more concerned with their users not being able to share passwords than anything else. For that application, simple IP-based security in addition to passwords is sufficient, or other means of ensuring an authenticator is linked to an individual. The Arcot system does not provide security from this issue (even though it is intended for closed networks, where such functionality would be highly possible). However, the firm's marketing information seems to be selling this to corporate web sites, for protecting high value corporate data. I find it highly unlikely any board of directors would consider their proprietary corporate data closer to "ninny net users in chat rooms" than something requiring real security. (Even people without real security requirements often want high security, or at least systems with no known limitations -- I use high-grade encryption to protect my credit card information, even though my liability is limited to $50, and many other users are unwilling to use 40-bit crypto to protect their credit card numbers.) 5) The point was raised that in a smartcard system, you don't know what you're signing. I agree completely. However, in a smartcard system, you can protect the *keys* to a far higher level than protecting the *use* of the keys when the key is physically present. This is a substantially lower level of risk, particularly if a security policy is included in the smart card, such as only disbursing a limited amount of money per unit time, or monitoring suspicious transactions, or handling user authentication through a strong external channel, such as a PIN reader attached directly to the smartcard reader. The earlier debate on smartcards vs. tamper-resistant computers with I/O leads me to believe that for electronic cash in reasonable value ranges (>$1000), you most likely want to go with *more* than a smartcard (as in, a tamper resistant computer), but certainly you don't want to go with *less*. For many applications, a combination of trusted time (on the smartcard) and a trusted smartcard (and perhaps location) would be sufficient -- a user could then be made to prove they were not in a certain location at a certain time when a transaction were made to absolve themselves of responsibility for it. 6) "Hardware is expensive" So is software. The cost of implementing any authentication mechanism, particularly in a closed system, is relatively constant -- passwords through cheap hardware -- as most of the cost is in administrative overhead, user training, etc. I'd far rather go with an $8 Dallas Semiconductor iButton plus $0-$100 software plus $400/user training/etc. cost than $0 hardware plus $x software plus the same user training cost. In many systems, hardware is *cheaper* in the long run, as users understand it better, are better at doing their own key management, etc. It is exactly for closed systems where hardware solutions *shine* compared to software, even if they provide the *same* security in absolute terms -- the hardware solution has lower life-cycle costs. For an open system, or one where you have minimal control over the users (such as AOL, or a porn WWW site, or whatever), the requirement that software be added to the local machine is usually prohibitively expensive. In that kind of application, all of the intelligence needs to go on the server -- an online password checking system, coupled with standard browser features like client certificates, is about the most you can expect, and even that is pushing it (until MIT did cert support for Lynx, many of my machines were unable to use certificates at all). 7) "The system is patent-pending." I do not see how the system is provably higher in security or any other worthwhile features than the following widely deployable, standard, free system: * online password checking of user passwords, optionally changing in some kind of one-time-pad system, passed through an SSL-encrypted link to the server, such that if a password guess attempts were made, the account could be locked out. * encrypted local certificates, encrypted with optionally a different passphrase, which do *not* need to be kept secret. This provides "two factor" authentication to the same extent as the Arcot system, is easy to implement using standard systems, and is conceptually simple. In the event that the Arcot system is no better than the above (which I believe), which is *not* patentable, I fail to see why the issue of whether Arcot's system can be patented is important. The only parts which could be patented (as far as I can tell) are accidental, not the essential functionality of quasi-two factor authentication with online password checking to prevent off-line attacks. 8) The various IP/patent/etc. issues A company could implement open standards based authentication, in an open way, publish papers on every detail of their system, etc. and still make quite a bit of money. They do this through the quality of their *software engineering*, not the quality of their idea. Ideas are expensive to create, and impossible to keep secret, even with patents. Once you come up with an idea, most of what gives it value is the review process itself, not the initial idea. That's why the valuable ideas I can think of, at least in crypto, have mainly come from universities and open research labs -- they can more cheaply be reviewed. Only the NSA has the resources to make an idea valuable and also keep it closed (and if you believe Payne, even they don't...) I understand that Arcot is a commercial company, and that it's trying to make money, but I don't think that actually counters any of the points presented above -- if anything, it makes them stronger, as Arcot has a strong desire to increase the value of its assets (the deliverable authentication system) much more so than a random hacker working on this as a curiosity. From tsudik at pollux.usc.edu Mon Sep 21 23:03:27 1998 From: tsudik at pollux.usc.edu (Gene Tsudik) Date: Tue, 22 Sep 1998 14:03:27 +0800 Subject: Fifth ACM Conference on Computer and Communications Security Message-ID: <199809221855.LAA12108@pollux.usc.edu> This is the Call for Participation for the 5th ACM Conference on Computer and Communications Security that will take place in San Francisco Nov 2-5. Below please find the REGISTRATION form. The official conference homepage is at: http://www.bell-labs.com/user/reiter/ccs5/ It includes, among other things, the conference program, information about invited talks, speakers and tutorials. ------------------------- cut here ---------------------------------- Fifth ACM Conference on Computer and Communications Security REGISTRATION FORM Name:_____________________________________________ Affiliation:_____________________________________________ Postal Address:_____________________________________________ _____________________________________________ _____________________________________________ Phone:_____________________________________________ Fax:_____________________________________________ Email:_____________________________________________ Note: Notification of receipt of registration form will be sent via email. Address information will be distributed to all attendees. Please mark the appropriate registration categories. Payment must be included and must be either by check in U.S. dollars, drawn on a U.S. bank and made payable to "ACM Conference on Computer and Communications Security", or by credit card. Dates are strictly enforced by postmark. Attendees who register for tutorials can attend any of the four half-day tutorials. However, to assist in planning, please indicate which tutorials you are likely to attend. Morning sessions (choose one): ___ Cryptography: Theory and Applications (Dan Boneh) ___ Programming Languages and Security (Martin Abadi, George Necula) Afternoon sessions (choose one): ___ Authentication protocol verification and analysis (Jon Millen) ___ Emerging models in electronic commerce (Doug Tygar) The following tutorial registration fees include admission to all tutorials, and must be paid in full if any tutorial is attended. Advance tutorial registration (on or before October 1, 1998) ___ ................................................................$300.00 ___ Full-time Student...............................................$100.00 Late tutorial registration (after October 1, 1998) ___ ................................................................$395.00 ___ Full-time Student...............................................$100.00 Conference registration includes admission to the regular conference programs (but not the tutorials), conference proceedings, continental breakfast, lunch, and reception/dinner. Advance conference registration (on or before October 1, 1998) ___ Member, ACM or ACM SIGSAC (Member #__________, required)........$315.00 ___ Non-Member......................................................$390.00 ___ Full-time Student...............................................$100.00 Late conference registration (after October 1, 1998) ___ Member, ACM or ACM SIGSAC (Member #__________, required)........$375.00 ___ Non-Member......................................................$465.00 ___ Full-time Student...............................................$100.00 Do you have any special requirements?_________________________________________ Please indicate your method of payment by checking the appropriate box: [ ] Check in U.S. funds drawn on a U.S. bank (PLEASE ENCLOSE WITH THIS FORM) Credit card authorization: (Charges will appear on your statement as made by ACM. Note: your credit card number will be processed by the ACM.) Visa MasterCard American Express Diners Club [ ] [ ] [ ] [ ] Credit Card Number:_________________________________________________________ Card Holder Name:______________________________Expiration Date:_____________ Mail registration to: Or Email this form (CREDIT CARD Li Gong REGISTRATIONS ONLY) to: Sun Microsystems li.gong at sun.com with the subject MS UCUP02-102 ACM CCS registration 901 San Antonio Road Palo Alto, CA 94303-4900, USA >>>>SORRY, NO REFUNDS.<<<< Hotel Reservations - The Fairmont Hotel, San Francisco ====================================================== The legendary Fairmont Hotel in San Francisco is situated atop the exclusive Nob Hill area, with a panoramic view of the City and San Francisco Bay. Nearby, cable cars stop to carry guests to Union Square and the Financial District as well as nearby Chinatown, Ghirardelli Square and Fisherman's Wharf. Hotel reservations must be made under the group name "Association of Computing Machinery/ACM CCS". The special group rate is Main Building: $155 single and $175 double occupancy Tower/Bay View: $185 single and $205 double occupancy There is an additional 14% tax. These rates are guaranteed for the period of the conference only. The cut-off date for reservations is Thursday, October 8, 1998. Reservations made after this date will be accepted on a space available basis, but due to the busy season, reservations should be made as early as possible. Reservations must be guaranteed by a credit card or it must be accompanied by an advance deposit for the first night. You may cancel your individual reservations up to 24 hours prior to arrival, after which your deposit becomes non-refundable. Please be advised the check-in time is after 3:00 p.m.; check-out is 1:00 p.m. For reservations and information, contact: The Fairmont Hotel 950 Mason Street San Francisco, CA 94108 Tel: +1 415-772-5000 +1 800-527-4727 Transportation from the San Francisco International Airport to the hotel can be via taxi, which takes about 30 minutes and costs about $30, or via shuttle at a cost of around $12. Shuttle information can be found at the airport. ============================================================================= From ravage at einstein.ssz.com Mon Sep 21 23:11:50 1998 From: ravage at einstein.ssz.com (Jim Choate) Date: Tue, 22 Sep 1998 14:11:50 +0800 Subject: Stego-empty hard drives... (fwd) Message-ID: <199809221938.OAA06031@einstein.ssz.com> Forwarded message: > Date: Tue, 22 Sep 1998 14:25:10 -0400 > From: Sunder > Subject: Re: Stego-empty hard drives... (fwd) > All stego methods are weak approaches at hiding data. We're not discussin stego, we're discussing hidden disk partitions, not hiding data in the lsb of of existing observable disk partitions or something similar. > Who the fuck is gonna run a tempest scanner on your notebook again? Let's Considering the cost of such a scanner (a few $10k/ea.) and assuming such masking technology were to become commen place I doubt if very many customs checkpoints at major transfer hubs wouldn't have them. > Why would you need to collect BIOSes? You only need to modify a single BIOS - > the one on >YOUR< notebook. The camouflage code would be a few hundred bytes > at most unless you do something overly elaborate. I suspect it would be several k actualy since it is going to have to include the encryption code, device drivers, wedgers, etc. > Disassemblers (debuggers) are fairly cheap. DOS and WIN95 come with a simple > one called debug. A disassembler isn't a a debugger. All a disassembler does is convert the hex to symbols (see frankenstein for an excellent design). > programming. You don't need to disasemble everything in the BIOS, you just > need to disable the checksum routine the bios uses on itself, and you need to > slightly modify the place that detects the size of the IDE drive to not go > beyond a certain number of pointers. So much for your few hundred bytes. > Further, PC bioses do support BIOS extensions, you generally wouldn't need to Um, usualy they support wedging via a jump table. This means that not only do you still have the original code you wedged out but you have the new code you've wedged in. A 2x penalty. > provide booting capabilities from SCSI disks. Of course it's a bit harder in a > notebook computer, but it too can be done. Nobody says it can't be done. > One thing all you fine folks are forgetting is that there are MANY MANY types > of notebooks out there. With only a few dozen BIOS'es driving the whole kit and kaboodle. > My money says that if they can't scan Mac's they also > won't be able to scan Sparc books, Alpha Books, Newtons, Palm Pilots, and many > WinCE palmtops either. Just buy something exotic. They're new, they will learn from their mistakes and it won't take long. After all, they have your tax dollars to use... ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From ravage at einstein.ssz.com Mon Sep 21 23:24:12 1998 From: ravage at einstein.ssz.com (Jim Choate) Date: Tue, 22 Sep 1998 14:24:12 +0800 Subject: Stego-empty hard drives... (fwd) Message-ID: <199809221948.OAA06096@einstein.ssz.com> Forwarded message: > Date: Tue, 22 Sep 1998 13:04:15 -0500 > From: Petro > Subject: Re: Stego-empty hard drives... (fwd) > At a certain threat level or level of "interest" in your affairs, > whether you can hide the fact that you are using crypto or not is going to > become irrelevant. When you're at that level you don't carry the data across the line you get some Johnnie Mnemonic to do it for you or put it in a diplomatic pouch... > If your opponent is using tempest, you are operating at that level. > Tempest is expensive, and I'd imagine would have to be calibrated not only > for each processor ([3-6]86, with all the variations (sx/dx, celeron, xenon > etc,) as well as the NEC. AMD. and Cyrix clones thereof, ARM & StrongARM > processors, PPC 601/3/4/G-3 processors, Motorola 68k processors, sparc > processors etc) but (if you are looking at what the POST & BIOS actually > does) for each BIOS AND OS. This is NOT an easy task, nor can it be done by > a Bozo operating a X-Ray machine at an airport. Consider that at any given time there are only a few hundred BIOS'es, made from a few dozen base images, driving all the machines out there. The number of companies that develop their own BIOS in toto for in-house products is next to nil (I know of none). What they do is buy a license and then re-write the sections they need to. The TEMPEST signal will be effected by speed, I see no reason to suspect that it's going to be processor dependant. Since the code gets executed in the same sequence in these shared BIOS there is going to be a shared footprint, which may get squeezed because of increased clock speed. Measuring that footprint at ranges of inches is nowhere near as expensive as trying to catch a monitor image from a block away. If you store those few thousand footprints and do a compare any bozo can in fact run the machine. Just sit and watch to see if the red light comes on and call your supervisor. ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From shamrock at cypherpunks.to Mon Sep 21 23:35:45 1998 From: shamrock at cypherpunks.to (Lucky Green) Date: Tue, 22 Sep 1998 14:35:45 +0800 Subject: ArcotSign In-Reply-To: <199809221821.UAA24448@replay.com> Message-ID: On Tue, 22 Sep 1998, Anonymous wrote: [On Arcot's virtual smartcard claims] > The analogy with smart cards is that these cards protect your private key. > With a perfect smart card, an attacker can't do any better than chance > guessing of your private key. With the Arcot system, the same is true. > Decrypting the private key file gives no information about its content, > because pure random data is encrypted. Therefore with their system the > attacker also can't do better than chance guessing. With Arcot's system, an attacker could determine the key *software only, most likely even by remote*. Extracting keys from a smartcard requires *hardware and physical possesion of the token*. Which touches at the very core of the difference between tokens and software based solutions. The claims made on the vendor's homepage are simply false. There is no other way of putting it. -- Lucky Green PGP v5 encrypted email preferred. From simpsonngan at hotmail.com Mon Sep 21 23:38:27 1998 From: simpsonngan at hotmail.com (Chiu Ngan) Date: Tue, 22 Sep 1998 14:38:27 +0800 Subject: Fwd: RE: HOAX: I don't care if this is real or not! But forwarding is not hard for me if I help Message-ID: <19980922193105.260.qmail@hotmail.com> >From ptrei at securitydynamics.com Wed Sep 16 06:49:03 1998 >Received: from mail.securitydynamics.com by tholian.securitydynamics.com > via smtpd (for mail.hotmail.com [209.1.112.253]) with SMTP; 16 Sep 1998 13:48:16 UT >Received: by securitydynamics.com (8.7.6/8.7.3) with ESMTP id JAA08933; Wed, 16 Sep 1998 09:54:39 -0400 (EDT) >Received: by exna01.securitydynamics.com with Internet Mail Service (5.0.1460.8) > id ; Wed, 16 Sep 1998 09:52:43 -0400 >Message-ID: >From: "Trei, Peter" >To: "'Chiu Ngan'" , dueli at hotmail.com, > centrebet at centrebet.com.au, contact at unsw.edu.au, Declan at well.com, > Dodwellleung at hotmail.com, dlin at gpu.srv.ualberta.ca, > dorngan at hkstar.com.hk, cypherpunks at toad.com, cj2802 at singnet.com.sg, > parsley at unforgettable.com, S.Lundy at unsw.edu.au, accounts at magna.com.au, > n.harding at unsw.edu.au, philiph at magna.com.au, ulf at fitug.de, > leevv at hotmail.com, vanessa.ho at mailexcite.com >Subject: RE: HOAX: I don't care if this is real or not! But forwarding is > not hard for me if I help >Date: Wed, 16 Sep 1998 09:50:23 -0400 >MIME-Version: 1.0 >X-Mailer: Internet Mail Service (5.0.1460.8) >Content-Type: text/plain > >You should care. Not checking on such obvious >hoaxes makes you look like an idiot. It took >me less than 30 seconds to establish that this >is yet another urban legend. Check: > >http://www.inform.umd.edu/mdk-12/help/xhoax.html#liver > > >Chiu Ngan [simpsonngan at hotmail.com] forwarded: >> >>>>Hello, my name is David "Darren" Bucklew. I live in >> >>>>Pittsburgh PA where I attend Bethel Park High School >> >>>>and participate in many sports. I have severe >> >>>>ostriopliosis of the liver. (My liver is extremely >> >>>>inflamed). >> >>>>Modern Science has yet to find a cure. Valley >> >>>>Childrens hospital >> >>>>> has agreed to donate 7 cents to the National >> >>>>Diesese Society for every name >> >>>> on this letter.Please send it around as much as you >> >>>>can. >> >>>>Thank you, >> >>>>Darren >> >>>> >> >>>>PS: For those of you who dont take 5 minutes to do >> >>>>this, what goes around comes around. You can help >> >>>>sick people, and it costs you nothing,yet you are too >> >>>>lazy to do it? You will get what you deserve. >> > ______________________________________________________ Get Your Private, Free Email at http://www.hotmail.com From jnbailly at west.raytheon.com Tue Sep 22 00:53:17 1998 From: jnbailly at west.raytheon.com (jnbailly at west.raytheon.com) Date: Tue, 22 Sep 1998 15:53:17 +0800 Subject: ArcotSign (was Re: Does security depend on hardware?) Message-ID: <0EZP00M0MDZ7T6@mail.hac.com> Woah.... I hate to interject noise, but I have to comment. Maybe Bruce's reply WAS a bit curt and not terribly helpful. But it's better to just let it drop, and not resort to criticizing typos. I'm a member of this list in the hopes that I'll learn something. While it's true that I didn't learn anything from Bruce's reply, I don't think anyone gains anything from grammar/spelling corrections! *smile* Jacob ______________________________ Reply Separator _________________________________ Subject: Re: ArcotSign (was Re: Does security depend on hardware?) Author: proff at iq.org at mime Date: 9/22/98 10:40 AM > >the legitimate user has, excepting the 'remembered secret'. Or is > >there anything wrong with my logic? > > Yes. There is something wrong with you logic. > > Bruce > ********************************************************************** > Bruce Schneier, President, Counterpane Systems Phone: 612-823-1098 There's something wrong with you grammer. Cheers, Julian. RFC-822-headers: Received: from CONVERSION-DAEMON by mail.hac.com (PMDF V5.1-12 #26580) id <0EZP00401AHMT4 at mail.hac.com> for "jacob n bailly"@mime.mail.hac.com; Tue, 22 Sep 1998 12:37:00 -0700 (PDT) Received: from PROCESS-DAEMON by mail.hac.com (PMDF V5.1-12 #26580) id <0EZP00401AHJSC at mail.hac.com> for "jacob n bailly"@mime.mail.hac.com; Tue, 22 Sep 1998 12:36:58 -0700 (PDT) Received: from fw-tu05.hac.com by mail.hac.com (PMDF V5.1-12 #26580) with ESMTP id <0EZP0028FAHI2D at mail.hac.com> for "jacob n bailly"@mime.mail.hac.com; Tue, 22 Sep 1998 12:36:56 -0700 (PDT) Received: from toad.com ([140.174.2.1]) by fw-tu05.hac.com (8.9.0/8.9.0) with ESMTP id MAA16615 for ; Tue, 22 Sep 1998 12:38:01 -0700 (MST) Received: (from majordom at localhost) by toad.com (8.7.5/8.7.3) id KAA03863 for coderpunks-outgoing; Tue, 22 Sep 1998 10:40:19 -0700 (PDT) Received: from iq.org (proff at frame-gw.iq.org [203.4.184.233]) by toad.com (8.7.5/8.7.3) with SMTP id KAA03857 for ; Tue, 22 Sep 1998 10:40:13 -0700 (PDT) Received: (qmail 17488 invoked by uid 110); Tue, 22 Sep 1998 17:40:08 +0000 Date: Wed, 23 Sep 1998 03:40:08 +1000 (EST) From: proff at iq.org Subject: Re: ArcotSign (was Re: Does security depend on hardware?) In-reply-to: <4.0.2.19980922114142.00956610 at mail.visi.com> Sender: owner-coderpunks at toad.com Message-id: <19980922174008.17487.qmail at iq.org> MIME-version: 1.0 X-Mailer: ELM [version 2.4ME+ PL28 (25)] Content-transfer-encoding: 7BIT Precedence: bulk From jal at jb.com Tue Sep 22 15:53:53 1998 From: jal at jb.com (jal at jb.com) Date: Tue, 22 Sep 1998 15:53:53 -0700 (PDT) Subject: Child Bicycle Safety Site Message-ID: <199809222253.PAA01245@ias.jb.com> Word has it that you ride a bicycle - and that's why you've received this piece of email. --------- You should visit this site if you ride a bike AND have a child: http://www.springfield-or.com/familytrends Tell someone else who rides with a child what you've seen. --------- If you wish to be removed from future mailings, please reply with the word "Remove" in the subject line. Thank you. From pjm at spe.com Tue Sep 22 00:59:26 1998 From: pjm at spe.com (pjm at spe.com) Date: Tue, 22 Sep 1998 15:59:26 +0800 Subject: atheism (was: RE: Democracy... (fwd)) (fwd) In-Reply-To: <199809202202.RAA14798@einstein.ssz.com> Message-ID: <6442-Tue22Sep1998222346+0200-pjm@spe.com> attila writes: > agreed, the strong v. weak atheist argument is _impossible_. I'll try one last time and then let this grossly off-topic thread continue without me. The weak atheist position is a _lack_ of belief. No knowledge claim is made. This position can come from a number of perspectives, one common one being that the concept denoted by the word "god" is incoherent. If a concept is without meaning then it doesn't make sense to claim to believe that it doesn't exist; such a claim would itself be incoherent. The strong atheist position that god(s) do not exist does constitute a knowledge claim. It implies that the holder of the position associates a particular, meaningful concept with the word "god". It doesn't, however, indicate anything about the other beliefs of the atheist in question. There must be some 'net law regarding the effort required to make a point being inversely proportional to the complexity and importance of that point.... Regards, pjm From pjm at spe.com Tue Sep 22 01:01:14 1998 From: pjm at spe.com (pjm at spe.com) Date: Tue, 22 Sep 1998 16:01:14 +0800 Subject: atheism (was: RE: Democracy... (fwd)) (fwd) In-Reply-To: <199809202202.RAA14798@einstein.ssz.com> Message-ID: <4932-Tue22Sep1998220112+0200-pjm@spe.com> Jim Choate writes: [ A bunch of gratuitously obnoxious nonsense indicating a lack of reading comprehension skills coupled with no capacity for critical thinking. ] That makes two rude replies in a row in response to polite messages. I'll give anyone the benefit of one bad hair day, but further discussion with you is obviously a waste of time. I do thank you for demonstrating that "transcendence" is not a null concept, however. You are without a doubt a transcendent asshole. I retire from this discussion and yield the floor to you, Mr. Choate. It is only fitting, seeing as you've gone to such trouble to deposit that large pile of fecal matter in the middle of it. Regards, pjm From schneier at counterpane.com Tue Sep 22 01:43:28 1998 From: schneier at counterpane.com (Bruce Schneier) Date: Tue, 22 Sep 1998 16:43:28 +0800 Subject: ArcotSign (was Re: Does security depend on hardware?) In-Reply-To: <4.0.2.19980922114142.00956610@mail.visi.com> Message-ID: <4.0.2.19980922155723.00956a50@mail.visi.com> At 03:40 AM 9/23/98 +1000, proff at iq.org wrote: >> >the legitimate user has, excepting the 'remembered secret'. Or is >> >there anything wrong with my logic? >> >> Yes. There is something wrong with you logic. >> >> Bruce >> ********************************************************************** >> Bruce Schneier, President, Counterpane Systems Phone: 612-823-1098 > >There's something wrong with you grammer. Touche. Bruce ********************************************************************** Bruce Schneier, President, Counterpane Systems Phone: 612-823-1098 101 E Minnehaha Parkway, Minneapolis, MN 55419 Fax: 612-823-1590 Free crypto newsletter. See: http://www.counterpane.com From brianbr at together.net Tue Sep 22 02:03:21 1998 From: brianbr at together.net (Brian B. Riley) Date: Tue, 22 Sep 1998 17:03:21 +0800 Subject: Stego-empty hard drives... (fwd) Message-ID: <199809222204.SAA28577@mx01.together.net> -----BEGIN PGP SIGNED MESSAGE----- On 9/22/98 3:48 PM, Jim Choate (ravage at einstein.ssz.com) passed this wisdom: >When you're at that level you don't carry the data across the line >you get some Johnnie Mnemonic to do it for you or put it in a >diplomatic pouch... I think the real answer here, and totally in keeping with the KISS rule, has already been suggested. If you have sensitive data you keep it on a PCMCIA hard drive card and remove it when not in use (or a CD-R or a ZipDisk, though the PCMCIA hard drive does allow it to be a 'working' volume featuring speed and capacity that a Zip or a CD-R cannot offer). It can work as easily for a desktop as for a laptop. You can add to the security of this by using your platform of choice's flavor of Secure Drive, Cryptdisk, PGPDisk, etc. The ultimate stego is that the card is nowhere near the computer with the main hard drive and they don't bother looking beyond when the drive evaluation turns nothing up. If its trafficking in illicit data the "mule' shouldn't even be carrying a computer (or maybe only a Palm Pilot!) so the hounds have even less reason to be looking for comp[uter stuff on him. -----BEGIN PGP SIGNATURE----- Version: PGP for Personal Privacy 5.0 Charset: noconv iQEVAwUBNggY7j7r4fUXwraZAQG3swf8C3ypMG6EyI6t2I2LIpcwyV37Khv6Vm06 15HZ7rFOzrqwXG8RjDw4e99f5H76IG9FuDJUbUfJX0lS9aKtEaeeuSPUmtso8Au9 NrdTp3lHxMYJH9q+d8l1gVZWOnLQCjiJ7Ytd4LCmhmb3Ds58Sa41YoM71EFKZJkK AIBC2pmkRT1ido4uvtLc9qjPDf/jtLHVH17tMdBKCvn6R8jbLq4QHk6T0J9rJt1O +owC6R8YGpWjXPkIicsgfDD6qJiyyLLAMRX/1qWLVI+2CjeImhMsUGjafkq98x/B UU6bGq8B5m2aJmpVMqGFceuJe4mUTtqxLfYF/MlwLokib7ap8+EEZw== =A9fC -----END PGP SIGNATURE----- Brian B. Riley --> http://members.macconnect.com/~brianbr For PGP Keys "First say to your self what you would be; then do what you have to do." Epictetus (35-135 A.D.) From brianbr at together.net Tue Sep 22 02:03:24 1998 From: brianbr at together.net (Brian B. Riley) Date: Tue, 22 Sep 1998 17:03:24 +0800 Subject: Stego-empty hard drives... (fwd) Message-ID: <199809222204.SAA28569@mx01.together.net> On 9/22/98 1:43 PM, Jim Choate (ravage at einstein.ssz.com) passed this wisdom: >Forwarded message: > >> Date: Tue, 22 Sep 1998 11:07:34 -0500 >> From: Petro >> Subject: Re: Stego-empty hard drives... (fwd) > >> I don't know how hard this would be, but how about running a >> seperate memory check, and while those numbers are flashing on the screen, >> do the wait for imput? > >So hide the keyscan in the memory counter code. Would work externaly, would >probably not show up on TEMPEST. Since both the keyscan and the memory scan >are repetitive TEMPEST might have a problem telling them apart. Provided you >could get the keyscan in the same footprint as the mem check the BIOS >would not show up as anomolous in size. As long as they're not running >around doing checksums you'd be ok (I suspect). Don't most memory scans do a keyscan anyway? looking for an ESC to bypass the scan? So have it also check for something else to bring up your special routine. It should pass all but the most detailed signature analysis. Brian B. Riley --> http://members.macconnect.com/~brianbr For PGP Keys "Give a man a fish and you have fed him for a day, but give him a case of dynamite and soon the village will be showered with mud and seaweed and unidentifiable chunks of fish." -Joe Chew From phelix at vallnet.com Tue Sep 22 02:15:09 1998 From: phelix at vallnet.com (phelix at vallnet.com) Date: Tue, 22 Sep 1998 17:15:09 +0800 Subject: Stego-empty hard drives... (fwd) In-Reply-To: <199809221500.KAA03503@einstein.ssz.com> Message-ID: <36122097.335221357@news> On 22 Sep 1998 15:19:09 -0500, Sunder wrote: >You could always compress the fuck out of the data and save it as 2d bar codes >(PDF417) in a printed book, or to photographic slides... Yea. And when customs asks, just say that they're 2d stereograms (the kind where neat stuff appears if you stare at them crosseyed long enough). -- Phelix From ravage at EINSTEIN.ssz.com Tue Sep 22 02:43:03 1998 From: ravage at EINSTEIN.ssz.com (Jim Choate) Date: Tue, 22 Sep 1998 17:43:03 +0800 Subject: Stego-empty hard drives... (fwd) Message-ID: <199809222308.SAA07042@einstein.ssz.com> Forwarded message: > Subject: Re: Stego-empty hard drives... (fwd) > Date: Tue, 22 Sep 1998 18:04:28 -0400 > From: "Brian B. Riley" > Don't most memory scans do a keyscan anyway? looking for an ESC to > bypass the scan? Some do, some don't. A lot of new machines resolve those issues in the BIOS with a setting that allows you to choose between a couple of options at post. > So have it also check for something else to bring up > your special routine. It should pass all but the most detailed signature > analysis. Maybe, the fact that you've added an extra block of code in there to check for the additional keystroke would cause the cycle length of that section of ML to be slightly longer, probably no more than 30 - 40 clock cycles. If you're looking at the EM radiation that lengthening could show up. ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From aba at dcs.ex.ac.uk Tue Sep 22 03:15:23 1998 From: aba at dcs.ex.ac.uk (Adam Back) Date: Tue, 22 Sep 1998 18:15:23 +0800 Subject: respect due to anonymous (Re: CHALLENGE response (fwd)) In-Reply-To: <199809221539.KAA04070@einstein.ssz.com> Message-ID: <199809221920.UAA11110@server.eternity.org> Jim Choate writes: > Anonmous writes: > > Subject: CHALLENGE response (fwd) > > > The whole point of the CHALLENGE response went straight over his head, > > didn't it? > > It didn't go over my head at all. What amazes me is that it took you this > long to figure out that one could munge signatures. Munge signatures!? He generated an RSA key pair to match the pre-published signature based on generating primes of special form and/or using multiple smaller primes to construct an n which he could perform discrete logs in (plus a dead beef attack), and all you can say is the above. You should take you hat off to anonymous. > > No longer can you assume that just because you posted a signed message > > on a certain date, and you hold the public key which signed that message, > > that you can later prove authorship. It challenges some of the implicit > > assumptions which have been made in using public key cryptography. > > No, it challenges basic assumptions regarding the importance of identity. > In no way does it effect the basic math of crypto, public or otherwise. It affects crypto: it means that one published signature is not sufficient to provide a provable relationship between a signed message and a public key. You have to provide two signatures. For example anonymous provide three signatures which check with that key (one is self sig on the key). Therefore it is not possible for someone to do the same attack again against his published signatures: they could match any one of the signatures, but no more. It may even be that there exist crypto protocols affected by this. Adam From aba at dcs.ex.ac.uk Tue Sep 22 03:15:31 1998 From: aba at dcs.ex.ac.uk (Adam Back) Date: Tue, 22 Sep 1998 18:15:31 +0800 Subject: CHALLENGE response In-Reply-To: <199809220601.IAA30078@replay.com> Message-ID: <199809222241.XAA11854@server.eternity.org> Kudos anonymous! What form are your primes (did you use Maurers idea to increase the relative hardness of factoring compared to discrete log, or did you just use more smaller primes?) How many primes have you used, and how many CPU hours did it take to calculate the discrete log to discover e? Also is the code for finding discrete logs given the prime factorisation of the modulus available? Obvious counter-measures to this attack on a persistent anonymous identity are to post more than one signature, or to sign the public key (as would happen with a self signed PGP public key). I am left wondering if there are implications of this demonstration for other protocols (*) involving RSA signatures, where one signed message is observed before the key is obtained. - For example, the general case of receiving a message signed by someone, not having the public key, and looking up the public key on a key server by keyid (as pgp5.x, and some pgp2.x mail interfaces automate). With an anonymous individual (and with many peoples keys where they have poor connection in the web of trust) all you are aiming to do is to send a message to the author of a given message. With this attack an attacker who could intercept the key server lookup, and return an alternate public key with associated certificates which would match the signature. Are there other protocols where this attack would have implications? Adam (* Toto's impromptu 'protocol' was publishing one signature only, and then having his machine seized containing the public (and private?) keys which arguably created the signature). The result of the identity attack is that Toto's (currently unwanted) proof of authorship has been called into question. From aba at dcs.ex.ac.uk Tue Sep 22 03:16:32 1998 From: aba at dcs.ex.ac.uk (Adam Back) Date: Tue, 22 Sep 1998 18:16:32 +0800 Subject: pgpacket bug (Re: CHALLENGE? Toto/signature attack w. unpublished public key) In-Reply-To: <199809220108.DAA07731@replay.com> Message-ID: <199809221857.TAA11080@server.eternity.org> Anonymous writes: > This value is wrong: it has 3 bytes of 0's inserted and is therefore > missing the last three bytes of the signature. > > s = 0x08F4D5CBC10063725B206F787EB7370BBD0C5B4854CE79A9007D1801AEAEE6E6 > D2C68D7EDF877FECE1FA539D08BEC54BD152BA05113951E8A84CDECAD2CB8E7A > C28BE916570BA7BB9C00C64DF57113C4AE81613BD351541523CD3A028FBF220E > F7469BD4175302DCB5B6E886974877F28A2D301433AFFFE26081008BFF687B37 > > > Here is the correct value, from the signed message. > > 08F4D5CBC10063725B206F787EB7370BBD0C5B4854CE79A97D1801AEAEE6E6D2 > C68D7EDF877FECE1FA539D08BEC54BD152BA05113951E8A84CDECAD2CB8E7AC2 > 8BE916570BA7BB9CC64DF57113C4AE81613BD351541523CD3A028FBF220EF746 > 9BD4175302DCB5B6E886974877F28A2D301433AFFFE260818BFF687B37DE8167 Hmm! That explains this output of pgpacket which I had already forwarded to Mark Shoulson as a bug in pgpacket: % pgpacket < totopost.asc --------------------------- Packet Type: Secret-Key Encrypted Packet (signature) Length: 149 Version: 3 Adding 5 bytes of header to digest Signature of canonical text document Signature Created: 9 Dec 1997 21:29:02 Signing Key ID: 0xCE56A4072541C535 Public Key Algorithm: 1 (RSA) Message Digest Algorithm: 1 (MD5) Check bytes: 0x5A82 128 bytes of data (1) Data: 08F4D5CBC10063725B206F787EB7370BBD0C5B4854CE79A9007D1801AEAEE6E6D2C68D7E DF877FECE1FA539D08BEC54BD152BA05113951E8A84CDECAD2CB8E7AC28BE916570BA7BB9C00C64D F57113C4AE81613BD351541523CD3A028FBF220EF7469BD4175302DCB5B6E886974877F28A2D3014 33AFFFE26081008BFF687B37 --------------------------- Packet Type: UNKNOWN PACKET!! (36) Length: 129 (No handler known. Skipping 1 bytes) Data: 0x67 I couldn't figure out what the spurious packet was about, you just solved that one... pgpacket is inserting spurious 00s in the message. (I've Cc'ed Mark Shoulson). Adam From befcorp at mail.ios.net Tue Sep 22 03:16:59 1998 From: befcorp at mail.ios.net (befcorp at mail.ios.net) Date: Tue, 22 Sep 1998 18:16:59 +0800 Subject: advertisement Message-ID: <199809222303.QAA06660@toad.com> 561 540 4028 561 540 4028 E MAIL KING AND ASSOCIATES PUTS MONEY INTO YOUR POCKET!! OUR COMPANY HAS OVER 3 YEARS PROVEN E MAIL BLASTING EXPERIENCE! WORK SMARTER BY HAVING QUALIFIED PEOPLE PHONE YOU, ALREADY PREPARED TO BUY. PUT YOUR COLD CALLING DAYS TO AN END. TRY US OUT TODAY AND JUDGE THE RESULTS FOR YOURSELF! 10,000 E MAILS ARE ONLY $125.00 US. Do you only market your product or service geographically? Not a problem with E Mail King. We can target your e-mail broadcastes into the city of your choosing! FOR THOSE OF YOU WHO NEED MAILING CONTINOUSLY DONE, WE WILL E MAIL YOUR ADD TO 7500 DIFFERENT ADDRESSES DAILY MONDAY THROUGH FRIDAY MONTH AFTER MONTH FOR ONLY $250.00 PER MONTH. CALL TODAY FOR DETAILS ON THIS FANTASTIC OFFER!! IF YOU ALREADY HAVE YOUR OWN E MAIL SYSTEM, WHY NOT TRY OUR SUBCRIPTION SERVICE WHERE YOU WILL RECEIVE 50,000 FRESH GOOD E MAIL ADDRESSES EVERY MONTH FOR ONLY $90.00. ARE YOU INTERESTED IN BEING AN E MAIL KING RESELLER? PUT EVEN MORE MONEY INTO YOUR POCKET TODAY BY SIGNING UP WITH OUR PROGRAM TODAY!! IT DOES NOT COST ANYTHING TO JOIN!! We accept Visa, Mastercard or Cheque by Fax. James phone 561 540 4028 _________________________________________________________________ TO BE REMOVED FROM OUR LIST, email james456 at indiasite.com and type in "remove" in the subject header or call (561)540 4028 our mailing address is EMAIL KING 1790 Bonhill Rd Mississauga Ontario Canada From ravage at EINSTEIN.ssz.com Tue Sep 22 03:26:38 1998 From: ravage at EINSTEIN.ssz.com (Jim Choate) Date: Tue, 22 Sep 1998 18:26:38 +0800 Subject: respect due to anonymous (Re: CHALLENGE response (fwd)) (fwd) Message-ID: <199809222352.SAA07394@einstein.ssz.com> Forwarded message: > Date: Tue, 22 Sep 1998 20:20:37 +0100 > From: Adam Back > Subject: respect due to anonymous (Re: CHALLENGE response (fwd)) > Munge signatures!? He generated an RSA key pair to match the > pre-published signature based on generating primes of special form > and/or using multiple smaller primes to construct an n which he could > perform discrete logs in (plus a dead beef attack), and all you can > say is the above. You should take you hat off to anonymous. What he did is respectable. Is he the first? I doubt it. ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From sunder at brainlink.com Tue Sep 22 03:47:48 1998 From: sunder at brainlink.com (Sunder) Date: Tue, 22 Sep 1998 18:47:48 +0800 Subject: (99% noise) Stego-empty hard drives... (fwd) In-Reply-To: <199809221948.OAA06096@einstein.ssz.com> Message-ID: <3608369E.6018339C@brainlink.com> Jim Choate wrote: > Consider that at any given time there are only a few hundred BIOS'es, made > from a few dozen base images, driving all the machines out there. The number > of companies that develop their own BIOS in toto for in-house products is next > to nil (I know of none). What they do is buy a license and then re-write the > sections they need to. See: http://www.ping.be/bios/ for bioses and flash upgrades. > The TEMPEST signal will be effected by speed, I see no reason to suspect > that it's going to be processor dependant. Since the code gets executed > in the same sequence in these shared BIOS there is going to be a shared > footprint, which may get squeezed because of increased clock speed. Measuring > that footprint at ranges of inches is nowhere near as expensive as trying to > catch a monitor image from a block away. > > If you store those few thousand footprints and do a compare any bozo can > in fact run the machine. Just sit and watch to see if the red light comes > on and call your supervisor. Come on guys, this is silly. Why the fuck would the UK tempest scan your notebooks? Manufacturers produce new machines every month, each with modified BIOSes for the features in their new notebooks, with hardware variations and imperfection, with different power levels of batteries, different PC cards installed, different CPU speeds, different options and other inconsistencies you get a very difficult situation. Your speculation that someone out there will tempest scan to see if you've modded your notebook is silly. Are you just pissing against the wind, or do you have knowledge that they actually do this? You're forgetting your threat model and planning for a level that's beyond demented paranoia. -- =====================================Kaos=Keraunos=Kybernetos============== .+.^.+.| Sunder |Prying open my 3rd eye. So good to see |./|\. ..\|/..|sunder at sundernet.com|you once again. I thought you were |/\|/\ <--*-->| ------------------ |hiding, and you thought that I had run |\/|\/ ../|\..| "A toast to Odin, |away chasing the tail of dogma. I opened|.\|/. .+.v.+.|God of screwdrivers"|my eye and there we were.... |..... ======================= http://www.sundernet.com ========================== From billp at nmol.com Tue Sep 22 04:20:32 1998 From: billp at nmol.com (bill payne) Date: Tue, 22 Sep 1998 19:20:32 +0800 Subject: public key problems Message-ID: <36083BEF.2AF1@nmol.com> Tuesday 9/22/98 5:59 PM Smith http://www.softwar.net/softd.html I am reading http://www.softwar.net/mcc.html I scanned-in the attached letter from McNamara. Morales and I have been considering an appropriate response. Public key has cost NSA and the gov BIG BUCKs. Numerical analyst Richard Hanson worked in the same math group as Simmons, Brickell and Norris. http://www.vni.com/products/imsl/hanson.html Mike Norris, Hanson told me, designed the reciprocal approximation used for division. Hanson told me several days ago he knows what went wrong mathematically. Hanson told me that he is even thinking of writing an article about it. I WAS TOLD what went wrong electronically. By John Wisniewski. And FUNCTIONALLY by Ron Kulju. best bill NATIONAL SECURITY AGENCY FORT GEORGE G. MEADE, MARYLAND 20755-6000 Serial: J9343A-98 19 August 1998 Mr. William H. Payne 13015 Calle de Sandias Albuquerque, NM 87111 Dear Mr. Payne: This replies to your 15 May 1998 letter appealing the National Security Agency's (NSA) decision to deny your request for a fee waiver for your Freedom of Information Act request for invoices from various companies to NSA for payments for developing public key-related chips or Clipper chip-related hardware between January 1980 and February 1998. Your appeal was received in the Office of General Counsel on 29 May 1998. I have reviewed your 27 February 1998 request, the Office of Policy's 30 March 1998 response, and your appeal letter; and I have concluded that the fee waiver should not be granted. In reaching this decision, a number of factors were evaluated in light of the Act's purpose of promoting an informed citizenry. The key issue I considered in my review is whether disclosure of the information is likely to contribute to the pubic understanding of the operations or activities of the government. See 5 U.S.C. � 552 (a)(4XA)(iii). Implicit in this standard is a requirement to assess the nature of the information requested and whether it will likely be disseminated to the general public and will contribute to increased public understanding of the operations of the government. In order to support a fee waiver; the connection between furnishing the requested information and benefiting the public should be substantial. You have not indicated how you intend to disseminate any information which might be released; we assume that you intend to place the material on the Internet. Making information available by posting it on the Internet so that a segment of interested persons might seek access to it does not meet the burden of demonstrating with particularity that the information will significantly contribute to the understanding of the public at large. You have not demonstrated that you have the skills and knowledge to be able to compile, analyze, and turn the materials into a distinct work understandable to the general public. Accordingly, I have determined that the public interest is better served in this instance by requiring, rather than waiving, the fee assessment. This response may be construed as a denial of your appeal. Accordingly, you are hereby advised of your right to seek judicial review of my decision pursuant to 5 U.S.C. � 552(a)(4)B) in the United States District Court in the district in which you reside, in which you have your principal place of business, in which the Agency's records are situated (U.S. District Court of Maryland), or in the District of Columbia. As the Deputy Director of Policy explained to you, you have been placed in the"all other" category for fee purposes; this entitles you to 2 hours of search time and up to 100 pages free of charge. Your case file has been returned to the Office of Policy. Processing of your request has been suspended pending receipt of your certified check or money order made payable to the Treasurer of United States in the amount of $750.00. If you have any questions or wish to narrow your request in order to reduce fees, please contact the Office of Policy between 0830 and 1600 EST on 301-688-6527. If we do not hear from you within 30 days, we will assume you are not interested in pursuing this request. Sincerely, BARBARA A. McNAMARA Freedom of Information Act/Privacy Act Appeals Authority Friday February 27, 1998 3:15 PM By e-mail and US mail Lieutenant General Kenneth A Minihan, USAF Director, National Security Agency National Security Agency 9800 Savage Road Fort George G. Meade, MD 20755-6000 Dear General Minihan: Purposes of the letter are to 1 request information under the Freedom of Information Act 2 explore settlement possibilities of our current lawsuit. In about 1986 Sandia National Laboratories assigned me the task of design and construction of a Comprehensive Test Ban Treaty seismic data authenticator. In the initial stages of the project, Sandia cryptographer Gustavus Simmons attempted to convince both Sandia management and NSA employees Tom White, Mark Unkenholtz, and Ed Georgio that a form of public key authentication should replace NSA employee Ronald Benincasa's National Seismic Station/Unmaned Seismic Observatory 11-bit data authentication algorithm. My Sandia supervisor John Holovka and project leader H B [Jim] Durham ordered me to write a paper explaining public key cryptography. This paper, RSA ENCRYPTION, along with my SAND report describing my implementation of Benincasa's algorithm and filings in our lawsuit, now appear on Internet at http://www.jya.com/index.htm, click CRYPTOME, then OpEd, then http://www.jya.com/whprsa.htm. Sandia explored the merits of switching from Benincasa's algorithm to a public key-based authentication method suggested by Simmons. For Sandia's evaluation of the merits of public key, electronic tagging, and Bureau of Engraving and Printing projects , I bought for Sandia samples both the Cylink CY1024 and AT&T A & B two chip sets for modulo m arithmetic computations. NSA employee Tom White sent me a copy of the SECRET classified NSA report on IBM's hardware public key chip FIREFLY. I wrote in my tutorial paper RSA hardware computations The slow speed of software RSA computations plus the potential wide use prompted several companies to build chips which compute modular arithmetic to at least several hundred bits. Most of these chips "cascade" to compute with a larger number of bits. Corporations involved in building these chips are 1 IBM Firefly 2 AT&T 3 Motorola (apparently a three chip set) 4 Cylink Pittway-First alert 5 Sandia Labs (Algorithm M and predecessor chip) Details of the IBM chip is classified. AT&T as of July 1987 has not released details of their chip. Little information is available on the Motorola chip set. The Cylink chip is commercially available. Its price dropped from $1,500 to $600 each in June 1987. Data is transferred to and from the chip with serial shift register communication. The early Sandia chip was limited in speed. The replacement chip is cascadeable, communicates with 8 or 16 bits parallel, matches the speed of the Cylink chip, but is not out of fabrication. Rumors circulate that there is about an order of magnitude performance difference between some of these chips. These hardware chips improve exponentiation speed about 3 orders of magnitude over software implementation benchmarked on an Intel 8086 family microcomputer. Whitfield Diffie writes about both the Cylink and Sandia chips. And is quoted at http://www.aci.net/kalliste/nukearse.htm. Sandia had terrible luck with its public key chips. I reported SOME of the troubles to Electronic Engineering Times editor Loring Wirbel [http://techweb.cmp.com/eet/823/] on March 23, 1994. Dr. John Wisniewski was a supervisor at Sandia's Center for Radiation-hardened Microelectronics. Wisniewski was a graduate student at Washington State University in about 1975. I was a professor at WSU. Wisniewski knows all about the failing Sandia chips in the nuclear arsenal. I took notes on February 13, 1993. Wisniewski reviewed the problems again for me. 1 No quality initiative. Each chip lot had a different process. 2 Overall yield - 40-50%. Down to 10% after packaging. 3 Metalization problems. No planarization. No flow of glass. Couldn't use high temperature. Step coverage problems. Layed down over tension. 100% field returns over several years. 4 Sandia would store lots of parts for replacements. Sandia management made the decision to place low yield parts in the nuclear arsenal. Sandia must meet DOD schedules management reasoned. Hundreds of millions spent on CRM. Sandia must show productivity. Wisniewski told me that low yield chip test survivors are those whichthe tests failed to detect failures. Wisniewski will talk. 503-625-6408. Wisniewski now works for Intel in Oregon. Have Wisniewski tell you about the fire in the CRM clean room! Sandia supervisor Jerry Allen later told me it cost $300,000 each to remove Sandia's failing chips at Pantex from a nuclear bomb. NSA apparently is biased toward hardware implementations of cryptographic and authentication algorithms. As opposed to software implementation. NSA representatives and Sandia management decided not to use a public key authentication scheme for its CTBT seismic data authenticator because of all of the problems with implementing public key algorithms. But NSA surely has spent MUCH MONEY on public key chip implementations. NSA is promoting its Clipper crypto chips as described at http://cpsr.org/dox/clipper.html. And we get some information about technical specifications of NSA's Clipper chip at http://www.us.net/softwar/http://www.us.net/softwar/clip.html Clipper Chip Information MYK-78 CLIPPER CHIP ENCRYPTION/DECRYPTION ON A CHIP 1 micron double level metal CMOS technology 0.35 watts power 28 pin plastic leaded chip carrier (PLCC) package Transistor to transistor logic (TTL) interface Chip ID, family key and device unique key are installed at programming. Chip ID, family key and device unique key are installed at programming facility and are completely transparent to the user. Therefore, Under the provision of the Freedom of Information Act, 5 USC 552, I am requesting access to: 1 Copies of all invoices from A AT&T B Motorola C IBM D Sandia National Laboratories to NSA for payments for developing ANY public key-related chips between January 1, 1980 and February 27, 1998. 2 Copies of all invoices to NSA from ANY corporation involved in development of ANY Clipper chip-related hardware between January 1, 1980 and February 27, 1998. The public has a right to know how much NSA spent on TRYING monoploize the crypto business. If there are any fees for searching for, or copying, the records I have requested, please inform me before you fill the request. As you know, the Act permits you to reduce or waive the fees when the release of the information is considered as "primarily benefiting the public." I believe that this requests fits that category and I therefore ask that you waive any fees. If all or any part of this request is denied, please cite the specific exemption(s) which you think justifies your refusal to release the information and inform me of your agency's administrative appeal procedures available to me under the law. I would appreciate your handling this request as quickly as possible, and I look forward to hearing from you within 20 working days, as the law stipulates. With respect to our current FOIA lawsuit, I feel that we should settle this unfortunate matter. I see from your biography at http://www.nsa.gov:8080/ and http://www.nsa.gov:8080/dirnsa/dirnsa.html that you are 1979 Distinguished Graduate Master of Arts degree in National Security Affairs Naval Postgraduate School Monterey, California One of my former M.S. and Ph.D students in Computer Science, Ted Lewis, is currently the chairman of Computer Science at Naval Postgraduate School [http://www.friction-free-economy.com/]. Small world. But I think that this emphasizes that WE SHOULD all be on the same side. Not engaged in a conflict in US federal court. Or on Internet. NSA attempts to withhold requested information are possibly unwise. In our wired world the aggrieved know what happened to them. [http://www.aci.net/kalliste/speccoll.htm]. http://www.wpiran.org/, http://www.netlink.co.uk/users/impact/namir/namirm.html And moderates in Iran, [http://persia.org/khatami/biography.html], appear want settlement too. My family and I have been damaged by these crypto wars. I ask you that consider fair settlement of damages caused by the National Security Agency. I cannot find your e-mail address on Internet. Therefore I will forward the e-mail copy of this FOIA/settlement letter to Ray Kammer of NIST [http://www.nist.gov/], who along with the FBI [http://www.fbi.gov/, http://www.fbi.gov/fo/nyfo/nytwa.htmand], and NSA are trying to control the crypto business so that Kammer can possibly forward an e-mail copy of the FOIA/Settlement letter to you. Sincerely, bill William Payne 13015 Calle de Sandias Albuquerque, NM 87111 505-292-7037 [I am not reading e-mail] From ravage at EINSTEIN.ssz.com Tue Sep 22 04:21:57 1998 From: ravage at EINSTEIN.ssz.com (Jim Choate) Date: Tue, 22 Sep 1998 19:21:57 +0800 Subject: (99% noise) Stego-empty hard drives... (fwd) Message-ID: <199809230049.TAA07693@einstein.ssz.com> Forwarded message: > Date: Tue, 22 Sep 1998 19:45:34 -0400 > From: Sunder > Subject: Re: (99% noise) Stego-empty hard drives... (fwd) > Jim Choate wrote: > > > Consider that at any given time there are only a few hundred BIOS'es, made > > from a few dozen base images, driving all the machines out there. The number > > of companies that develop their own BIOS in toto for in-house products is next > > to nil (I know of none). What they do is buy a license and then re-write the > > sections they need to. > > See: http://www.ping.be/bios/ for bioses and flash upgrades. Ok, so I went and looked. That particular page covers ONLY Award and AMI BIOS's. Every one of those *thousands* of machines have a BIOS which is about 90% cherry and built from only a few dozen base builds. It actualy supports my premise that despite the thousands of machines the base BIOS images that drive them are really not that large. > Come on guys, this is silly. Why the fuck would the UK tempest scan your > notebooks? Manufacturers produce new machines every month, each with modified > BIOSes for the features in their new notebooks, with hardware variations and > imperfection, with different power levels of batteries, different PC cards > installed, different CPU speeds, different options and other inconsistencies > you get a very difficult situation. And everyone one of them available publicly. You seriously think it's harder to keep up with the number of BIOS'es out there than say tracking the number of international phone calls in a year? > Your speculation that someone out there will tempest scan to see if you've > modded your notebook is silly. Are you just pissing against the wind, or do > you have knowledge that they actually do this? Not if it is only one or two, if it becomes a serious issue you bet they'll do it in a heartbeat. > You're forgetting your threat model and planning for a level that's beyond > demented paranoia. Your absolutely correct, they are paranoid. ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From sunder at brainlink.com Tue Sep 22 04:32:39 1998 From: sunder at brainlink.com (Sunder) Date: Tue, 22 Sep 1998 19:32:39 +0800 Subject: Stego-empty hard drives... (fwd) In-Reply-To: <199809221938.OAA06031@einstein.ssz.com> Message-ID: <360840E8.7C1AC239@brainlink.com> Jim Choate wrote: > We're not discussin stego, we're discussing hidden disk partitions, not > hiding data in the lsb of of existing observable disk partitions or > something similar. Steganography is the art of hiding data. Hiding disk partions IMHO falls under this. Hiding data in the LSBits of bytes is only an EXAMPLE of stego, it doesn't define stego. Even the subject of this message says Stego Empty hard drives conforming to this definition. > > Who the fuck is gonna run a tempest scanner on your notebook again? Let's > > Considering the cost of such a scanner (a few $10k/ea.) and assuming such > masking technology were to become commen place I doubt if very many > customs checkpoints at major transfer hubs wouldn't have them. Why would they implement it when they can simply have their software scan the BIOS code if that's what they feared? It may cost them $10k each, but it'll cost them millions to design and scan every notebook type on the planet, and then they'll have to get their hands on newer models as soon as they hit the market. You're talking about a project that's bigger in magnitude than the NSA. > > Why would you need to collect BIOSes? You only need to modify a single BIOS - > > the one on >YOUR< notebook. The camouflage code would be a few hundred bytes > > at most unless you do something overly elaborate. > > I suspect it would be several k actualy since it is going to have to > include the encryption code, device drivers, wedgers, etc. Why should YOUR BIOS need to contain encryption code or device drivers for that matter? All it needs to do is to HIDE the existance of the extra partition. You modify every INT 13 functions to look for the track number being beyond a certain value. As rusty and as fucked as my x86 code is this shows the general idea: You patch your BIOS by replacing a few bytes of code with CALL's and NOP's. Maybe 4-8 bytes at most to modify. The routine that checks for the track range is only several bytes: Somehwere in INT13 code: blah blah blah CALL biospatch NOP ; to fill in the overwritten code to the next opcode biospatch PUSH AX ;save the register if you need it MOV AX,switch ;get the value of the hack switch switch JE popbye POP AX CMP AX,1234 ;or whatever register or whatever value JLE bye deny MOV AL,FAIL ;some reg and some value that says error, likely AL RET popbye POP AX bye ;insert the code that you overwrote with your CALL to this patch re RET Homework: Someone please take this code, optimize it for size and build a TSR patching INT 13 that JIM can install and run under DOS. Whoop... that takes less than 25 bytes of code to implement for each of the INT 13 functions. If you don't believe me, run debug and type in some similar code. All it needs to do is to check if the hack is in place, if so, check the cylinder/track # being accessed. If it's bigger than your limit, return an error, otherwise allow it. Where's the big fucking several K of code there? A few more lines of code to implement the hidden switch code and you're set. Maybe modify the routine that checks for ESC to skip the memory check or DEL to enter the setup, what another 25 byte patch? Once you find out where the bios does it's checksum, you NOP that entire section out, or recalculate the checksum yourself if you want to be anal. This doesn't add any extra bytes. Or if you're truly insanly paranoid, modify the bios password routine so that if you type in a certain password it toggles the hacked mode on or off. Maybe a 100 byte patch at most. > A disassembler isn't a a debugger. All a disassembler does is convert the > hex to symbols (see frankenstein for an excellent design). Semantics. I can use debug to disassemble a ROM bios and trace through it. It does the fucking job. Sure, it doesn't translate symbols or do anything fancy, but it's enough to do what >THIS< project requires. > > One thing all you fine folks are forgetting is that there are MANY types > > of notebooks out there. > > With only a few dozen BIOS'es driving the whole kit and kaboodle. Yeah, and each of those hundreds of types of notebooks have their own MODIFIED BIOSES with various patches and flash updates. Good luck collecting a copy of EVERY version of EVERY bios for EVERY brand of notebook made in various countries with various languages, options, and other permutations. > They're new, they will learn from their mistakes and it won't take long. > After all, they have your tax dollars to use... Yeah, yeah, yeah, next thing you'll tell me is that they'll start to stick people in MRI machines to scan for drugs. Sure, you can do whatever you like if you've got infinite resources. Show me someone who does. Look if your threat model is some bloke in an airport with a shrink wrapped floppy, even a shit solution will fool him. If your threat model is ten orders of magnitude more fascist, then they very likely won't even let you carry a notebook. -- =====================================Kaos=Keraunos=Kybernetos============== .+.^.+.| Sunder |Prying open my 3rd eye. So good to see |./|\. ..\|/..|sunder at sundernet.com|you once again. I thought you were |/\|/\ <--*-->| ------------------ |hiding, and you thought that I had run |\/|\/ ../|\..| "A toast to Odin, |away chasing the tail of dogma. I opened|.\|/. .+.v.+.|God of screwdrivers"|my eye and there we were.... |..... ======================= http://www.sundernet.com ========================== From nobody at replay.com Tue Sep 22 04:58:34 1998 From: nobody at replay.com (Anonymous) Date: Tue, 22 Sep 1998 19:58:34 +0800 Subject: CHALLENGE response Message-ID: <199809230100.DAA27355@replay.com> > What form are your primes (did you use Maurers idea to increase the > relative hardness of factoring compared to discrete log, or did you > just use more smaller primes?) How many primes have you used, and how > many CPU hours did it take to calculate the discrete log to discover e? N is the product of two primes, but each p-1 has about 16 small prime factors (about 25-35 bits) to allow calculating the discrete log efficiently. With this choice of primes it took about three hours to run the discrete log. > Also is the code for finding discrete logs given the prime > factorisation of the modulus available? Here you go. This uses cryptolib by Jack Lacy of AT&T (not to be confused with cryptlib by Peter Gutmann), available from ftp://ftp.funet.fi/pub/crypt/cryptography/libs/cryptolib_1.1.tar.gz /* Calculate discrete log using various algorithms */ /* Algorithms based on Handbook of Applied Cryptography by Menezes et al */ #include "libcrypt.h" /* Modular multiplication - m1*m2 mod n */ static void bigMultiplyN (BigInt m1, BigInt m2, BigInt n, BigInt result) { BigInt tmp = bigInit(0); bigMultiply (m1, m2, tmp); bigMod (tmp, n, result); freeBignum (tmp); } /* Modular addition, m1+m2 mod n */ static void bigAddN (BigInt m1, BigInt m2, BigInt n, BigInt result) { bigAdd (m1, m2, result); if (bigCompare (result, n) >= 0) bigSubtract (result, n, result); } /* Iterate the pollard rho. Modify x, a, b with next values */ static void prhoiter (BigInt base, BigInt val, BigInt mod, BigInt order, BigInt *x, BigInt *a, BigInt *b) { int xgroup; /* First decide what group x is in */ /* This is a cheat to be fast */ xgroup = ((unsigned)(*x)->num[0]+1) % 3; switch (xgroup) { case 0: bigMultiplyN (*x, val, mod, *x); bigAddN (*b, one, order, *b); break; case 1: bigMultiplyN (*x, *x, mod, *x); bigAddN (*a, *a, order, *a); bigAddN (*b, *b, order, *b); break; case 2: bigMultiplyN (*x, base, mod, *x); bigAddN (*a, one, order, *a); break; } } /* Pollard rho algorithm for discrete log */ BigInt pollardrho (BigInt base, BigInt val, BigInt mod, BigInt order) { BigInt x = bigInit(1), a = bigInit(0), b = bigInit(0), x2 = bigInit(1), a2 = bigInit(0), b2 = bigInit(0); int cnt = 0; for ( ; ; ) { prhoiter (base, val, mod, order, &x, &a, &b); prhoiter (base, val, mod, order, &x2, &a2, &b2); prhoiter (base, val, mod, order, &x2, &a2, &b2); if (bigCompare (x, x2) == 0) break; if (++cnt % 1000 == 0) { printf ("%d\r", cnt); fflush (stdout); } } if (cnt >= 1000) printf ("\n"); if (bigCompare (b, b2) < 0) bigAdd (order, b, b); bigSubtract (b, b2, b); if (bigCompare (a2, a) < 0) bigAdd (order, a2, a2); bigSubtract (a2, a, a); if (bigCompare (b, zero) == 0) { printf ("Pollard rho failed\n"); exit (1); } getInverse (b, order, b2); bigMultiplyN (a, b2, order, a); return a; } /* * Do the CRT with multiple congruences. congs are the values that the * answer should be congruent to, mods are the moduli for each congruence. * n tells how many in each array. */ static BigInt crtmult (BigInt congs[], BigInt mods[], int n) { int i; BigInt prod = bigInit(0); BigInt prod1 = bigInit(0); BigInt sum = bigInit(0); BigInt quot = bigInit(0); BigInt rem = bigInit(0); BigInt dum = bigInit(0); BigInt inv = bigInit(0); BigInt term = bigInit(0); /* Compute product of moduli */ bigCopy (one, prod); for (i=0; i Forwarded message: > Date: Tue, 22 Sep 1998 20:29:28 -0400 > From: Sunder > Subject: Re: Stego-empty hard drives... (fwd) > Why would they implement it when they can simply have their software scan the > BIOS code if that's what they feared? It may cost them $10k each, but it'll > cost them millions to design and scan every notebook type on the planet, and No, again, they only have to scan the BIOS types and there are only a couple thousand (if that many) of those. It really isn't that complicated, there are only a few cpu's, there are only a few glue chip sets, only a few video driver chip sets, only a few LCD panels, etc. Admitted when multiplied together there are a lot of combinations. Now the board manufacturers, the BIOS manufacturers, and the various glue chipset makers get together and share data and the manufacturers look to their marketing to define their target point. Then they do a cost analysis on the chipset combo's and pretty soon you find the market only handles a handful of fundamentaly different machines. If there was as much variety at the hardware level as you assume nobody could afford to introduce new computers every few months. > then they'll have to get their hands on newer models as soon as they hit the > market. You're talking about a project that's bigger in magnitude than the > NSA. No it isn't. All it takes to get the BIOS before it hits the market is get a license agreement with the BIOS manufacturer. Hell, when I worked at Compu-Add we did this sort of stuff with Award and Phoenix all the time. We would get alpha copies to test in our new hardware on a regular basis. > Why should YOUR BIOS need to contain encryption code or device drivers for that > matter? All it needs to do is to HIDE the existance of the extra partition. And the code in the BIOS which means it needs to be hidden just like some viruses. Realisticaly it isn't this complicated. All one needs to do is write a program that allows the operator to talk directly to the hard drive controller. At that point it's a trivial matter to go out and find those hidden partitions. You could use normal drive recovery software if you had a mind, and that only costs a few hundred to a few thousand dollars and can be bought in the back of Computer Shopper. > You patch your BIOS by replacing a few bytes of code with CALL's and NOP's. > Maybe 4-8 bytes at most to modify. The routine that checks for the track range > is only several bytes: > > > Somehwere in INT13 code: > blah > blah > blah > CALL biospatch > NOP ; to fill in the overwritten code to the next opcode > > > biospatch PUSH AX ;save the register if you need it > MOV AX,switch ;get the value of the hack switch switch > JE popbye > POP AX > CMP AX,1234 ;or whatever register or whatever value > JLE bye > deny MOV AL,FAIL ;some reg and some value that says error, likely AL > RET > > popbye POP AX > bye ;insert the code that you overwrote with your CALL to this patch > re > RET > > > Homework: Someone please take this code, optimize it for size and build a TSR > patching INT 13 that JIM can install and run under DOS. Don't bother, I already know how to do that. This would stand out like a sore thumb. ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From vznuri at netcom.com Tue Sep 22 06:02:11 1998 From: vznuri at netcom.com (Vladimir Z. Nuri) Date: Tue, 22 Sep 1998 21:02:11 +0800 Subject: IP: Police seek to intercept emails without warrant: UK Message-ID: <199809230203.TAA21764@netcom13.netcom.com> From: believer at telepath.com Subject: IP: Police seek to intercept emails without warrant: UK Date: Sun, 20 Sep 1998 11:13:14 -0500 To: believer at telepath.com Source: London Telegraph http://www.telegraph.co.uk:80/et?ac=000150689433551&rtmo=wMontQMb&atmo=99999 999&P4_FOLLOW_ON=/98/9/20/nemai20.html&pg=/et/98/9/20/nemai20.html UK News Electronic Telegraph Sunday 20 September 1998 Issue 1213 Police seek to intercept emails without warrant By David Bamber THE police will be able to intercept private emails without obtaining a warrant, under a new agreement being finalised with Internet providers. The Telegraph has discovered that the police are negotiating the right to monitor electronic letters by examining information held on disks at the offices of the computer companies providing the links. Because the laws on interception were drafted before emails were widely used, the police do not need to obtain individual warrants to read the correspondence. Telephone tapping and the interception of ordinary post require a warrant from the Home Secretary, Jack Straw. The police say they need access to emails sent by the country's eight-million Internet users so that they can monitor criminal activity, especially paedophile and pornography rings. Mr Straw is backing the proposed agreement. The police want all Internet providers to keep copies of emails for a week. But the far-reaching moves have led to fears that the private correspondence of innocent people and businesses will be routinely monitored. Liz Parratt, of the civil liberties organisation, Liberty, said: "Allowing the police to read emails without a warrant would be akin to allowing them to steam open our letters as soon as we put them in the post box. I'd be interested to hear if any Internet providers signed up to this shabby deal." The first of three forums between Internet providers and the Association of Chief Police Officers will be held in Edinburgh on Tuesday. � Copyright Telegraph Group Limited 1998. ----------------------- NOTE: In accordance with Title 17 U.S.C. section 107, this material is distributed without profit or payment to those who have expressed a prior interest in receiving this information for non-profit research and educational purposes only. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml ----------------------- ********************************************** To subscribe or unsubscribe, email: majordomo at majordomo.pobox.com with the message: (un)subscribe ignition-point email at address ********************************************** www.telepath.com/believer ********************************************** From nobody at replay.com Tue Sep 22 06:13:37 1998 From: nobody at replay.com (Anonymous) Date: Tue, 22 Sep 1998 21:13:37 +0800 Subject: SLICK WILLIE'S SHITHOUSE SPECIAL!!! Message-ID: <199809230206.EAA32637@replay.com> SLICK WILLIE'S SHITHOUSE SPECIAL!!! ----------------------------------- For a limited time, Slick Willie is offering you a chance to provide your future children with a Conception-to-Grave life experience. For a campaign contribution of $1 million, you can conceive your child in the Lincoln bedroom and guarantee their burial at the Arlington National Cemetery. For an addition half-million dollar donation, Slick Willie is offering coupons your future children can use to live off of Federal Farm Subsidies or Welfare, depending on their preference for city-living or the country life. ACT NOW! First hundred contributors will be entered in a drawing to be held for a pair of Paula Jones' panties! (A signed and numbered piece from Slick Willie's personal collection.) From pgut001 at cs.auckland.ac.nz Tue Sep 22 06:31:22 1998 From: pgut001 at cs.auckland.ac.nz (Peter Gutmann) Date: Tue, 22 Sep 1998 21:31:22 +0800 Subject: German court: DES is no good Message-ID: <90651796017802@cs26.cs.auckland.ac.nz> http://www.thestandard.net/articles/display/0,1449,1780,00.html German Court Ruling Another Blow To U.S. Encryption Standard By Mary Lisbeth D'Amico MUNICH - A German district court has ordered a bank in Frankfurt to repay a customer 4,543 marks (US$2,699) for money withdrawn from her bank account after her bank card was stolen. The decision, made public Monday, again points to the holes in the 56-bit encryption technology used in Eurocheque cards, called EC Cards, according to the Chaos Computer Club, a German hackers group. Calling the encryption technology for the EC bank cards "out-of-date and not safe enough," a Frankfurt District Court held the bank responsible for the amount stolen from the 72-year old plaintiff in February 1997. Neither the bank's name or that of the plaintiff were revealed. An EC card is like a bank card which can be used at bank automats and point-of-sale terminals throughout Europe. The cards feature the U.S. government's data encryption standard, which uses 56-bit encrypted code to scramble the security information. [Rest snipped] From declan at well.com Tue Sep 22 07:30:04 1998 From: declan at well.com (Declan McCullagh) Date: Tue, 22 Sep 1998 22:30:04 +0800 Subject: NSF grants to Internet at risk) Message-ID: ---------- Forwarded message ---------- Date: Tue, 22 Sep 1998 20:28:31 -0700 (PDT) From: Declan McCullagh To: politech at vorlon.mit.edu Subject: NSF grants to Internet at risk [Seems to me that this dispute involves two perils: class action suits and government funding of technology that can be easily paid for by the private sector. I mean, it's not like the world's corporations hasn't figured out the Internet is important. Besides, government funding often means greater control. Early on in public broadcasting, the government barred TV stations from editorializing. Currently government grants to community radio stations don't go to ones with eclectic and thus probably more interesting programming -- which need the cash the most. And remember that Senate encryption bill that basically said government-funded networks must use key escrow? Obviously the details of the suit and the fund are important here, but the broader point is worth keeping in mind. --Declan] ---------- Forwarded message ---------- Date: Tue, 22 Sep 1998 20:40:17 -0400 From: David Lytel To: Declan McCullagh Subject: Fwd: URGENT breaking news: Internet funding crisis [personal note snipped. --dbm] Internet Funding Crisis: A Call to Action for CyberCitizens For more information call David Lytel of Sherpa Consulting Group at 1-315-473-8996 or 1-888-GUIDING Unknown to the rest of the world, Senate Majority Leader Trent Lott is engaged in an effort to remove millions of dollars from the budget of the National Science Foundation (NSF) that the Congress has previously made available to invest in new Internet technologies. Lott is trying to repeal action earlier this year that ratified the Internet Intellectual Infrastructure Fund as a congressionally authorized tax on the registration of Internet domain names. This was necessary because of a lawsuit brought against Network Solutions, Inc., which has been acting as a domain registration authority for the Internet under a cooperative agreement with the NSF. In Thomas v. Network Solutions, Inc., 1998 WL 191205, US District Court Judge Hogan ruled that the domain name registration fee was an unauthorized tax. Based on Congress's belated ratification of the fee (in the VA/HUD Supplemental Appropriation bill earlier this year), Hogan ruled that it was authorized. This issue is being appealed to the United States Court of Appeals for the DC Circuit. Regardless of the outcome of the Lott amendment, this means that the DC Circuit will consider the lawfulness of the fund. Lott's maneuver is to add the repeal of the ratification to the Internet Tax Freedom Act, which has passed the House and may reach the floor as early as this week. In the Senate, the Internet Tax Freedom Act has passed both the Commerce and the Finance Committees without the change, but Lott is circulating a draft managers amendment that would repeal the ratification. What is at stake: At stake is about $60 million that the NSF would no longer have available to invest in research and development of high speed networks and bandwidth-intensive applications. If this is settled in the courts, about $15 million would go to the attorney for the plaintiffs and most of the rest would be lost to administrative fees as Network Solutions finds ways to make rebates people who have registered domain names. The payoff to individual domain holders would be only a few dollars. The NSF would lose funds that are supposed to be available to aid universities as they upgrade their connections from today's commodity Internet connections to tomorrow's Internet 2 level connections. For the commercial Internet, this means that advanced research on different approaches relieve Internet congestion will be slowed or stopped. The NSF funds experimental networks that address the fundamental problem of traffic congestion on today's Internet. The problem goes beyond the limitations of access technologies such as today's modems or even access technologies such as ISDN. There are segments of what are supposed to be the Internet's high speed corridors that are significantly blocked during periods of peak use. Part of the solution is building more and bigger pipes to carry Internet traffic. But it is also quite likely that demand is growing quickly enough to fill much of this capacity. The Internet traffic problem is not unlike the automobile traffic problem in our major cities in the 1960s, when no matter how many new bridges and highways we built we never managed to get ourselves out of a traffic jam. This is why a significant part of the Internet's original academic pioneers are experimenting with new technologies to separate and prioritize Internet traffic. The Internet's underlying technologies are designed to implement what is called a "best effort" level of service�meaning that if packets cannot be delivered the Internet keeps trying to send them for three days before giving up. Just as HOV (high occupancy vehicle) lanes have been part of the solution to the problem of highway traffic, tomorrow's Internet will support quality-of-service or QoS distinctions so that the bits containing an MRI moving between a primary care physician and a specialist are given the priority they deserve over more playful uses of the Internet. While industry is addressing the problem of congestion in various ways, it is often the university research community that produces the innovative solutions that no one has yet thought of. This ability to prioritize packets, in conjunction with the ability to reserve bandwidth in advance rather than just hoping for the best, may be the foundation of tomorrow's multimedia Internet. With the right underlying technologies, tomorrow's Internet will handle voice and video services with greater ease than it handles email and Web pages today. Some of the next generation of Internet success stories will once again come from the networking laboratories of university-based researchers. Who is behind this: The driving force behind the lawsuit is Attorney William Bode in Washington (202-862-4300) on behalf of a client called the American Internet Registrants Association. If Lott is successful the ratification will be repealed and the lawsuit will be settled in favor of the plaintiffs. Although it is not yet possible to link Bode to Senator Lott's actions, a search of the Federal Election Commission's campaign contributors on the Center for Responsive Politics site (www.crp.org) reveals Bode as an active financial supporter of the Republican National Committee, former Senator Bob Dole, and Senator Mitch McConnell (R-KY), who is chair of the Republican Senatorial Campaign Committee. What CyberCitizens can do: The most important members of the Senate to contact are Lott, Senator William Roth (R-DE, chair of the Finance Committee) and Senator John McCain (R-AZ) chair of the Senate Commerce Committee and the bill's Republican floor manager). It is also useful to contact the Democratic floor manager, Senator Byron Dorgan (D-ND). A staffer in the office of Senator Ron Wyden (D-OR), who has sponsored the Internet Tax Freedom Act, says Wyden will not make any effort to get the objectionable amendment removed, saying "we do not have a dog in that fight." Others worth contacting are Finance Committee members Senator Al D'Amato and Senator Daniel Patrick Moynihan from New York, the state with the highest number of 4 year, Ph.D.-granting institutions and the highest number of students at 4 year schools, who would benefit from the NSF funding. Their e-mail addresses: Senator Trent Lott (R-MS) senatorlott at lott.senate.gov or fax 202-224-2262 Senator William Roth (R-DE) comments at roth.senate.gov Senator John McCain (R-AZ) senator_mccain at mccain.senate.gov Senator Byron Dorgan (D-ND) senator at dorgan.senate.gov Senator Alphonse D'Amato (R-NY) senator_al at damato.senate.gov Senator Daniel Patrick Moynihan (D-NY) senator at dpm.senate.gov Senator Ron Wyden (D-OR) senator at wyden.senate.gov In addition, universities, Internet industry associations and companies should consider supporting Network Solutions in its legal battle over the lawfulness of the Internet Intellectual Infrastructure fund. If any group or individual is interested in filing an amicus brief in support of the lawfulness of the registration fee, they should contact Mark Davies at mdavies at mayerbrown.com for more details. For more on the Internet domain name controversy see the Domain Name Handbook at www.domainhandbook.com Others who could be interviewed include: Joel Widder, Deputy Director of the NSF's Office of Legislative and Public Affairs at 703-306-1070 or jwidder at nsf.gov Tony Rutkowski, formerly Executive Director of the Internet Society and now head of the independent Center for the Next Generation Internet (www.ngi.org) at 703-437-9236 or amr at ngi.org Howard Sartori (202-917-2935), president of the American Internet Registrant's Association (www.aira.org or 202-862-4363) Gabe Battista 703-742-4842) president of Network Solutions, Inc. (www.netsol.com or 703-742-0400) **version 1.2 **end new address: 5 Brattle Road Syracuse, NY 13203-2803 315-473-8996 From strawman at ehmail.com Tue Sep 22 07:34:53 1998 From: strawman at ehmail.com (strawman at ehmail.com) Date: Tue, 22 Sep 1998 22:34:53 +0800 Subject: Does God know Peano Algebra? Message-ID: <199809230329.XAA11796@web05.iname.net> or does she not care if strong atheists couldnt reason their way out of a trap made of Boolean presumptions? a little bit of knowledge is a dangerous thing, but zero knowlege is absolutely subversive... --------------------------------------------------- -------------------------------------------------------------------- Get free personalized email from Canada.com at http://www.ehmail.com From vznuri at netcom.com Tue Sep 22 07:39:52 1998 From: vznuri at netcom.com (Vladimir Z. Nuri) Date: Tue, 22 Sep 1998 22:39:52 +0800 Subject: IP: US Easing Bank Rules on Big Cash Transactions Message-ID: <199809230341.UAA07098@netcom13.netcom.com> From: believer at telepath.com Subject: IP: US Easing Bank Rules on Big Cash Transactions Date: Mon, 05 May 1997 15:44:45 -0500 To: believer at telepath.com Source: New York Times http://www.nytimes.com/yr/mo/day/news/financial/cash-transactions-reuters.html September 22, 1998 U.S. Is Easing Bank Rules on Big Cash Transactions By REUTERS WASHINGTON -- The Treasury Department announced Monday that it was trimming its requirements for reporting large cash transactions. The measures had been introduced to try to curb money laundering. Banks had criticized the requirements, the Treasury said, "because they mandated repetitive paperwork" for routine transactions. The changes will lighten the banks' paperwork load but will make bankers responsible for acting as monitors and reporting anything to the authorities that they think is out of the ordinary and that might indicate criminal activity. The new rules will permit banks to conduct most transactions with "cash intensive businesses" without having to report to the Government under the 1970 Bank Secrecy Act. But banks will still have to file reports on transactions of $10,000 or more with individuals and with certain types of businesses. "This rule does not exempt banks from reporting suspicious activity involving those exempted activities," the Treasury said. "In addition, certain categories of businesses, such as real estate brokers, automobile dealers and money transmitters, may not be exempted." The reporting requirements were originally established to help law enforcement officials combat money-laundering by drug dealers and other criminals who pass large amounts through businesses and banks to give an appearance of legality. The new rules, published today in The Federal Register, will permit a bank to exempt a domestic business that routinely needs large amounts of cash simply by filing a form stating that the business is exempt. The business must have been a customer of the bank for at least a year. Banks, savings institutions and credit unions can begin using the new rules on Oct. 21. The Treasury said businesses exempted from reporting rules by a bank must have their exemptions reviewed every two years. But it said it was dropping a requirement that banks include details about all of a customer's transactions on the renewal form. In 1997, the Treasury said, more than 12 million currency transaction reports were filed. It said that as a result of the latest rules changes, as well as an earlier streamlining of reporting requirements for transactions between banks, financial institutions should be able to reduce such filings by about 30 percent. Copyright 1998 The New York Times Company ----------------------- NOTE: In accordance with Title 17 U.S.C. section 107, this material is distributed without profit or payment to those who have expressed a prior interest in receiving this information for non-profit research and educational purposes only. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml ----------------------- ********************************************** To subscribe or unsubscribe, email: majordomo at majordomo.pobox.com with the message: (un)subscribe ignition-point email at address ********************************************** www.telepath.com/believer ********************************************** From vznuri at netcom.com Tue Sep 22 07:40:55 1998 From: vznuri at netcom.com (Vladimir Z. Nuri) Date: Tue, 22 Sep 1998 22:40:55 +0800 Subject: Key Goal for UN: Accelerating Fight Against Terrorism Message-ID: <199809230341.UAA07112@netcom13.netcom.com> From: believer at telepath.com Subject: Key Goal for UN: Accelerating Fight Against Terrorism Date: Mon, 21 Sep 1998 15:48:01 -0500 To: believer at telepath.com Source: USIA http://www.usia.gov/current/news/latest/98092101.plt.html?/products/washfile /newsitem.shtml 21 September 1998 KEY U.S. GOAL FOR UNGA: ACCELERATING FIGHT AGAINST TERRORISM (Ambassador Burleigh cites U.S. priorities for 53rd UNGA) (1110) By Judy Aita USIA United Nations Correspondent United Nations -- Emphasizing the Clinton administration's "full measure of support" for the United Nations, the chief U.S. delegate to the 53rd General Assembly said that U.S. priorities include furthering international cooperation against weapons proliferation, terrorism, and international crime. Ambassador A. Peter Burleigh, head of the U.S. Mission to the United Nations, said, "We face in the 53rd session of the General Assembly a crucial agenda of work, in a year of crucial significance for the United States and its relationship with the world body, and at a time when it is more imperative than ever for nations of the world to face united the threats to our common economic, political, social, and environmental security." "The UN provides political and economic options benefiting Americans in the form of a safer, more prosperous world, and at a savings through collective cost-sharing rather than unilateral burdensharing," he said at a press conference September 18. "We are convinced that by remaining engaged in the UN we promote vital American leadership, and reflect the depth of quiet support felt for the UN among the American people," Burleigh said. The General Assembly began September 9 overshadowed by crisis situations around world: the nuclear tests conducted by India and Pakistan in May, terrorist bombings at U.S. embassies in Kenya and Tanzania, growing tension between Iran and Afghanistan, Iraq's refusal to cooperate with UN weapons inspectors, and continued fighting in the Democratic Republic of the Congo. Citing the terrorist bombings in Nairobi and Tanzania and U.S. efforts to bring to trial two Libyan suspects in the Pan Am bombing almost 10 years ago, Burleigh said "the U.S. and UN are engaged in a struggle against international terrorism. Our weapon of choice is international cooperation." "Our policy is this: No deals with terrorists, bring terrorists to justice, and pressure states that sponsor and harbor them," he said. Burleigh noted that the United States remains committed to UN reform, which has been a major U.S. concern for several years. "Progress is occurring," the ambassador said. "The UN has cut its budget and staff, established an inspector general's office, and strengthened both peacekeeping and administrative operations. The secretary general's reform initiatives, endorsed by the General Assembly, are in large part the same as our own goals and will substantially improve the efficiency and effectiveness of the UN system." Ironically, during the 53rd UNGA session, the United States could lose its voting rights unless the U.S. Congress appropriates the funds requested by the Clinton administration for UN dues. According to Article 19 of the UN Charter, any UN member that owes two years' annual dues loses its voting rights in the assembly. As of August 31, 1998, the United States owed the United Nations more than $1,600 million. Of that, $572 million is for the regular budget; $1,041 million for peacekeeping; and $2.8 million for the international tribunals. In January the U.S. 1999 assessment of $297.7 million will be due. "Article 19 does not affect our participation in the Security Council or other UN bodies and it does not alter our joint agenda for the coming UNGA session," the ambassador said. The US delegation will pursue a "vigorous, active agenda," he stressed. "We were disappointed this year that the legislation passed by Congress to enable the U.S. to pay its UN arrears included provisions on international family planning that were totally unacceptable to the (Clinton) administration," Burleigh said. "The president has repeatedly voiced his determination that the U.S. must start repaying its UN arrears," the ambassador said. "I don't think Congress wants to see a situation where the U.S. loses its vote," he added. "We hope before adjourning in October Congress will appropriate the funds. The president and secretary of state are actively lobbying to make that happen." President Clinton will be one of more than 30 heads of state or government who will be addressing the assembly during its traditional two-week general debate, which begins on September 21. Burleigh pointed to the president's recent speech on global economic challenges to the Council on Foreign Relations as significant for U.S.-UN work as well. Clinton said that "at this moment of financial turmoil, we are called upon once again to lead -- to organize the forces of a committed world to channel unruly energy into positive channels that advance our interest, reinforce our values, and enhance our security...Now it is time for us to rise to our responsibility, as America has so many times before, so that we can redeem the promise of the global economy, and strengthen our nation for the 21st Century," Burleigh recalled. "President Clinton's words call (upon) us too, at the start of the UNGA, to redeem the full promise and potential of the United Nations for the world," the ambassador said. The assembly will deal with a wide variety of issues on its 165-item agenda -- including human rights, arms control and disarmament, the environment, refugees, drug trafficking, and population. U.S. goals for the UNGA include: -- recommitting the international community to human rights during the celebration of the 50th anniversary of the Universal Declaration of Human Rights; -- convincing India and Pakistan to adhere to the Comprehensive Test Ban Treaty and discouraging other potential nuclear weapons states from conducting nuclear tests; -- supporting the work of the Middle East peace negotiators to renew momentum in the process and avoiding condemnatory resolutions of past assemblies; -- keeping the 1998 budget within the approved $2,533 million and continuing more reforms; and -- encouraging countries to meet reporting obligations under the UN Register of Conventional Arms and the Wassenar Arrangement on conventional and dual-use technology exports. The Security Council also will take advantage of the large number of top officials attending the debate to hold a ministerial-level meeting on Africa September 24. This will continue its major initiative of last year to focus attention on the African continent. This year the council members, including Secretary of State Madeleine Albright, will review Secretary General Kofi Annan's report on Africa entitled "The Causes of Conflict and the Promotion of Durable Peace and Sustainable Development in Africa" released in April. In that report Annan stressed that the time is long past when the responsibility for producing change in Africa can be shifted onto others' shoulders. Both African nations and the international community must "summon the political will" to end wars on the continent, take good governance seriously, and invest in Africa's resources, he said. ----------------------- NOTE: In accordance with Title 17 U.S.C. section 107, this material is distributed without profit or payment to those who have expressed a prior interest in receiving this information for non-profit research and educational purposes only. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml ----------------------- ********************************************** To subscribe or unsubscribe, email: majordomo at majordomo.pobox.com with the message: (un)subscribe ignition-point email at address ********************************************** www.telepath.com/believer ********************************************** From dpj at world.std.com Tue Sep 22 07:50:41 1998 From: dpj at world.std.com (David Jablon) Date: Tue, 22 Sep 1998 22:50:41 +0800 Subject: ArcotSign (was Re: Does security depend on hardware?) In-Reply-To: Message-ID: <3.0.5.32.19980922235214.00804100@world.std.com> Bruce Schneier wrote: >> The advantages are that offline password guessing is impossible. At 03:24 PM 9/22/98 +0100, Ben Laurie wrote: > The 'I' word always makes me nervous - do you really mean that, or do > you just mean "very difficult"? Why be nervous? It's not that hard to prevent off-line guessing of the PIN, given access to just the client's stored data. Here "impossible" means "as hard as breaking your favorite PK method". Here are three ways of authenticating based on PIN + stored key where the stored client data alone doesn't permit offline PIN guessing. These methods are arguably better than using a simplistic PIN-encrypted private key, if you're concerned about the client spilling its data. (1) Send the PIN separately, encrypted by the server's public key. Don't encrypt the private key with the PIN. Make the server verify both PIN and private key to permit a transaction. (2) Use the PIN + stored data to derive the private key, in a way such that any PIN will also generate a valid private key. (3) Verify the PIN (or PIN-derived key) using password-authenticated key exchange. Each of these approaches has other benefits and limitations. >From the posted description, it sounds like Arcot is using (2), where the PIN-encrypted data contains no verifiable plaintext. ------------------------- David P. Jablon dpj at world.std.com From ravage at EINSTEIN.ssz.com Tue Sep 22 08:07:13 1998 From: ravage at EINSTEIN.ssz.com (Jim Choate) Date: Tue, 22 Sep 1998 23:07:13 +0800 Subject: Speaking of political consims - Land of the Free (fwd) [fun] Message-ID: <199809230435.XAA08530@einstein.ssz.com> Forwarded message: >From consim-l-return-15556-ravage=ssz.com at net.uni-c.dk Tue Sep 22 23:33:14 1998 Mailing-List: contact consim-l-help at net.uni-c.dk; run by ezmlm Reply-To: consim-l at net.uni-c.dk Delivered-To: mailing list consim-l at net.uni-c.dk Date: Wed, 23 Sep 1998 04:04:54 +0000 (GMT) From: Tracy Johnson To: consim-l at net.uni-c.dk Subject: Re: Speaking of political consims - Land of the Free In-Reply-To: <85037379.36082228 at aol.com> Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Actually Justin Thyme has been doing these games for years with our player teams at conventions, but without computers. On Tue, 22 Sep 1998 BillR54619 at aol.com wrote: > In a message dated 9/22/98 5:18:24 PM Eastern Daylight Time, > olboggy at hotmail.com writes: > > Hasbeen Interactive announces its new, Java-enabled, interactive WWW gaming > experience, BILLOMACY. "Billomacy" extends the concepts pioneered in the > classic TAHGC game, DIPLOMACY, placing you in a virtual social computing world > full of sovereign, petty, and touchy players. How many of them can YOU piss > off, and still stay in the game ? For the goal of BILLOMACY is not to win, but > to keep the game going for as long as you can. Chat and email functions allow > you to communicate with the other players almost instantaneously, to plot your > vast right wing conspiracies, or to indulge in hurling anathemas in the form > of press releases. The possibilities are endless !! Each game lasts as long as > you want to keep playing, from just one evening, or until kingdom come. > BILLOMACY supports an infinite number of strategies and playing styles, from > the passive-aggressive "Kaiser Wilhelm" mode to the sneaky, unprincipled, > "Guilliame Talleyrand" mode, not to mention the famous "Wild Bill" cowboy > mode, and of course, the ultimate in popularity, "Bill Clinton, Secret Agent > Man", which allows you to enter our special "adults only" area for phone sex > and other goodies. And for the spiritually inclined, we have included the high > toned "Billy Graham" sermonizing option, for a low extra price. BILLOMACY, the > favorite interactive game of (who else) Bill Gates, is an experience we think > you'll really like !! > > --- > > Bill R. Tracy Johnson tmj at primenet.com From nobody at replay.com Tue Sep 22 08:20:31 1998 From: nobody at replay.com (Anonymous) Date: Tue, 22 Sep 1998 23:20:31 +0800 Subject: No Subject Message-ID: <199809230415.GAA08933@replay.com> At 07:10 PM 9/21/98 -0500, Jim Choate wrote: >It is further clear the police don't carry them for their own protection >either. Wonder why they do carry them?... The fastest practical way to disable a metazoan is to puncture the circulatory system supplying their brain. Any questions? "Go for the head shot" -a former employee of the President From nobody at replay.com Tue Sep 22 08:20:35 1998 From: nobody at replay.com (Anonymous) Date: Tue, 22 Sep 1998 23:20:35 +0800 Subject: No Subject Message-ID: <199809230415.GAA08895@replay.com> To all: We don't care so much that WJC did it with Buddy, or whatever, so much that he lied under oath. It is only rarely we get the sons of bitches on tape, and then you'll have to pardon us for exploiting it. What the fuck, the TLAs leveraged their POTUS bugs for years... The only regret is that Frank Zappa was not alive to put it all to music. Oottoott Count of Monte Carlo From nobody at replay.com Tue Sep 22 08:23:18 1998 From: nobody at replay.com (Anonymous) Date: Tue, 22 Sep 1998 23:23:18 +0800 Subject: No Subject Message-ID: <199809230415.GAA08863@replay.com> At 09:00 PM 9/21/98 -0700, Kurt Buff wrote: >I (as a militant atheist) merely say that if you can define your God, I can >probably prove he doesn't exist. Unless, of course, your definition is so >broad as to have no meaning in the first place. As a thinker I find the term atheism dignifies the concept of theism, so I find it offensive. Theists are primitives and one needn't stoop. In my religion, saying unprovable things in public is a stonable offense. Joe Momma From ravage at EINSTEIN.ssz.com Tue Sep 22 08:30:29 1998 From: ravage at EINSTEIN.ssz.com (Jim Choate) Date: Tue, 22 Sep 1998 23:30:29 +0800 Subject: Forwarded mail... Message-ID: <199809230453.XAA08741@einstein.ssz.com> Forwarded message: > Date: Wed, 23 Sep 1998 06:15:33 +0200 > From: Anonymous > It is only rarely we get the sons of bitches on > tape, and then you'll have to pardon us for > exploiting it. Take what you can get and run like hell with it! > The only regret is that Frank Zappa was not alive > to put it all to music. I hadn't even thought of the potential for yellow snow rides... ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From bbt at mudspring.uplb.edu.ph Tue Sep 22 08:42:35 1998 From: bbt at mudspring.uplb.edu.ph (Bernardo B. Terrado) Date: Tue, 22 Sep 1998 23:42:35 +0800 Subject: what is... In-Reply-To: <199809220946.EAA09436@mixer.visi.com> Message-ID: What is password salting ? About the 64 bit key .... example I used the key uvietf31 does this mean it is converted to a 64 bit 0's or/and 1's? Thanks! ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ It's me Bernie. metaphone at altavista.net `````````````````````````````````````````````````````````````````````````````` From vznuri at netcom.com Tue Sep 22 09:11:47 1998 From: vznuri at netcom.com (Vladimir Z. Nuri) Date: Wed, 23 Sep 1998 00:11:47 +0800 Subject: new sci am articles on encryption Message-ID: <199809230513.WAA16966@netcom13.netcom.com> the new issue of scientific american features articles on encryption and hacking. one is by Phil Zimmermann, on public key cryptography. A policy article by Rivest (of RSA) argues against encryption restrictions in the US. a long article on internet hacking and breaking and entering describes the basic process that hackers use. Rivest uses the analogy of "gloves" for encryption, in the sense that we shouldn't outlaw gloves because the govt needs always to obtain fingerprints for identification. furthermore, "key escrow" is like gluing fingerprint copies to the bottoms of gloves, another waste of time. From mok-kong.shen at stud.uni-muenchen.de Tue Sep 22 10:23:05 1998 From: mok-kong.shen at stud.uni-muenchen.de (Mok-Kong Shen) Date: Wed, 23 Sep 1998 01:23:05 +0800 Subject: ArcotSign (was Re: Does security depend on hardware?) In-Reply-To: Message-ID: <3607DA11.6250C39A@stud.uni-muenchen.de> Bruce Schneier wrote: > > At 03:04 PM 9/22/98 +0100, Mok-Kong Shen wrote: > >Bruce Schneier wrote: > >> > >> >I suppose you misunderstood me. I mean the 'mathematical magic' > >> >cannot be made public. (Or is 'online protocol' = 'mathematical magic'?) > >> >If the 'magic' is public then the attacker with the pool of passwords > >> >could brute force offline. > >> > >> No. You misunderstood me. There is NOTHING secret except the key. > >> The online protocol, mathematical magic, source code, algorithm details, > >> and everything else can be made public. There are no secrets in the > >> system except for the keys. > > > >In that case please allow me to go back to a point raised by me > >previously. The user uses his 'remembered secret' (of fewer bits) > >through a public algorithm (including protocol) to retrieve from a > >pool the password (of more bits). If the attacker doesn't have the > >pool then everything looks fine. But if he manages to get the pool > >(a case someone mentioned in this thread) then he can obviously > >brute force offline, I believe, since he possesses now everything > >the legitimate user has, excepting the 'remembered secret'. Or is > >there anything wrong with my logic? > > Yes. There is something wrong with you logic. Please kindly explain. I like very much to learn from my errors. Thank you very much in advance. M. K. Shen From bill.stewart at pobox.com Tue Sep 22 10:23:44 1998 From: bill.stewart at pobox.com (Bill Stewart) Date: Wed, 23 Sep 1998 01:23:44 +0800 Subject: This is a listed crime? In-Reply-To: Message-ID: <3.0.5.32.19980922231717.0090ba10@idiom.com> At 02:39 PM 9/21/98 -0400, Duncan Frissell wrote: >False. You are never required to talk to a peace officer, Fed, or >investigator unless you want to. They can arrest you of course (with >probable cause ha ha). Even then, you still don't have to talk to them. >In criminal cases you *never* have to talk to anyone. The Supremes have, unfortunately, decided that police can hold you for up to 48 hours without getting around to charging you, and if there's a weekend around they can often stretch that. Some cops find that an interesting answer to the question "You've read me my Miranda rights and now you're insisting that I tell you what you want before I can speak to my lawyer who's in the next room?" "Yup, you can be as silent as you want in the county jail, and [since we're charging you with a bogus municipal charge anyway], we can charge you with a [bogus] misdemeanor instead.", which had a certain craftiness I hadn't really expected out of them :-) Thanks! Bill Bill Stewart, bill.stewart at pobox.com PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639 From bill.stewart at pobox.com Tue Sep 22 10:31:26 1998 From: bill.stewart at pobox.com (Bill Stewart) Date: Wed, 23 Sep 1998 01:31:26 +0800 Subject: Stego-empty hard drives... In-Reply-To: Message-ID: <3.0.5.32.19980922232331.0090ed40@idiom.com> At 12:06 PM 9/21/98 -0700, Michael Motyka wrote: >Robert Hettinga wrote: >> Stegoing an encrypted partition as "blank" hard drive space without >> actually writing over it unless you wanted to? >> >A freshly formatted partition has a fill value. Noise would indicate >that is is not fresh. This would not be proof that it contained >encrypted data but it would indicate some sort of use. Microsoft Mail and some of its broken successors keep your mail in one big hulking file using "compressible encryption", which may not be good enough to keep the NSA out, but is good enough crypto to keep you from fixing it when it gets corrupted. It's really a shame how often MSMail files get corrupted, and how quickly the things can grow to 100-200MB if people from Marketing keep sending you mail with attached Powerpoint files. Does anybody know a compressed disk driver that lets you start at an arbitrary offset in a file so the headers look fine? Thanks! Bill Bill Stewart, bill.stewart at pobox.com PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639 From bill.stewart at pobox.com Tue Sep 22 10:33:45 1998 From: bill.stewart at pobox.com (Bill Stewart) Date: Wed, 23 Sep 1998 01:33:45 +0800 Subject: This is a listed crime? In-Reply-To: <199809211700.MAA17197@einstein.ssz.com> Message-ID: <3.0.5.32.19980922231122.00907100@idiom.com> At 05:50 PM 9/21/98 +0000, attila wrote: > "I dont know nuthin' 'bout it" Double negatives are your friend :-) > agreed, in theory. but how do you protect yourself when two or more > take the stand and swear under oath that you said: "......" or, even: Yeah. The times I've known the facts in cop-vs-citizen cases, the cops have often been lying; I have to assume that they're often lying in cases when I don't know the facts as well. Of course, getting somebody with that kind of attitude about cops onto a jury is somewhat unlikely, but occasionally you'll find neutrals. Thanks! Bill Bill Stewart, bill.stewart at pobox.com PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639 From kriston at ibm.net Tue Sep 22 10:37:38 1998 From: kriston at ibm.net (Kriston J. Rehberg) Date: Wed, 23 Sep 1998 01:37:38 +0800 Subject: ArcotSign (was Re: Does security depend on hardware?) In-Reply-To: Message-ID: <36089776.5641344B@ibm.net> Would it be terribly difficult to remove the "coderpunks" list from the "To:" list on this thread? Thanks, Kris -- Kriston J. Rehberg http://kriston.net/ AOL: Kriston endeavor to persevere ICQ: 3535970 From tcmay at got.net Tue Sep 22 11:04:55 1998 From: tcmay at got.net (Tim May) Date: Wed, 23 Sep 1998 02:04:55 +0800 Subject: Jury duty considered harmful, or at least rare In-Reply-To: Message-ID: At 11:11 PM -0700 9/22/98, Bill Stewart wrote: >Yeah. The times I've known the facts in cop-vs-citizen cases, >the cops have often been lying; I have to assume that they're often lying >in cases when I don't know the facts as well. Of course, getting >somebody with that kind of attitude about cops onto a jury >is somewhat unlikely, but occasionally you'll find neutrals. I last served on a jury in 1973, 25 years ago, no doubt before many readers of Cypherpunks were born. And I've only received a single _possible_ summons since, in the 25 years since that one jury appearance. Yet some of the apolitical numbskulls I know about have served on several juries in the same time. The Poisson, as expected, or something more human? Jury nullifying minds want to know. --Tim May (This space left blank pending determ. of acceptability to the gov't.) ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, ComSec 3DES: 831-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Licensed Ontologist | black markets, collapse of governments. From attila at hun.org Tue Sep 22 11:07:46 1998 From: attila at hun.org (attila) Date: Wed, 23 Sep 1998 02:07:46 +0800 Subject: This is a listed crime? In-Reply-To: <3.0.5.32.19980922231717.0090ba10@idiom.com> Message-ID: On Tue, 22 Sep 1998, Bill Stewart wrote: >At 02:39 PM 9/21/98 -0400, Duncan Frissell wrote: >>False. You are never required to talk to a peace officer, Fed, or >>investigator unless you want to. They can arrest you of course (with >>probable cause ha ha). Even then, you still don't have to talk to them. >>In criminal cases you *never* have to talk to anyone. > >The Supremes have, unfortunately, decided that police can hold you >for up to 48 hours without getting around to charging you, >and if there's a weekend around they can often stretch that. >Some cops find that an interesting answer to the question >"You've read me my Miranda rights and now you're insisting >that I tell you what you want before I can speak to my lawyer who's >in the next room?" "Yup, you can be as silent as you want in the >county jail, and [since we're charging you with a bogus municipal charge anyway], >we can charge you with a [bogus] misdemeanor instead.", >which had a certain craftiness I hadn't really expected out of them :-) > > > Thanks! > Bill Duncan is correct in that they can not make you talk; but as you point out, there is the 48 hour issue, and bogus charges which are throwaways, if need be. they are the keeper, you are the kept. that was part of the point I was making; but they can also charge you with obstruction of justice which is one of those were you are really left with the burden of proof, not them. it is a whole easier to defend a guilty party than it is to defend a party who been unjustly charged --as a form of coercion or politics. if their is no guilt, on what basis do you defend other than mistaken identity and the corrupt officers are firm in their ID --you? as a related issue, the public often rails against a judge who releases more than average for technical reasons; I dont agree: the judge is just more honest and expects "lawless" and LEOs to obey the rules. jury nullication is a serious risk. judges believe they have the right to define the rules under which you vote and are likely to order serious sanctions or even time for defying his house rules. I view it as a matter of Constitutional right and the choice of arriving at the gate with the truth in hand. I expect prosecutors are including questions on nullification more often. Aspen, or Denver has a case know where a judge is nailing a juror who did not volunteer the information she was an advocate of juror's right -she did what I would suggest: showed up non-descript, and sat there dumb and happy, and never objected to anything. it is highly questionable that she was silent with the intention of impeding justice. what most Americans are just beginning to grok is that LEOs and the Judges are part of an ongoing enterprise which in theory is designed to protect us from the forces of evil. however, it must be considered that the person on trial is facing a "me v.them" arrangement of convenience. attila out... From tcmay at got.net Tue Sep 22 11:11:14 1998 From: tcmay at got.net (Tim May) Date: Wed, 23 Sep 1998 02:11:14 +0800 Subject: ArcotSign (was Re: Does security depend on hardware?) In-Reply-To: Message-ID: At 11:38 PM -0700 9/22/98, Kriston J. Rehberg wrote: >Would it be terribly difficult to remove the "coderpunks" list from the >"To:" list on this thread? > >Thanks, Kris, Why are you spamming the Cypherpunks list with your drivel? --Tim May (This space left blank pending determ. of acceptability to the gov't.) ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, ComSec 3DES: 831-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Licensed Ontologist | black markets, collapse of governments. From harvest1 at altavista.net Tue Sep 22 11:54:40 1998 From: harvest1 at altavista.net (harvest1 at altavista.net) Date: Wed, 23 Sep 1998 02:54:40 +0800 Subject: churches Message-ID: Chruches, Pastors and Ministers: To those of you that are searching. I would like to invite you to view my web page. You just may find something in there that may help you in your search. www2.sosinet.net/~harvest1/communion.htm Since, this message is a one time post only. It is not necessary to respond. Prophet Leamon. From wwhyte at baltimore.ie Tue Sep 22 12:39:33 1998 From: wwhyte at baltimore.ie (William Whyte) Date: Wed, 23 Sep 1998 03:39:33 +0800 Subject: ArcotSign Message-ID: <01BDE6D6.415B1540.wwhyte@baltimore.ie> > For this to work, the public key has to be kept secret(!). >... > As Greg points out, much the same could be accomplished simply by having > the servers share secret 3DES keys with their users, each user having his > own private 3DES key. The users could encrypt messages using their 3DES > key and the server would decrypt using the appropriate key, which would > also serve to authenticate the user. The difference between this scheme and a shared-secret scheme (if I understand this scheme correctly) is that Arcot's infrastructure gives you non-repudiation -- the central server can't forge authenticated messages from you -- and so it's suitable for transactions of value in a way that a shared-secret scheme isn't. Cheers, William From ben at algroup.co.uk Tue Sep 22 12:59:58 1998 From: ben at algroup.co.uk (Ben Laurie) Date: Wed, 23 Sep 1998 03:59:58 +0800 Subject: ArcotSign (was Re: Does security depend on hardware?) In-Reply-To: Message-ID: <3608B833.DA9AC6FE@algroup.co.uk> David Jablon wrote: > > Bruce Schneier wrote: > >> The advantages are that offline password guessing is impossible. > > At 03:24 PM 9/22/98 +0100, Ben Laurie wrote: > > The 'I' word always makes me nervous - do you really mean that, or do > > you just mean "very difficult"? > > Why be nervous? It's not that hard to prevent off-line > guessing of the PIN, given access to just the client's stored > data. Here "impossible" means "as hard as breaking your > favorite PK method". Which is: a) not impossible b) not proven to be as difficult as we think it is (cf. quantum computers, novel factorisation methods). That's why. Cheers, Ben. -- Ben Laurie |Phone: +44 (181) 735 0686| Apache Group member Freelance Consultant |Fax: +44 (181) 735 0689|http://www.apache.org/ and Technical Director|Email: ben at algroup.co.uk | A.L. Digital Ltd, |Apache-SSL author http://www.apache-ssl.org/ London, England. |"Apache: TDG" http://www.ora.com/catalog/apache/ WE'RE RECRUITING! http://www.aldigital.co.uk/ From rah at shipwright.com Tue Sep 22 16:03:47 1998 From: rah at shipwright.com (Robert Hettinga) Date: Wed, 23 Sep 1998 07:03:47 +0800 Subject: IP: US Easing Bank Rules on Big Cash Transactions Message-ID: --- begin forwarded text Delivered-To: ignition-point at majordomo.pobox.com X-Sender: believer at telepath.com Date: Mon, 05 May 1997 15:44:45 -0500 To: believer at telepath.com From: believer at telepath.com Subject: IP: US Easing Bank Rules on Big Cash Transactions Mime-Version: 1.0 Sender: owner-ignition-point at majordomo.pobox.com Precedence: list Reply-To: believer at telepath.com Source: New York Times http://www.nytimes.com/yr/mo/day/news/financial/cash-transactions-reuters.html September 22, 1998 U.S. Is Easing Bank Rules on Big Cash Transactions By REUTERS WASHINGTON -- The Treasury Department announced Monday that it was trimming its requirements for reporting large cash transactions. The measures had been introduced to try to curb money laundering. Banks had criticized the requirements, the Treasury said, "because they mandated repetitive paperwork" for routine transactions. The changes will lighten the banks' paperwork load but will make bankers responsible for acting as monitors and reporting anything to the authorities that they think is out of the ordinary and that might indicate criminal activity. The new rules will permit banks to conduct most transactions with "cash intensive businesses" without having to report to the Government under the 1970 Bank Secrecy Act. But banks will still have to file reports on transactions of $10,000 or more with individuals and with certain types of businesses. "This rule does not exempt banks from reporting suspicious activity involving those exempted activities," the Treasury said. "In addition, certain categories of businesses, such as real estate brokers, automobile dealers and money transmitters, may not be exempted." The reporting requirements were originally established to help law enforcement officials combat money-laundering by drug dealers and other criminals who pass large amounts through businesses and banks to give an appearance of legality. The new rules, published today in The Federal Register, will permit a bank to exempt a domestic business that routinely needs large amounts of cash simply by filing a form stating that the business is exempt. The business must have been a customer of the bank for at least a year. Banks, savings institutions and credit unions can begin using the new rules on Oct. 21. The Treasury said businesses exempted from reporting rules by a bank must have their exemptions reviewed every two years. But it said it was dropping a requirement that banks include details about all of a customer's transactions on the renewal form. In 1997, the Treasury said, more than 12 million currency transaction reports were filed. It said that as a result of the latest rules changes, as well as an earlier streamlining of reporting requirements for transactions between banks, financial institutions should be able to reduce such filings by about 30 percent. Copyright 1998 The New York Times Company ----------------------- NOTE: In accordance with Title 17 U.S.C. section 107, this material is distributed without profit or payment to those who have expressed a prior interest in receiving this information for non-profit research and educational purposes only. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml ----------------------- ********************************************** To subscribe or unsubscribe, email: majordomo at majordomo.pobox.com with the message: (un)subscribe ignition-point email at address ********************************************** www.telepath.com/believer ********************************************** --- end forwarded text ----------------- Robert A. Hettinga Philodox Financial Technology Evangelism 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From schneier at counterpane.com Tue Sep 22 16:08:47 1998 From: schneier at counterpane.com (Bruce Schneier) Date: Wed, 23 Sep 1998 07:08:47 +0800 Subject: ArcotSign (was Re: Does security depend on hardware?) In-Reply-To: Message-ID: <4.0.2.19980923070056.0096b380@mail.visi.com> At 07:10 PM 9/22/98 +0100, Mok-Kong Shen wrote: >Bruce Schneier wrote: >> >> Yes. There is something wrong with your logic. > >Please kindly explain. I like very much to learn from my errors. >Thank you very much in advance. Sorry. I am under NDA. Hopefully Arcot will explain sooner rather than later. I suggest not using the product until you are satisfied. Bruce ********************************************************************** Bruce Schneier, President, Counterpane Systems Phone: 612-823-1098 101 E Minnehaha Parkway, Minneapolis, MN 55419 Fax: 612-823-1590 Free crypto newsletter. See: http://www.counterpane.com From aoe at oeh.univie.ac.at Tue Sep 22 16:40:44 1998 From: aoe at oeh.univie.ac.at (Alexander Oelzant) Date: Wed, 23 Sep 1998 07:40:44 +0800 Subject: Stego-empty hard drives... Message-ID: <199809231233.OAA21978@prawda.oeh.univie.ac.at> Bill Stewart wrote: > >Robert Hettinga wrote: > >> Stegoing an encrypted partition as "blank" hard drive space without > >> actually writing over it unless you wanted to? > >> > >A freshly formatted partition has a fill value. Noise would indicate > >that is is not fresh. This would not be proof that it contained > >encrypted data but it would indicate some sort of use. > > It's really a shame how often MSMail files get corrupted, > and how quickly the things can grow to 100-200MB if people from > Marketing keep sending you mail with attached Powerpoint files. > Does anybody know a compressed disk driver that lets you start > at an arbitrary offset in a file so the headers look fine? just installed the cryptfs patch for linux (from ftp://ftp.csua.berkeley.edu/ pub/cypherpunks/filesystems/linux/) which works nicely on 2.0.35 if you mangle along the .rej files. it can use any offset you want and also stego your fs if you like ... oh! wrong os for you? then again you could certainly astonish your average customs officer with it ... them probably not expecting your linux to use a ms file for storage :-) hth. alexander -- aoe at oeh.net From dformosa at zeta.org.au Tue Sep 22 17:03:56 1998 From: dformosa at zeta.org.au (David Formosa (? the Platypus)) Date: Wed, 23 Sep 1998 08:03:56 +0800 Subject: your mail In-Reply-To: <199809230415.GAA08863@replay.com> Message-ID: On Wed, 23 Sep 1998, Anonymous wrote: [...] > In my religion, saying unprovable things in public > is a stonable offense. I bet that makes peaple talking about program termination happy. From sunder at brainlink.com Tue Sep 22 17:26:44 1998 From: sunder at brainlink.com (Sunder) Date: Wed, 23 Sep 1998 08:26:44 +0800 Subject: Stego-empty hard drives... (fwd) In-Reply-To: <199809230223.VAA07985@einstein.ssz.com> Message-ID: <3608F63F.30A09543@brainlink.com> Jim Choate wrote: > If there was as much variety at the hardware level as you assume nobody > could afford to introduce new computers every few months. Whatever. > Realisticaly it isn't this complicated. All one needs to do is write a > program that allows the operator to talk directly to the hard drive > controller. At that point it's a trivial matter to go out and find those > hidden partitions. You could use normal drive recovery software if you had a > mind, and that only costs a few hundred to a few thousand dollars and can be > bought in the back of Computer Shopper. Yes, and depending on the threat model this was about 5-6 on the last I've last sent. To get around that, you either modify the hard drive's on board controller, or you build a CPU emulator. There is one that's freely available called Bochs which will do this. They can happily boot from their floppy and talk directly to your virtual "hardware" and you still get through. Yeah, I know, ol'e paranoid Jim will reply to this using the word "Tempest" signature, to which I reply, if you're that paranoid, tempest shield your notebook and put in several RF transmitters to spit back pre-recorded tempest noise to play in synch. Shit, and why not? If you're gonna get THAT paranoid, you might as well take all the precautions in the universe. Oh, it's too expensive? Well that's just waaay too fucking bad. Gee, but one would have to think, why would they go to that extent and expense to find hidden bits of data on your drives, and not do body cavity searches and MRI and XRay scans of your body? Hell, why don't they buy electron tunneling microscopes just incase you might have encoded your data on the surface of that perfectly innocent looking CD jewel case in which you're carrying your music? > Don't bother, I already know how to do that. > > This would stand out like a sore thumb. Shaaa, now that I've shown you how, of course you already know how to do that. Now that I've shown you the code and told you how it works, of course to you it would stand out like a sore thumb because you know what to look for. The question is will it stand out to the minimum wage customs drone? You seem to think these guys are actually super spies, not clueless overpaid (for their level of skills) bored burrowcrats working on an assembly line. You're over estimating their abilities by at least four orders of magnitude there. Gee, I bet you use RSA with 65536 bits too and superencrypt with 3DES, IDEA, and Blowfish and Misty. -- =====================================Kaos=Keraunos=Kybernetos============== .+.^.+.| Sunder |Prying open my 3rd eye. So good to see |./|\. ..\|/..|sunder at sundernet.com|you once again. I thought you were |/\|/\ <--*-->| ------------------ |hiding, and you thought that I had run |\/|\/ ../|\..| "A toast to Odin, |away chasing the tail of dogma. I opened|.\|/. .+.v.+.|God of screwdrivers"|my eye and there we were.... |..... ======================= http://www.sundernet.com ========================== From sunder at brainlink.com Tue Sep 22 17:29:22 1998 From: sunder at brainlink.com (Sunder) Date: Wed, 23 Sep 1998 08:29:22 +0800 Subject: From Spyking: DNA Technology Message-ID: <3608F717.C8CC381D@brainlink.com> **************************************************************** 5) From: "Timothy Robarts" Subject: DNA Technology London 16/09/98 September 16 1998 Police Superintendents' Conference: Stewart Tendler on how science is catching up with the criminal. DNA detectives will fit a face to a flake of skin A SINGLE flake of dandruff will soon be enough for scientists to build up a criminal's photofit, police commanders were told yesterday. Experts believe they will be able to create "genetic e-fits", using information gleaned from a DNA sample to build a picture of a suspect's race, build, eye and hair colour, and even behavioural characteristics. Within a year, forensic scientists will be able to take DNA samples from minute scraps of skin left at the scene of a burglary and from such surfaces as the steering wheel of a stolen car, the keyboard of a computer and the outside of a drink can. They will be able to identify DNA from the wrappings round illegal drugs that dealers and couriers had hidden in their bodies. The photofit will be available within a decade. It will include the height of the suspect and other details including the shape of the ears and chin and inherited physical defects. The DNA advances were forecast yesterday by Kevin Sullivan, DNA research and development manager for the Forensic Science Service, speaking to the annual conference of the Police Superintendents' Association in Bristol. He said that genetic profiling was the "Holy Grail" for scientists but would be achieved within ten years, aided by international work on gene identification. Dr Sullivan, who worked on the identification of the remains of the last Tsar, Nicholas II, said that the breakthrough in taking DNA samples from dandruff would allow investigators to take material from the tiny particles of human skin that are found at every scene. He said: "People are constantly shedding skin cells. The majority of household dust is made up of dead skin and we know we can get DNA from an individual skin cell." He said that an armed robber could be tracked down by DNA evidence taken within 12 months from flakes of dandruff left behind in a discarded balaclava. It is a person's DNA, contained in every cell in the body, which predicts an enormous range of characteristics including skin, hair and eye colour, bone structure and even propensity to some illnesses and personality traits. He told the conference that DNA testing had become "1,000 times more sensitive" in the past decade. Whereas ten years ago scientists needed a bloodstain the size of a 10p piece to conduct a test, they now required just a pin-prick invisible to the naked eye. DNA samples would soon be used to re-examine unsolved sex cases and could even be used in miscarriage-of-justice cases. Scientists were working on ways of extracting DNA from sperm samples taken many years ago and still being stored. New developments meant it was possible to identify bodies that had been hidden for some time. DNA can be taken from hair shafts in the skull, from bone and faeces and matched with the mothers of possible victims. Work was developing on portable DNA testing facilities which could be used at the scenes of crimes to speed up investigations. Dr Sullivan said mass screening in major inquiries had grown. Since the first screening in 1987, in a double murder case in Leicestershire, there had been 91 screening operations in Britain involving 26,000 samples. Offenders were identified in 30 cases and in one case a suspect walked into a police station and gave himself up when DNA screening was announced by police. Dr Sullivan said that in the next five years scientists would improve the collection of DNA samples from blood and saliva left on surfaces such as cigarettes. Further work on identifying DNA in animals would begin next year. He said this could be used to solve crimes against humans. Children who were assaulted sometimes left hairs from their pets on the clothing of their attackers, which could be used to identify suspects. Tim Robarts - t.robarts at btinternet.com - http://www.robarts.com **************************************************************** 6) From: Will Smith Subject: Anonymous Net? Hi there. Do you know of any stealth program's the will stop my movement being tracked on the net i.e.: where in surfing, what sites i'm going to, what OS i'm running ect, my e-mail address ect... like a real-time netshield or fire-wall? to keep the $pooks from trackin me online? The-MIB **************************************************************** From ravage at EINSTEIN.ssz.com Tue Sep 22 18:43:58 1998 From: ravage at EINSTEIN.ssz.com (Jim Choate) Date: Wed, 23 Sep 1998 09:43:58 +0800 Subject: Stego-empty hard drives... (fwd) Message-ID: <199809231511.KAA10445@einstein.ssz.com> Forwarded message: > Date: Wed, 23 Sep 1998 09:23:11 -0400 > From: Sunder > Subject: Re: Stego-empty hard drives... (fwd) > Yes, and depending on the threat model this was about 5-6 on the last I've last > sent. To get around that, you either modify the hard drive's on board > controller, or you build a CPU emulator. There is one that's freely available > called Bochs which will do this. They can happily boot from their floppy and > talk directly to your virtual "hardware" and you still get through. How do you propose to start this hardware emulator when it's boot file isn't on their boot floppy? And you think customs agents using software and TEMPEST signature scanning is out in the woods.... ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From apf2 at ctv.es Tue Sep 22 19:00:10 1998 From: apf2 at ctv.es (Albert P. Franco, II) Date: Wed, 23 Sep 1998 10:00:10 +0800 Subject: Stego-empty hard drives... (fwd) Message-ID: <3.0.3.32.19980924170248.006b469c@pop.ctv.es> > Don't most memory scans do a keyscan anyway? looking for an ESC to >bypass the scan? So have it also check for something else to bring up >your special routine. It should pass all but the most detailed signature >analysis. > Also most BIOS'es scan for the key (or other combinations) in order to jump to the BIOS config screens. From here you have two options: 1) add a second possible jump directly to hidden configuration for the HD, or 2) within the Bios configuration menu add a scanner for a key sequence to enable the blacked out HD sectors. I can't imagine that anyone that wasn't already sure that you were playing tricks with the HD would be able to detect either of these on a normal startup. Again I think the key is that it would vastly expensive and very time consuming for customs services to make more than a cursory check. More and more people are carrying notebooks with them on trips and just like most bag searching has ended due to very fast, but not perfect, technology, notebook scanning is limited by the very important public factor--the people waiting in line behind you will tend to get very anxious. :) If on the other hand you are a "real" suspect then you best bet is not to carry a PC into these countries. These techniques (all of the ones mentioned in this thread) may even have a decent life-span if the ones that want to get you are locals (ie. street cops), but as has been pointed out before they don't have to know what's on your HD to place you under psychiatric evaluation, etc. I think perhaps a tougher question is, "Is there a way, without resorting to bloodshed, to regain control of our private property and private lives?" That's not a troll! I know that there are a lot people on this list with their assault rifles at the ready, that are convinced that only armed resistance will work. But. I think that's the "easy" way out. (How) can it be done another way? Especially, given the fact that so much progress has already been made by the very Anti-American US Government and others. How do we get back our civil rights that have been so eroded over the past 40 years? Is it too late? Are people in general so comfortable that liberty isn't important anymore? Why is it that almost every state has a system for introducing legislation at the popular level (referendum) but we don't have that freedom at the fed level. I wonder what the feds would do if we the sheeple could put propositions on the federal budget. Imagine...Prop PGP: no export control on crypto or work performed by US citizens living abroad; Prop 666: strict public oversight on CIA/NSA/FBI wiretapping and surveillance activities; add your favorite proposition here... eor.. Al Franco, II I can't sign this with crypto because the bastards might use it to try to "prove" that I have illegally exported software (that can be freely obtained in places outside the US). From nobody at replay.com Tue Sep 22 19:10:00 1998 From: nobody at replay.com (Anonymous) Date: Wed, 23 Sep 1998 10:10:00 +0800 Subject: Message-ID: <199809231505.RAA24019@replay.com> Oh wow, thanks for the update on the Clinton situation. I'm grateful since I couldn't find that information anywhere else, unless of course I looked in the FIVE BILLION OTHER FORUMS BEATING THIS GODDAMNED SUBJECT INTO THE GROUND! Please do me a favor and FUCK OFF, or go stick your head up Clinton's ass and quit spamming the list with FUCKING GARBAGE! This shit is worse than the sixdegrees mail. At 06:15 AM 9/23/98 +0200, Anonymous wrote: >To all: >We don't care so much that WJC did it with Buddy, >or whatever, so much that he lied under oath. > >It is only rarely we get the sons of bitches on >tape, and then you'll have to pardon us for >exploiting it. > >What the fuck, the TLAs leveraged their POTUS bugs for >years... > >The only regret is that Frank Zappa was not alive >to put it all to music. > >Oottoott > > > >Count of Monte Carlo > > > > > > > > > > From ravage at EINSTEIN.ssz.com Tue Sep 22 19:10:10 1998 From: ravage at EINSTEIN.ssz.com (Jim Choate) Date: Wed, 23 Sep 1998 10:10:10 +0800 Subject: Stego-empty hard drives... (fwd) Message-ID: <199809231538.KAA10721@einstein.ssz.com> Forwarded message: > Date: Thu, 24 Sep 1998 17:02:48 +0200 > From: "Albert P. Franco, II" > Subject: Re: Stego-empty hard drives... (fwd) > I can't imagine that anyone that wasn't already sure that you were playing > tricks with the HD would be able to detect either of these on a normal > startup. Again I think the key is that it would vastly expensive and very > time consuming for customs services to make more than a cursory check. More > and more people are carrying notebooks with them on trips and just like > most bag searching has ended due to very fast, but not perfect, technology, > notebook scanning is limited by the very important public factor--the > people waiting in line behind you will tend to get very anxious. :) That's a rationale for doing TEMPEST scanning I hadn't thought of. Since it is time consuming and takes special training (which means higher personel budgets that don't amortise over time like hardware) to operate a floppy scanner and interpet the results there are budget forces involved. A box with a flat top and a funny looking cage on top that a agent could use thusly: "Sir would you please place your laptop on the tray and turn it on?..." It becomes possible to scan for sureptitous clock devices (their tick, tick, tick in the EM), mod'ed hardware, and software. Follow this with a gas spectrograph and a x-ray and you'd have the vast majority of bases covered. Since most countries require production equivalent models to undergo testing (eg FCC EM emissions) it wouldn't be that much of a budget increase on that end either. ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From ravage at EINSTEIN.ssz.com Tue Sep 22 19:12:45 1998 From: ravage at EINSTEIN.ssz.com (Jim Choate) Date: Wed, 23 Sep 1998 10:12:45 +0800 Subject: Why lying under oath is bad and worth impeachment [fwd] Message-ID: <199809231540.KAA10787@einstein.ssz.com> Forwarded message: > Here's a timely jewel. James Traficant's (D-Ohio) one-minute speech > before House on September 15th. > > James Traficant (D-Ohio) Home Page > http://www.house.gov/traficant/ > > E-mail: telljim at mail.house.gov (Rep. Jim Traficant D-OH) > > > AN AMERICA WITH TWO LEGAL STANDARDS IS AN AMERICA WITH NO LEGAL > STANDARDS > September 15, 1998 > > Mr. Speaker, if Joe Q. Citizen lied in a civil trial, he would be sued > for every penny. If Joe Q. Citizen lied to a Grand Jury, he would go to > jail. Lying is perjury. Perjury is a crime. > > Now, having said that, what is going on here, Mr. Speaker? Does America > now have two legal standards, one for you, one for me; one for he, one > for she; one for generals, one for soldiers; one for Presidents, one for > residents? > > Let us tell it like it is. Joe Q. Citizen cannot apologize, Joe Q. > Citizen is not censured, Joe Q. Citizen is prosecuted. And let me warn > Congress: An America with two legal standards is an America with no > legal standards. > > Mr. Speaker, I yield back the balance of the lives of all of the > soldiers that gave their lives fighting to preserve our freedom. ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From ravage at EINSTEIN.ssz.com Tue Sep 22 19:14:22 1998 From: ravage at EINSTEIN.ssz.com (Jim Choate) Date: Wed, 23 Sep 1998 10:14:22 +0800 Subject: Other ways to mod the BIOS... Message-ID: <199809231543.KAA10866@einstein.ssz.com> There is also the potential to mod the BIOS in a hot environment. Shadow the BIOS to RAM, use a program on your hard-drive that mod's that image and does a soft-reboot so the BIOS image is unaffected (since we're mod'ing the BIOS image why do it half-assed) and suddenly your 'hidden' whatever is sitting there. You could do it while the system is online even if you're careful not to mod anything but the BIOS image. ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From declan at well.com Tue Sep 22 19:22:00 1998 From: declan at well.com (Declan McCullagh) Date: Wed, 23 Sep 1998 10:22:00 +0800 Subject: Senate panel considers Internet regulations (fwd) Message-ID: ---------- Forwarded message ---------- Date: Wed, 23 Sep 1998 08:21:29 -0700 (PDT) From: Declan McCullagh To: politech at vorlon.mit.edu Subject: Senate panel considers Internet regulations http://cgi.pathfinder.com/netly/0,2326,201980923-14632,00.html TIME Digital's Netly News September 23, 1998 Senate Panel Mulls Web Regulations By Declan McCullagh Thought a GOP-led Congress was going to hold off on regulating the Internet? Guess again. A Senate panel is meeting this morning to hear arguments about a proposal to regulate exactly what information commercial web sites may collect from visitors. [...remainder snipped...] From CTIA_Daily_News at um2.unitymail.com Wed Sep 23 10:44:58 1998 From: CTIA_Daily_News at um2.unitymail.com (CTIA Daily News) Date: Wed, 23 Sep 1998 10:44:58 -0700 (PDT) Subject: CTIA Daily News from WOW-COM - September 23, 1998 Message-ID: <199809231737.MAA03879@mailstrom.revnet.com> ========================================== Welcome to today's edition of the CTIA Daily News from WOW-COM.� Please click on the icon / attachment for the most important news in wireless communications today. The Newest Most Comprehensive Tradeshow of Wireless Computing and Communications is Less Than a Month Away. Register TODAY! http://www.wirelessit.com/register.htm� Team WOW-COM wowcom at ctia.org =========================================== -------------- next part -------------- A non-text attachment was scrubbed... Name: bin00023.bin Type: application/octet-stream Size: 9838 bytes Desc: "_CTIA_Daily_News_19980923.htm" URL: From petro at playboy.com Tue Sep 22 19:48:12 1998 From: petro at playboy.com (Petro) Date: Wed, 23 Sep 1998 10:48:12 +0800 Subject: Stego-empty hard drives... (fwd) In-Reply-To: <3.0.3.32.19980924170248.006b469c@pop.ctv.es> Message-ID: At 10:02 AM -0500 9/24/98, Albert P. Franco, II wrote: >I think perhaps a tougher question is, "Is there a way, without resorting >to bloodshed, to regain control of our private property and private lives?" >That's not a troll! I know that there are a lot people on this list with >their assault rifles at the ready, that are convinced that only armed >resistance will work. But. I think that's the "easy" way out. (How) can it >be done another way? Especially, given the fact that so much progress has >already been made by the very Anti-American US Government and others. There is no way to make an omlete without opening the Eggshell. There might be less violent methods than cracking it with a 5 pound hammer, but the shell has to get cracked. >How do we get back our civil rights that have been so eroded over the past >40 years? Is it too late? Are people in general so comfortable that liberty >isn't important anymore? Pretty much. -- petro at playboy.com----for work related issues. I don't speak for Playboy. petro at bounty.org-----for everthing else. They wouldn't like that. They REALLY Economic speech IS political speech. wouldn't like that. From sunder at brainlink.com Tue Sep 22 19:51:52 1998 From: sunder at brainlink.com (Sunder) Date: Wed, 23 Sep 1998 10:51:52 +0800 Subject: Stego-empty hard drives... (fwd) In-Reply-To: <199809231511.KAA10445@einstein.ssz.com> Message-ID: <360918AC.AFB13B40@brainlink.com> Jim Choate wrote: > > controller, or you build a CPU emulator. There is one that's > > freely available > > called Bochs which will do this. They can happily boot from their floppy > > and talk directly to your virtual "hardware" and you still get through. > > How do you propose to start this hardware emulator when it's boot file isn't > on their boot floppy? Simple. You set the bios to boot off the hard drive. You could even set your notebook to sleep, then when they ask you to turn it on, you wake it and have your emulator boot from the floppy. This is especially effective if you scratch up the case of your notebook and make it look older by modifying it's case to look like it's a 486 or 386 to account for the difference in speed. Shit, if you had the source to something like SoftPC or Virtual PC, you could modify it to work on a Mac notebook (of course the nice Apple Logo would give you away, but I'm sure you can figure out how to modify the case and the apple keys.) > And you think customs agents using software and TEMPEST signature scanning > is out in the woods.... I'll worry about them using TEMPEST scanners when I hear reports that say they're using it. Until such time, you're being overly paranoid. Until they start, this point is moot. In any case the answer to that silly idea is tempest shield your box, but include RF transmitters in various places outside the shielding to emit the frequencies that a normal unaltered notebook would transmit. -- =====================================Kaos=Keraunos=Kybernetos============== .+.^.+.| Sunder |Prying open my 3rd eye. So good to see |./|\. ..\|/..|sunder at sundernet.com|you once again. I thought you were |/\|/\ <--*-->| ------------------ |hiding, and you thought that I had run |\/|\/ ../|\..| "A toast to Odin, |away chasing the tail of dogma. I opened|.\|/. .+.v.+.|God of screwdrivers"|my eye and there we were.... |..... ======================= http://www.sundernet.com ========================== From stuffed at stuffed.net Wed Sep 23 11:01:46 1998 From: stuffed at stuffed.net (STUFFED NEWS DAILY) Date: Wed, 23 Sep 1998 11:01:46 -0700 (PDT) Subject: TODAY'S NEWS AND PICS PACKED STUFFED! - READ IT NOW! Message-ID: <19980923071001.10591.qmail@eureka.abc-web.com> + GRAND JURY TESTIMONY + YOUR OWN PRIVATE PORN STAR + MISTRESS OF MEASURMENT + INTERVIEW FOR INTERCOURSE + SEXUAL HEALING- THE UPS AND DOWNS + LEAH REMINI GETS TOUCHED + SEX ON THE BUS + THE BEST OF EUREKA ----> http://stuffed.net/98/9/23/ <---- Welcome to today's issue of Stuffed. To read it you should click on the URL above. If it is not made clickable by your email program you will need to use your mouse to highlight the URL, copy it and then paste it into your browser (then press Return). This email is never sent unsolicited. Stuffed is the supplement for the Eureka newsletter you subscribed to. Full instructions on unsubscribing are in every issue of Eureka! ----> http://stuffed.net/98/9/23/ <---- From bram at gawth.com Tue Sep 22 22:10:16 1998 From: bram at gawth.com (bram) Date: Wed, 23 Sep 1998 13:10:16 +0800 Subject: ArcotSign (was Re: Does security depend on hardware?) In-Reply-To: <4.0.2.19980923070056.0096b380@mail.visi.com> Message-ID: On Wed, 23 Sep 1998, Bruce Schneier wrote: > Sorry. I am under NDA. Hopefully Arcot will explain sooner rather than > later. I suggest not using the product until you are satisfied. I'd say the following has been well established by now - - The people at ArcotSign are not completely clueless - They're doing things in a possibly sub-optimal way as far as publically explaining their algorithms, but this is a decision on their part, it's not that they don't have reasonable algorithms to back things up - They're not releasing due to being afraid of people copying their product before they've gotten sufficiently far in development/achieved some market penetration. Those of you who don't work at startups might not be familiar with this sort of thinking, but it's completely reasonable - if you go around telling everybody all the little details of how to make things work, some large company might make a very quick bastardized version and throw lots of marketing oomph behind it. - Their marketing materials are a bit misleading. This they can reasonably be faulted for. In short, at worst it's a poor product, but not 'snake-oil'. I have no idea whether it's a *good* product, since I've never looked at it, but for all I know it might be the greatest thing since sliced bread. I think that pretty much sums up everything there is to currently say on the subject, until ArcotSign releases more details. -Bram (Who isn't talking about what he's working on until the official release of a reasonably well fleshed-out product comes out.) From nobody at replay.com Tue Sep 22 23:19:53 1998 From: nobody at replay.com (Anonymous) Date: Wed, 23 Sep 1998 14:19:53 +0800 Subject: Cypherpunks defeat? Message-ID: <199809231921.VAA12284@replay.com> At 10:02 AM -0500 9/24/98, Albert P. Franco, II wrote: >I think perhaps a tougher question is, "Is there a way, without resorting >to bloodshed, to regain control of our private property and private lives?" >That's not a troll! I know that there are a lot people on this list with >their assault rifles at the ready, that are convinced that only armed >resistance will work. But. I think that's the "easy" way out. (How) can it >be done another way? It's ironic that you would have to ask that question here. The cypherpunks group was founded on this very premise: that through the use of cryptography, people would become able to engage in a wide range of voluntary transactions, outside of the reach of meddling interlopers. Most cypherpunks have become disillusioned about their dreams, and you will seldom hear them defend the notion that cryptography offers any kind of alternative to a society based on coercion. The past few years have been hard ones. The failure of digital cash, the gradual trend towards a debate over when and how (rather than whether) to regulate domestic cryptography, widespread abuse of anonymity, all these make the original cypherpunk goals seem even more distant today than in the past. Is the cypherpunks dream dead? Is the movement over? Maybe it is time to give up. Throw in the towel, admit that we lost. Sure, there are still battles to be fought, rear-ground actions where we can perhaps delay the inevitable outcome. But the vision has been lost, and all that is left is the post-mortem analysis of the failed dream. From tcmay at got.net Tue Sep 22 23:21:18 1998 From: tcmay at got.net (Tim May) Date: Wed, 23 Sep 1998 14:21:18 +0800 Subject: This is a listed crime? In-Reply-To: <3.0.5.32.19980922231717.0090ba10@idiom.com> Message-ID: At 12:04 AM -0700 9/23/98, attila wrote: > Duncan is correct in that they can not make you talk; but as > you point out, there is the 48 hour issue, and bogus charges > which are throwaways, if need be. they are the keeper, you are > the kept. > > that was part of the point I was making; but they can also charge > you with obstruction of justice which is one of those were you > are really left with the burden of proof, not them. it is a whole > easier to defend a guilty party than it is to defend a party who > been unjustly charged --as a form of coercion or politics. if their > is no guilt, on what basis do you defend other than mistaken > identity and the corrupt officers are firm in their ID --you? I believe this misstates the actual role of "obstruction of justice." So far as I know, and I admit that I am not a lawyer and am not current on case law, one cannot be charged with "obstruction of justice" for remaining silent. O.J. Simpson, for example, was not charged thusly for not talking (he of course stopped talking a few days after the murders, gave no further interviews with the police and DA, and of course never testified in court). Even Slick Willy is only being charged (by Starr) with obstruction of justice for using his office to send out his underlings to propagate his lies, and various things related to using his office to impede Starr's investigation. Merely asserting Fifth Amendment protections and Miranda rights should not, except in Wonderland, trigger "obstruction of justice" charges. Though we're almost in Wonderland, we're not quite there yet. > jury nullication is a serious risk. judges believe they have the > right to define the rules under which you vote and are likely to > order serious sanctions or even time for defying his house rules. > I view it as a matter of Constitutional right and the choice of > arriving at the gate with the truth in hand. I expect prosecutors > are including questions on nullification more often. Aspen, or > Denver has a case know where a judge is nailing a juror who did not > volunteer the information she was an advocate of juror's right > -she did what I would suggest: showed up non-descript, and sat > there dumb and happy, and never objected to anything. it is > highly questionable that she was silent with the intention of > impeding justice. I'll be interested to hear the outcome of this case. I haven't been called as a juror since 25 years ago, but I certainly don't plan to "volunteer" any information not requested of me. (And I may decide not to even answer some questions they _do_ ask me. How we have come to a situation where a court and jury consultants may ask highly personal questions of prospective jurors is a sign of the train wreck that America has become.) --Tim May (This space left blank pending determ. of acceptability to the gov't.) ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, ComSec 3DES: 831-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Licensed Ontologist | black markets, collapse of governments. From billp at nmol.com Tue Sep 22 23:46:40 1998 From: billp at nmol.com (bill payne) Date: Wed, 23 Sep 1998 14:46:40 +0800 Subject: George Santyana & crypto Message-ID: <36094F13.EF0@nmol.com> I am reading http://www.jya.com/sig-attack.htm --- Then, in late 1942, the Royal Navy switched codes to the one-time pad system. The Nazi tap was lost forever because the pad system is unbreakable in both theory as well as practice. U-boats could no longer ambush helpless ships like wolves on sheep. Convoy after convoy arrived safe and intact, protected in the armor of an unbreakable code system. The U-boats had to change tactics. http://www.us.net/softwar/ Germany used the enigma algorithm and machine. Japan used the purple algorithm. And look what happened to them. About crypto algorithms. "Those who cannot remember the past are doomed to repeat it." -- George Santyana, 1905 Title: Black and White Test of Cryptographic Algorithms Jump to Forum Click Image to Jump to Next Article Go to Text Only Print Version Black and White Test of Cryptographic Algorithms by William H. Payne This article requires special formatting. Please Click Here to Read Send This Article to a Friend: � Your Name: � Email Address of your Friend: � Your Email address: � � � � � Back to Home Page Quick Menu Visit the Button Shop Interactive Forum Black and White Test of Cryptographic Algorithms E-mail the Editor � From news at quake.connectfree.net Wed Sep 23 15:49:32 1998 From: news at quake.connectfree.net (News Letter) Date: Wed, 23 Sep 1998 15:49:32 -0700 (PDT) Subject: ConnectFree September 98 Newsletter Message-ID: <199809232249.XAA13993@swampthing.connectfree.net> Connect Free Newsletter September 98 Welcome to Connect Free, and thank you for joining our service, we hope you find our first newsletter informative. Aardvaak For the avoidance of doubt, Aardvaak is a reseller for FREE Internet access for Connect Free, if you have signed up to the service through Aardvaak you are a customer of Connect Free and not Aardvaak, however this is only in relation to FREE Internet access and not any other service that maybe available through Aardvaak. ---------------------------------------------------------------------------- ---------------------------------- Games Service The Games Service is now live and can be accessed as of today, the reason for the delay is because it has been on trial. Connect Free aims to have the fastest and cheapest way of connecting and playing your favourite games on-line with others across the UK, Quake is the first game to come on-line. (If you have not ever played games on-line before, take it from me, what an experience) ---------------------------------------------------------------------------- ---------------------------------- Sending E-mails Because the service is FREE, we are open to abuse by hackers and people using the service to send out unsolicited e-mails, as a deterrent we have had to raise the security.=20 As of now, anyone sending e-mails from other service providers, will need to re-configure their mail package for sending e-mails from smtp.connectfree.net ---------------------------------------------------------------------------- ---------------------------------- Future Developments Coming Soon=85 FREE telephone numbers, for example Premium and Personal rate numbers. These numbers are not only FREE but you can also make money from the calls, "makes a change from BT making all the money". How does it work? Simple, you just attach a Personal or Premium rate number to your existing telephone number and inform who ever you wish what the new number is and start to make income from the calls you receive. (Ideal for people running a business from home)=20 A Personal Number is a number for life and is charged at around about 31p in the day and 12p in the evening, if you move house the number moves with you. Premium rate numbers are those awful numbers that no one wants to phone which are charged at 50p and =A31 a minute,=20 How much money can I make? Depends on how many calls you receive and it's a great way for compensating against the cost of the local call when connecting to our service.=20 How does Connect Free make money out of all this? well, it's a win, win situation, you make money, we make money, and we all get the satisfaction that for a change we are all making money instead of BT. IT's GOOD TO TALK. More information will be available soon. ---------------------------------------------------------------------------- ---------------------------------- Engaged Tones If you have received any engaged tones? please except our appologies, however in October of this year we will be doubling our capacity, and in March of next year we will quadruple our capacity. ---------------------------------------------------------------------------- ---------------------------------- Improvements Connect Free would like to hear from you, if there are any ways in which you think we could improve our service, or add more content to the Connect Free web site.=20 It is Connect Free policy not to send unwanted rubbish by e-mail or junk advertising by any other means. All we ask is that you receive our monthly newsletter informing you of any changes to the service and any new service that may come available which you may benefit from. Please note that Terms & Conditions are available from the Connect Free web site. ---------------------------------------------------------------------------- ---------------------------------- Contact us at info at connectfree.net or Telephone 0702 115 2525 The end ____________________________________________________________________________ __________________________________ From downloads at hlserver.com Wed Sep 23 01:04:57 1998 From: downloads at hlserver.com (jason roks) Date: Wed, 23 Sep 1998 16:04:57 +0800 Subject: PC Beta Download (was Re: Download Info (Form) PC) In-Reply-To: <199809222208.SAA05453@sol00320.dynamicweb.net> Message-ID: Hi, Thanks for checking out Hotline. We hope you enjoy our software and tell all your friends. Please check back at our web site for the latest news about Hotline Communications Ltd. To purchase licenses for Hotline software please visit our secure transaction server at http://www.HotlineSW.com If you experienced any difficulties downloading the evaluation software you can try again from our secondary distribution server: ftp://ftp.hlserver.com If you have any technical questions please contact mailto:support at HotlineSW.com kindest regards, jr -- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ jason roks business development HOTLINE COMMUNICATIONS LTD. tel: 416.531.7804 jason at HotlineSW.com http://www.HotlineSW.com HOTLINE office: hlserver.com (207.245.14.170) HOTLINE Tracker: hltracker.com (207.245.14.170) ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ "There is more than the web!." From rah at shipwright.com Wed Sep 23 01:44:03 1998 From: rah at shipwright.com (Robert Hettinga) Date: Wed, 23 Sep 1998 16:44:03 +0800 Subject: No Privacy for Privacy Hypocrites Message-ID: Oh, *this* is rich... Cheers, Bob Hettinga --- begin forwarded text Date: Wed, 23 Sep 1998 15:12:46 -0400 (EDT) Reply-To: love at cptech.org Originator: info-policy-notes at essential.org Sender: info-policy-notes at essential.org Precedence: bulk From: James Love To: Multiple recipients of list INFO-POLICY-NOTES Subject: No Privacy for Privacy Hypocrites MIME-Version: 1.0 X-Comment: To unsubscribe from this list, send the message "unsubscribe info-policy-notes" to "listproc at essential.org". Leave the "Subject:" line blank. No Privacy for Privacy Hypocrites A grass-roots citizen group is forming to address the unrestrained assault on privacy represented by the Kenneth Starr/Congressional investigations into President Clinton's sex life. The group, named "No Privacy for Privacy Hypocrites," (on the web at http://www.noprivacy.org) intends to make Congress confront the privacy concerns that are raised by the investigation, by asking Members of Congress to declare their own standards regarding privacy, and deal with the consequences. The group is concerned that the investigation into the President's sex life is having a negative impact on privacy that will affect ordinary citizens. "This whole sad affair is the product of decades-long disrespect for privacy, for which our political leaders are responsible," said Evan Hendricks, Editor and Publisher of Privacy Times and one of the organizers of the group. "This effort is intended to arrest the free fall of privacy rights triggered by the stunning abuses of power by the Starr investigation and the Congressional dissemination of personal information," said Jamie Love. "This should be a wake-up call for Congress," said Gary Ruskin. On Monday, September 28, 1998, the group will distribute a survey to Members of Congress asking: Do you believe any branch of government should investigate allegations that elected officials have committed adultery, including allegations that they have lied about it? If a Member answers yes or if the Member refuses to answer the first question, then (and only then) they will be asked: Have you ever committed adultery, and have you ever lied about it? The survey is designed so that Members of Congress who support privacy will not be asked about their own private lives. The answers to the survey will be placed on the web at http://www.noprivacy.org, as soon the surveys are returned. CITIZEN INVOLVEMENT There are several ways people can participate in this effort. 1. You can join the group by sending a note to info at noprivacy.org. 2. You can join an Internet discussion about the campaign by sending a note to listproc at essential.org, with the message: sub noprivacy Jane Doe (If your name is Jane Doe). 3. You can offer suggestions for the web page, which needs some work. 4. You can encourage your own Members of Congress to answer the survey. For more information, see the No Privacy for Privacy Hypocrites web page at http://www.noprivacy.org Organizers of the Committee gave different reasons for joining. Audrie Krause said "Wasn't there something in the New Testament that says let he who is without sin cast the first stone? And since we are heading toward a public stoning, we should ask, is anyone in Congress qualified to cast the first stone?" Jim Warren, the well-known Internet activist, said: "If politicians are going to compete with the Jerry Springer Show, let's make sure that ALL of the best actors have an EQUAL opportunity to expose their bedroom activities to the world. . . . Any member of Congress who refuses to answer this simple survey, but votes to pursue hearings about some other politician's private sex-life, should be voted out of office." Catherine Gavin said "All this looks as if some people in this country had decided to drive a car going faster and faster, without caring that there were no brakes on the car. Something has to be done before all of us get hurt in the final crash. This is about a lot of things, but it is mostly about privacy, or the prospect of living in a world with no privacy." Initial Organizing members of the Committee Initial Organizers of the Committee, which is an Ad Hoc group, include: Gary Ruskin, Marc Rotenberg, Jim Warren, Manon Anne Ress, Jamie Love, Catherine Gavin, Audrie Krause, Noe Hatchuel, Charles Bennington, Evan Hendricks. To contact the Committee, send email to info at noprivacy.org --- end forwarded text ----------------- Robert A. Hettinga Philodox Financial Technology Evangelism 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From rah at shipwright.com Wed Sep 23 01:44:19 1998 From: rah at shipwright.com (Robert Hettinga) Date: Wed, 23 Sep 1998 16:44:19 +0800 Subject: IP: Microgov't: Old Red Tape Looks Good in Comparison Message-ID: --- begin forwarded text Delivered-To: ignition-point at majordomo.pobox.com X-Sender: believer at telepath.com Date: Wed, 23 Sep 1998 07:51:20 -0500 To: believer at telepath.com From: believer at telepath.com Subject: IP: Microgov't: Old Red Tape Looks Good in Comparison Mime-Version: 1.0 Sender: owner-ignition-point at majordomo.pobox.com Precedence: list Reply-To: believer at telepath.com Source: Government Executive Magazine http://www.govexec.com/dailyfed/0998/092398t2.htm September 22, 1998 DAILY BRIEFING The dawn of the era of microgovernment By Jonathan Rauch, National Journal On Feb. 12, Americans awoke to read in their newspapers that the U.S. government-settler of the West, vanquisher of totalitarianism, conqueror of the moon-now writes the rules of golf. Casey Martin is a professional golfer who suffers from Klippel-Trenaunay-Weber syndrome, a congenital circulatory disorder that gives him pain and swelling in his right leg. Because Martin cannot walk the links, a federal judge ruled that he had the right, under the 1990 Americans With Disabilities Act, to play the PGA Tour using a golf cart. "Mr. Martin is entitled to his modification because he is disabled," said Judge Thomas M. Coffin. "It will not alter what's taking place out there on the course." To Martin and the judge, this was a "reasonable accommodation," fair to Martin and therefore required by law. To the Professional Golfers' Association of America, it was an unreasonable intrusion, unfair to all the players who must wear themselves out trudging picturesquely from hole to hole. One interesting question was whether walking is part of the game of golf. A more interesting question, however, was how the government got into the business of deciding whether walking is part of the game of golf. This was a line of work that the most ambitious New Deal economic planner would find startling. Today, conservatives denounce law-making courts, communitarians denounce the "rights industry," businesses denounce the litigation explosion. Each critique has some merit, as far as it goes; but this article posits that none of them goes far enough. If you want to understand the full implications of the Casey Martin phenomenon, you need to view it-and the many thousands of other cases in which individuals and their lawyers (or lawyers and their individuals) press rights-based lawsuits-as nothing less than America's third and most extraordinary wave of regulation. Call it microgovernment: a style of regulating based on the premise that each individual is entitled to a safe, clean or, especially, fair personal environment. Microgovernment is not the same thing as small government-far from it. In fact, it is remarkably expansive government, but its immensity takes the peculiar form of an infinity of microdecisions, each building upon, yet separate from, all the others. In this, it is radically different from earlier periods of regulatory activism. The first two waves of regulation dealt in big, clunky agencies issuing one-size-fits-all rules aimed at making people better off, on the average. Microgovernment comes as a steady drizzle of court decisions, seeping through the pores of civic life. Regulatory agencies, such as the Equal Employment Opportunity Commission, are involved, but mostly as plaintiffs rather than as bureaucratic rule makers. The main regulators are, indeed, not agencies at all, but claimants and lawyers and judges and juries, all working independently to spin, in the fashion of a mass of caterpillars, a cocoon of intricate social regulation that enfolds even the most minute details of everyday life. "It's basically just an accumulation of micro-outcomes," says Pietro S. Nivola, a political scientist at the Brookings Institution (where I am a writer in residence). "You're not even setting broad targets or goals. You add up a million cases, and that's what you get." So today, there is nothing unusual about waking up one morning to find the government writing the rules of golf. The New York State Board of Law Examiners is required to give extra time on the bar exam to a woman who claims (contestedly) to have a reading disability. A group of gay municipal workers in Seattle is told it must include a hostile heterosexual man who outspokenly believes in "biblical values." A television production company is ordered to pay a $5 million judgment for refusing to cast a visibly pregnant woman in the role of a seductive vamp. The Supreme Court, in its majesty, decides when a coach may and may not smack a football player on the rump. This article examines a cluster of familiar, sometimes overfamiliar, goings-on and tries to look at them in a new way: not as artifacts of jurisprudence but as a system of social control. In other words, as regulation-but of a sort that has eluded the scrutiny that regulation ordinarily gets. Regulation, of course, is necessary, and no system is perfect, and top-down, bureaucratic rule-making has more than its share of problems. But microgovernment is fundamentally different from other regulatory systems: It is less accountable, less rational, and more intrusive than anything the New Deal or the Great Society tried. The Third Wave In the standard account of things, there have been two great and distinct waves of regulation in America, one now decrepit, the other still robust. The first was economic regulation, which began a century or so ago, in the days of the robber barons, and lasted through the New Deal; the second was social regulation, which blossomed in the 1960s and 1970s. Each wave had its distinctive theory. For the economic regulators, the problem was that markets were unstable and prone to manipulation by cartels. The solution was to establish agencies to control prices (passbook interest rates, airfares, farm prices) and regulate entry into markets (banking, communications, peanut-growing). For social regulators, the problem was that markets dump social harms ("externalities") on individuals who can't readily organize to protect themselves. The solution was the creation of agencies to reduce pollution (the Environmental Protection Agency) or to act on behalf of consumers (the Consumer Product Safety Commission), workers (the Occupational Safety and Health Administration), drivers (the National Highway Traffic Safety Administration). Although the two waves were distinct, they had in common their decision-making style, namely bureaucratic rule-making, otherwise known as red tape. That is where the standard history ends. It is also where the third wave begins. Like the earlier two, the third is rooted in a theory of market failure: that markets are often unfair or hurtful. Its solution, however, breaks sharply with the earlier two models, by rejecting the bureaucratic model. Instead of looking to the executive branch to issue rules, individuals (or agencies standing in for individuals) have gone to court for redress. Under pressure from activists with regulatory agendas and ordinary people with genuine grievances, the courts have responded. In the 1960s and 1970s, a series of decisions broadened the traditionally narrow tort laws to allow people to collect damages for more harms and for more reasons. The result lies in a peculiar gray zone between a traditional, negligence-based tort system and a randomly enforced right to personal safety. Tillinghast-Towers Perrin, a management consulting firm, reports that, from the mid-1960s to the mid-1980s, tort costs more than doubled as a share of the economy (to more than 2 percent), with lawyers getting about 30 percent of the take and plaintiffs less than half. In general, the tort system is not so much unreasonable (the horror stories are exceptions) as ambitious. People howled in 1992 when a grandmother named Stella Liebeck spilled hot coffee on herself and won a $2.7 million punitive judgment against McDonald's. In fact, the case was not silly: Liebeck's burns required hospitalization and skin grafts, McDonald's acknowledged having received 700 prior burn complaints, and the punitive judgment was eventually reduced to $480,000. The larger significance, however, was that juries were colonizing the territory previously reserved for bureaucrats and politicians. A National Restaurant Safety Administration, if it existed, could conduct rule-making to decide whether one burn for every 24 million McDonald's coffees sold is a problem worth worrying about, or whether, in the big scheme of things, other safety problems are more important. In the court case, however, the jury saw just a burned grandmother and an arrogant corporation that had dismissed 700 burns as "trivially different from zero." "The case prompted McDonald's, and other restaurants, to turn down the heat on the coffeepots," reported The Hartford (Conn.) Courant. America must be the only country in the world where juries regulate the temperature of coffee. The people who worried that product-liability law was becoming a right to safety were not particularly noticing that, on a separate track, another series of lawsuits was establishing a right to fairness. For instance, the courts waded into a swamp of workplace-harassment litigation and embarked upon what became an astonishingly ambitious regulatory project. The courts construed the 1964 Civil Rights Act, which forbids racial or sexual discrimination in the "compensation, terms, conditions, or privileges of employment," as covering not just hiring and firing and wages but as striking "at the entire spectrum of disparate treatment of men and women in employment." That was a pretty big spectrum, and striking at it required, among other things, that each individual's workplace environment be free of sexual harassment, as defined by juries and judges. Other decisions established a parallel right to be free of other forms of discriminatory harassment, which was left for entrepreneurial plaintiffs and puzzled juries to define. The chart on page 2152 shows the result: Federal anti-discrimination lawsuits have almost tripled in this decade. By 1998, regulating through the courts had become, in effect, Washington's default mode. Why bother with a new bureaucracy to regulate health maintenance organizations, when you can just pass a "patients' bill of rights," meaning (in some versions) regulating HMOs through private litigation? No need to hire bureaucrats, make painful political choices or spend taxpayers' money; regulation by lawsuit is self-financing and self-propelled. "It's really a shift to off-budget governance," says Nivola. The trouble is that it is off-accountability, too. Digging a Tunnel Imagine that, instead of a Clean Air Act, with its endless rules for sulfides and scrubbers, we just had a Clean Air Bill of Rights: "No corporation or business establishment shall impose an unfair, excessive or unreasonable burden of air pollution on any person or group." Then suppose that, instead of creating an EPA, we granted everybody standing to sue for large sums of money. In effect, we would give every individual the right to a clean set of lungs and leave it to juries to decide what that means. Instead of viewing, say, Los Angeles as a big patch of air containing 10 million people, we would view Los Angeles as 10 million pairs of lungs, each equipped with a lawyer. The government's perspective is inverted: What was seen from the top down, as a large environment with many difficult trade-offs, is instead seen from the bottom up-as 10 million microenvironments, each to be regulated in its own right. It is this inversion of perspective that distinguishes microgovernment from other kinds of regulation, and that accounts for its often-bizarre behavior. Over the past few decades, economists and good-government types have learned a thing or two about good regulatory hygiene. Some of the basic rules are: Set an overall goal before putting particular rules in place; Target outcomes, not process-success means reducing pollution or reducing on-the-job injuries, not writing rules or levying fines; Look at the big picture; weigh overall social costs and benefits to avoid chasing wild geese (ever since the 1970s, all major federal regulations are subject to cost-benefit review); Propose rules in advance (in the Federal Register), and give all affected interests plenty of time to comment; Write down the finished rules, and make them clear enough to comply with; Don't give bureaucrats a financial stake in their actions-for instance, don't let them pocket the fines they levy, lest they turn regulation into a money-making scheme; Allow for at least arm's-length supervision by politicians, so that Congress and the White House can hold regulators to account. Our hypothetical Clean Air Bill of Rights offers not a single one of those protections. Indeed, it regards them as irrelevant or improper. Courts and juries can't target outcomes, because they control only each particular case. There is no big goal, just the million microgoals of justice in a million particular cases. And so, with our imagined Clean Air Bill of Rights, particular justice always trumps regulatory efficiency. The EPA can say, "Air that is clean for 95 percent of the people is clean enough," but no self-respecting court can say to a plaintiff, "Because other people's lungs are clean enough, you're not entitled to clean lungs yourself." Clear rules, known in advance? No such thing; instead, a million court decisions, often conflicting. Cost-effectiveness? The mandate is to do justice, not to count cash, and in any event, courts are neither equipped nor expected to conduct economic analyses of the decisions they reach. Disinterested regulators? The agenda is driven by angry complainants and entrepreneurial lawyers who have everything to gain from finding new behaviors to punish. Through it all, the politicians are relegated to the peanut gallery as commentators, except on the rare occasions when they manage to rewrite a whole law, which is far harder to do than summoning a regulator to testify before an oversight committee. "An agency can be punished in a lot of different ways," says Thomas F. Burke, a political scientist at Wellesley College. "You can intimate that they're not going to get the same budget through Congress next year. It's much harder to discipline courts all across the country, and individuals who are bringing lawsuits all across the country." So what happens with our proposed Clean Air Bill of Rights? Some juries do sensible things, such as finding for plaintiffs who were exposed to high concentrations of lead. Other juries do weird things, such as finding for plaintiffs who claim that trees pollute. Some courts decide that an "unreasonable burden" means a high likelihood of lung disease, but others decide that "unreasonable burden" means more pollution in one area than in another, or any pollution at all. Over the years, things settle down a little, as precedents accumulate in each old area of litigation, but meanwhile complainants keep opening new areas of litigation. In any case, no one can be sure what the environmental rules are, because no one knows what the next jury may decide, or what the next plaintiff may dream up. The result is what Burke has called a "floating legal crapshoot." Anything could happen. And anything does. One-Eyed Regulating In 1989, the Exxon Valdez spilled more than 10 million gallons of oil into Alaska's Prince William Sound. The ship's captain, Joseph Hazelwood, had been drinking (though a jury cleared him of intoxication) and was known to have sought treatment for an alcohol problem four years before the accident. In 1990, with the Justice Department's encouragement, Exxon established a policy barring employees with histories of drug or alcohol abuse from 1,500 safety-sensitive jobs, "where an accident could have catastrophic consequences"-about 10 percent of the company's positions. For people transferred out of such jobs, the company tries to find positions of comparable rank and pay. Nonetheless, the EEOC is now suing Exxon for discrimination under the Americans With Disabilities Act (ADA). United Parcel Service requires that its delivery drivers, who pop in and out of city traffic, have sight in both eyes. It, too, is being sued by the EEOC under the disability act. Walter K. Olson, a senior fellow at the Manhattan Institute for Policy Research and the author of The Excuse Factory: How Employment Law Is Paralyzing the American Workplace, points out that this is not exceptional. Omaha paid $200,000 in damages for refusing to rehire a policeman who had lost his sight in one eye and had suffered loss of peripheral vision in another; Northwest Airlines is being sued for declining to hire a woman with monocular vision to drive maintenance trucks between airplanes. Aloha Islandair Inc. is being sued for declining to hire a pilot with vision in only one eye. (If a plane piloted by such a pilot were to crash, the airline could, of course, be sued.) Maybe one-eyed drivers and alcoholic tanker captains are unsafe on the average, maybe not. But the important thing to note is that the ADA never reaches that question, because it forbids basing policy on averages. A bureaucratic rule might say that if 90 percent of Exxon's jobs are available to recovering alcoholics, that is enough. But all microgovernment "sees" is each job, and each disabled person, and each person's right to accommodation. Microgovernment is one-eyed. The threat of ADA lawsuits may not create either jobs or goodwill for the disabled. In a recent study, two Massachusetts Institute of Technology economists, Joshua Angrist and Daron Acemoglu, found that the ADA "had a substantial and statistically significant negative effect on the employment of disabled people under 40." But who knows? Given that court decisions are often nebulous or conflicting, that companies respond to those decisions in many different ways, and that lawsuits often chase deep pockets and settlement prospects rather than urgent national problems, microgovernment does not actually know what it is doing, let alone whether it is doing it well. The question is not whether helping the disabled is a good idea; it is whether letting lawyers do the regulating is the best method. Successful regulatory systems work by paying attention to measurable outcomes and by feeding knowledge about success or failure back into the system. Goals set by bureaucrats and politicians may or may not be wise, but usually it is at least possible to know whether a given regulation succeeds at, say, reducing sulfur emissions or stabilizing freight charges. The microgovernmental model, by contrast, sets no overall goals, measures no outcomes, allows for little or no evaluation of effectiveness or cost vs. benefit, writes few unambiguous rules, allows no formal public comment even in cases with sweeping ramifications, exiles politicians to the fringe of policy-making, and buys us-well, we have no idea what it buys us. If your goal was to design a regulatory regime that violated every standard rule of good regulatory practice, you could hardly do better. Strip Search Microgovernment is micro in another sense: not only is it radically decentralized, but it pokes its nose into everything, and no corner of life is too small for it to reach. Its mandate-attaining fairness in every personal environment-acts as a little microlever, prying here and prying there, opening one door after another to the onslaught of legal process. Ask the PGA. Or ask Bill Clinton, whose sex life was scoured in fine detail by Paula Corbin Jones' lawyers, thus giving an enthusiastic microregulator a taste of his own medicine. Clinton's alleged conduct with Jones was, at least, patently disgusting. In many cases, distinguishing workplace harassment from ordinary flirting is difficult; courts must go to great lengths to do it. Workplace harassment law was entirely cooked up by the courts, and is entirely driven by the mandate for fairness in particular cases. It therefore serves as a good example of the microgovernmental regulatory style in its purest form. In Oncale vs. Sundowner Offshore Services Inc., the Supreme Court ruled this year that discriminatory same-sex harassment is illegal. What exactly is harassment, and when is it discriminatory, as opposed to merely, say, mean? The court helpfully announced that a male football coach may smack a player on the behind as the player runs onto the field, but may not smack a secretary (male or female) on the behind in the back office. Well, what about the locker room? In case the exact line of demarcation eludes you, the regulators-meaning the court-provided this guidance: "The real social impact of workplace behavior often depends on a constellation of surrounding circumstances, expectations, and relationships which are not fully captured by a simple recitation of the words used or the physical acts performed. Common sense, and an appropriate sensitivity to social context, will enable courts and juries to distinguish between simple teasing or roughhousing among members of the same sex, and conduct which a reasonable person in the plaintiff's position would find severely hostile or abusive." This is rather as if the EPA had defined illegal pollution by saying: "We know it when we see it." To decide whether harassment has occurred, the court needs to sort through "a constellation of surrounding circumstances, expectations, and relationships"-in other words, the intricacies of each relationship in each workplace situation in each case. Every joke, every dinner invitation, every friendship becomes a courtroom exhibit, aswarm with lawyers. Who told which dirty joke, how often? Who was friends with whom? What did that dinner invitation signify? In a recent racial-harassment case involving a black plaintiff and an Asian plaintiff suing their former employer in Los Angeles, lawyers busied themselves debating who was more offensive to whom. Remarks to plaintiffs: "You don't sound like you're black." "Why are your people's faces so shiny?" "You know, we bombed you [Japanese] once. We'll do it again." Remarks by plaintiffs: "dumb Polack," "white trash," "crackers," "redneck," "fucking Korean." The jury decided the workplace was hostile and ordered the company to pay $1.9 million. Given that a microgovernmental lawsuit is often the legal equivalent of a strip search, the prudent employer understandably takes no chances on jokes, teasing, or personal comments around the office. Lately, legal experts are advising employers not to let workers recount stories from the movie There's Something About Mary, a sophomoric comedy whose scenes include, for instance, some business about genitals caught in a zipper. "If you are telling these kind of jokes, no matter where they're coming from, you're exposing yourself to a sexual-harassment claim," Allen Rad, an employment lawyer, told The Dallas Morning News in July. "You're better off just not talking about it." Subjecting each workplace, each job, each relationship, each joke to exhaustive legal scrutiny can devastate communities that depend on trust. In Seattle, two successive support groups for gay city employees have collapsed under the weight of legal processes launched by a hostile heterosexual man who was determined to attend their meetings. "I was attempting to find out what special privileges they were being given," says Philip Irvin, a city engineer who favors biblical morality and secular laws criminalizing sodomy. When the gays tried to keep him out, he filed discrimination charges, and last year the city's civil rights office found in his favor. The case grinds on through its eighth year of appeals. Exhausted by the wrangling, the group has not met since 1997. At the end of the day, as the law thrashes about and tries to make every personal environment fair, the results often become simply bizarre. In one notorious recent case, the restaurant chain Hooters, whose calling card is its scantily clad waitresses, paid a $3.75 million settlement (of which almost half went to lawyers) after three men were turned down for waitressing jobs. A bureaucracy looking at the labor market as a whole, with its 370,000 places to eat, might have decided that letting some restaurants specialize in underdressed female servers is not a terrible thing. Microgovernment, however, sees only the unfairness in each particular case. Discrimination in allocating even one serving job is too much. The law (under Title IX of the 1972 Education Amendments) forbids sex discrimination in education programs. In classic micro style, judges and juries have interpreted this to mean that each particular school needs to spend as much on women's sports as it does on men's; because women are less interested in sports, this has meant achieving equality by shutting down men's college teams across the country. According to a National Collegiate Athletic Association survey, men's gymnastics teams are down to 32, from 133 in 1975. To comply with a legal settlement, California State University (Northridge) dropped baseball, soccer, swimming and volleyball. Elementary and secondary schools are now getting the same treatment. ABC's 20/20 noted in May that a lawsuit by two softball players, Jennifer and Jessica Daniels, required Merritt Island High School, in Florida, to mothball a concession stand, a scoreboard and bleachers that parents donated for the boys' baseball field unless the same items were also donated for the girls' softball field. When the program asked the girls' lawyer why she was requesting quadruple legal costs, she replied, "Because we put that money into other lawsuits." She is currently suing 10 high schools. Thus the mindless totalism that gives microgovernment its characteristic resemblance to a lawnmower propelling itself through a rose garden. Termite Attack No doubt it is intrusive, in some sense, to require steel makers to put scrubbers on their smokestacks, or landowners to preserve wetlands. Yet the relationships interfered with are business relationships, and the requirements are, at bottom, economic. Microgovernment is of a different complexion. "It's us and our personal behavior," says Robert E. Litan, a Brookings Institution economist and former Clinton administration regulator. "This is telling people how they have to behave." For government, policing jokes at work, or ordering colleges to set up as many press interviews for female athletes as for males, or fining the producers of Melrose Place $5 million for refusing to allow a pregnant actress to play a bikini-clad seductress, represents a higher and stranger order of intrusiveness. Never before has the government concerned itself so minutely with the detailed interactions of everyday life. Moreover, microgovernment creeps toward you like a swarm of subterranean termites, rather than charging you like an angry elephant. There is no city hall to fight, no bureaucrat to argue with. "There is no forum in which you're having a national, public dialogue about these questions," says Nivola. "It's not happening in a legislature. It's taking place in a myriad of courtrooms, and the cumulative effect of it is the regime. It's so decentralized that it doesn't offer a visible target." No one has any idea how much microgovernment costs. It may well be less expensive than traditional regulation, given the high costs of such old standbys as trade protections and price controls. However, microgovernment's costs are best measured not in money but in government's loss of respect for people, and people's loss of respect for government. If the excesses of 1960s and 1970s regulation destroyed the public's confidence in the bureaucracy, what will the greater and weirder excesses of microgovernment do to the public's confidence in the judiciary? And how much grinding up of personal and professional relationships is required before someone figures out a way to stop the lawnmower? Eventually, somehow, someone will. But no one has done so yet. Microgovernment is in its gaudy first flowering, protected from the traditional checks on regulatory excess by its moral prestige as a defender of rights. Indeed, few people even realize that it is regulation. President Bush embraced the ultramicro Americans With Disabilities Act, even as his own vice presidential Council on Competitiveness swore to thwart regulation. President Clinton thinks nothing of demanding a patients' bill of rights, even as his own vice president drums away at the importance of holding regulators accountable to results rather than to process. In time, either there will be reforms-of a sort not yet invented-or microgovernment will simply collapse, as irrational and unaccountable forms of governance eventually do. America's extraordinary experiment in regulation without regulators will fail, and the country will move on. But what will be the condition of the law when that time comes? ----------------------- NOTE: In accordance with Title 17 U.S.C. section 107, this material is distributed without profit or payment to those who have expressed a prior interest in receiving this information for non-profit research and educational purposes only. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml ----------------------- ********************************************** To subscribe or unsubscribe, email: majordomo at majordomo.pobox.com with the message: (un)subscribe ignition-point email at address ********************************************** www.telepath.com/believer ********************************************** --- end forwarded text ----------------- Robert A. Hettinga Philodox Financial Technology Evangelism 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From tgrandsn at uwimona.edu.jm Wed Sep 23 02:30:13 1998 From: tgrandsn at uwimona.edu.jm (Tyrone W. Grandison) Date: Wed, 23 Sep 1998 17:30:13 +0800 Subject: Inquiry In-Reply-To: <199809231354.JAA00327@relay1.planetall.com> Message-ID: CAn someone point to where I may find a good documentatio on a NNTP server (and possibly documentation) ? Thanks, T From jf_avon at citenet.net Wed Sep 23 03:00:40 1998 From: jf_avon at citenet.net (Jean-Francois Avon) Date: Wed, 23 Sep 1998 18:00:40 +0800 Subject: Apologies: mistakes on my statistics... Reality is *worse* than I believed or remembered! Message-ID: <199809232250.SAA25339@cti06.citenet.net> ----------- from CFD V2 #602 ---------------- >From a post by Jean Hogue (Wed, 23 Sep 1998 Subject: a few impressions on the rallye) [snip] - Quebec is waking up and joining in - the ban on "purse-sized" pepper spray -- that says it all. - 60 millions/year forever for gun control bureaucrats, 4 millions/year for 5 years for cancer research 38 women murdered with a firearm last lyear 3900 women died of breast cancer last year if this is not a feminist issue, what is ? - the 60 million/year maintenance cost is almost as high as the "total 7-year cost" of 85 millions promised for the entire program. by 2015, the total tab will be 1 billion dollars. - the gripping testimony of John St-Amour (Marstar) - the brutality of the search for mere _papers_ SWAT with the finger on the trigger of HK MP-5 weapoons and using the weapons to point where to go to - the systematic harrassment of the government pursuing a non- case demanding St-Amour plead guilty to some trivial charges as condition to stop this 3-year long harrassment - over $100,000 in legal fees - the role of Canada Customs, describing St-Amour as "violent" - the government has unlimited funds (taxpayers' money) and can outspend anyone and drag anyone through court forever - trumped-up charges of "unsafe storage" to justify the fiasco. - this can happen to _anyone_. C-68 allows searching for records, unsafe storage charges are routinely fabricated Spin doctoring from McLellan [minister of Justice] - talk of confiscation is paranoid - the registry will be cost-effective - used weeping mothers of Polytechnique killings as prop for C-68 [snip] --------- end of quote ---------------- Ciao jfa Definition:��FASCISM:�n.:��a�political�and�economic�movement,�strongly�nationalistic,�magnifying�the�rights�of�the�state�as�opposed�to�those�of�the�individual,�in�which�industry,�though�remaining�largely�under�private�ownership,�and�all�administrative political�units,�are�controlled�by�a�strong�central�government. ��������------------------------------------------------- "One�of�the�ordinary�modes�by�which�tyrants�accomplish�their�purpose,�without�resistance,�is�by�disarming�the�people�and�making�it�an�offense�to�keep�arms".��-�Joseph�Story,�U.S.�Supreme�Court�Justice. ��������------------------------------------------------- the�German�gun�control�laws�were�enacted�by�the�"liberal"�Weimar�Republic�government�that�preceded�Hitler,�and�were�a�strong�aid�to�his�coming�to�power�--�because�they�disarmed�Hitler's�opponents,�and�Hitler's�adherents�ignored�them�--�as�criminals�have�always�ignored�gun�control�laws. Disarming�the�public�is�a�frequent�first�step�toward�dictatorships�and�genocides.��Once�the�disarming�is�complete,�the�public�is�helpless�against�those�who�have�the�guns.��������------------------------------------------------- PGP�keys:�http://bs.mit.edu:8001/pks-toplev.html PGP�ID:C58ADD0D:529645E8205A8A5E�F87CC86FAEFEF891� PGP�ID:5B51964D:152ACCBCD4A481B0�254011193237822C From ravage at einstein.ssz.com Wed Sep 23 03:10:58 1998 From: ravage at einstein.ssz.com (Jim Choate) Date: Wed, 23 Sep 1998 18:10:58 +0800 Subject: Inquiry (fwd) Message-ID: <199809232337.SAA12426@einstein.ssz.com> Forwarded message: > Date: Wed, 23 Sep 1998 17:20:43 -0500 (GMT-0500) > From: "Tyrone W. Grandison" > Subject: Inquiry > > CAn someone point to where I may find a good documentatio on a NNTP server > (and possibly documentation) ? > Linux ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From ravage at einstein.ssz.com Wed Sep 23 04:11:29 1998 From: ravage at einstein.ssz.com (Jim Choate) Date: Wed, 23 Sep 1998 19:11:29 +0800 Subject: Invading Switzerland in WW2, pro and con (fwd) Message-ID: <199809240038.TAA12572@einstein.ssz.com> Forwarded message: > From: "Richard Redd" > To: > Subject: Re: Invading Switzerland in WW2, pro and con > Date: Wed, 23 Sep 1998 17:56:11 -0600 > Of course there's the old story about some conqueror (I think it was Hitler > saying, "I could invade your country with 100,000 men". The Swiss diplomat > says, "Every man would fire their rifles at the invader". "Well, suppose I > send 200,00?" "Then every one would fire twice." ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From kurtbuff at halcyon.com Wed Sep 23 05:43:38 1998 From: kurtbuff at halcyon.com (Kurt Buff) Date: Wed, 23 Sep 1998 20:43:38 +0800 Subject: In-Reply-To: <199809230415.GAA08863@replay.com> Message-ID: <000f01bde75a$e2c9a2a0$1b01010a@boar.minuteman.org> Well, yes, there *is* a problem in defining your stance by opposition to others, but the term is useful, nonetheless. Simply saying "unchurched" or "realist" or "non-religous" sometimes simply doesn't say enough, or mean enough to others to convey all of the meaning necessary. | At 09:00 PM 9/21/98 -0700, Kurt Buff wrote: | | >I (as a militant atheist) merely say that if you can define | your God, I can | >probably prove he doesn't exist. Unless, of course, your | definition is so | >broad as to have no meaning in the first place. | | As a thinker I find the term atheism dignifies the | concept of theism, so I find it offensive. Theists | are primitives and one needn't stoop. | | In my religion, saying unprovable things in public | is a stonable offense. | | Joe Momma From nobody at remailer.ch Wed Sep 23 05:47:04 1998 From: nobody at remailer.ch (Anonymous) Date: Wed, 23 Sep 1998 20:47:04 +0800 Subject: Jury duty considered harmful, or at least rare Message-ID: <19980924015428.2767.qmail@hades.rpini.com> On Wed, 23 Sep 1998, Tim May wrote: > > At 11:11 PM -0700 9/22/98, Bill Stewart wrote: > > >Yeah. The times I've known the facts in cop-vs-citizen cases, > >the cops have often been lying; I have to assume that they're often lying > >in cases when I don't know the facts as well. Of course, getting > >somebody with that kind of attitude about cops onto a jury > >is somewhat unlikely, but occasionally you'll find neutrals. > > I last served on a jury in 1973, 25 years ago, no doubt before many readers > of Cypherpunks were born. > > And I've only received a single _possible_ summons since, in the 25 years > since that one jury appearance. > > Yet some of the apolitical numbskulls I know about have served on several > juries in the same time. The Poisson, as expected, or something more human? > > Jury nullifying minds want to know. That is almost enough to make the more paranoid among us think that maybe they have a "do not summon" list. They basically have this anyway with the prosecution vetoing possible jurors. If you're on it, you just aren't summoned. People on that list would be people of libertarian mindsets, politically outspoken people, Cypherpunks, professional people, etc. If they do have a list, I'd kind of like to be on it. I'm a college student, and I _can't_ serve on a jury for more than a day or so. The same goes for doctors, corporate executives, and others. There is an inherent flaw in the jury system. You get summoned and are legally required to blow the entire day down at the courthouse. If you're a student you miss classes, and if you have a job you miss that too. You have to pay for transportation, parking, food, and whatever else you need. In return, you get paid something like $3, which often isn't even enough to cover the parking and get told every five minutes that this or that will get you, as a juror or potential juror, thrown in jail. Meanwhile, if you're a doctor, scientist, college student, lawyer, or hold any other professional position you're thrown off most of the time. If you have a decent job or if you're in school, forget about it, because if you're tied up for more than a day or so you _just can't do it_. They don't want people who know that juries are capable of nullification. They don't want people who can determine that the evidence of one side or the other is suspect. They don't want people who will actually look at the facts rather than the emotion of the opening and closing arguments. The prosecution sure as hell doesn't want anybody who will look at whether a law should exist in the first place. "Hey, Doctor! Um, I have to serve on a jury. Can you take all my patients for the next six months while I'm locked in a hotel room? Oh, and I need to still get my full salary to pay my bills. Thanks, buddy." Um, no. So you basically wind up with juries which are stacked with welfare recipients, stupid people, and retirees. A jury of retirees may work, but the others surely don't. When the trial actually starts, the average juror, regardless of what council may tell them about due process, is usually biased in favor of the prosecution, especially if the government is claiming that the defendant is an evil child molestor. If it's a case involving technology, you get a bunch of bogus "experts" up there which say what council wants to be said, because real "experts" refuse to dumb down their testimony to a kindergarden level. "Mr. May, will you please explain -- in layman's terms -- exactly how the microchip fabrication process works?" "Well, we start with..." "I'm sorry to stop you, sir. Can you please explain to the jury -- in layman's terms -- what a transistor is?" "Well, in this context it often acts as a switch for an electronic circuit, but it can also--" "Would you please explain in layman's terms what a circuit is?" Argh. Can you imagine trying to be a defense expert in a cryptography case with a bunch of jurors who can barely read, are unemployed, hate "nerds," and beat the "geeks" up in high school, while the prosecution is constantly screaming that the defendant is a kiddy porn trader and you're expected to dumb your expert testimony down to kindergarden level? From mclow at owl.csusm.edu Wed Sep 23 06:06:17 1998 From: mclow at owl.csusm.edu (Marshall Clow) Date: Wed, 23 Sep 1998 21:06:17 +0800 Subject: Jury duty considered harmful, or at least rare In-Reply-To: <19980924015428.2767.qmail@hades.rpini.com> Message-ID: At 1:54 AM +0000 9/24/98, Anonymous wrote: >So you basically wind up with juries which are stacked with welfare >recipients, stupid people, and retirees. A jury of retirees may work, but >the others surely don't. > Actually, the last time that I was called, the largest proportion of potential jurors were people who work for the government in one form or another. City park workers, school teachers, post office workers, clerical workers who work at city hall, etc. Retirees were the next largest group. Between the two, they accounted for 80+ of the jury pool. -- Marshall Marshall Clow Adobe Systems "Yes, the president should resign. He has lied to the American people time and time again, and betrayed their trust. He is no longer an effective leader. Since he has admitted guilt, there is no reason to put the American people through an impeachment. He will serve absolutely no purpose in finishing out his term, the only possible solution is for the president to save some dignity and resign." -- William Jefferson Clinton speaking in 1974 about President Nixon and Watergate From jamesd at echeque.com Wed Sep 23 06:25:23 1998 From: jamesd at echeque.com (James A. Donald) Date: Wed, 23 Sep 1998 21:25:23 +0800 Subject: Jury duty considered harmful, or at least rare In-Reply-To: <3.0.5.32.19980922231122.00907100@idiom.com> Message-ID: <199809240225.TAA21955@proxy4.ba.best.com> -- At 12:09 AM 9/23/98 -0700, Tim May wrote: > Yet some of the apolitical numbskulls I know about have > served on several juries in the same time. The Poisson, as > expected, or something more human? I have often read allegations of manifest jury rigging, but from highly unreliable sources. If juries are routinely rigged, then we would expect a high number of repeats, particularly in politically sensitive cases such as taxes, drugs, or organized crime. We would expect a drug jury to be composed primarily of people who have been repeatedly called for a drug jury previously. If juries are rigged, it should be easy to check statistically. Simply compare the number of repeats at a jury call with the expected number of repeats. To rig a jury by excluding undesirables such as Tim May would be far too laborious. To rig a jury it would be necessary to include only desirables, thus the pool from which the jury is selected would be vastly smaller than the official pool, and simple statistics would show this up. --digsig James A. Donald 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG 36kfZmqoLcEiOYb2EmT85BRIwhd8rlU2mEbg9tAo 423cg9OMSTWTZb0pVq0EhzhtObK62XbWKkGvWVSHk ----------------------------------------------------- We have the right to defend ourselves and our property, because of the kind of animals that we are. True law derives from this right, not from the arbitrary power of the omnipotent state. http://www.jim.com/jamesd/����� James A. Donald From ravage at einstein.ssz.com Wed Sep 23 06:32:11 1998 From: ravage at einstein.ssz.com (Jim Choate) Date: Wed, 23 Sep 1998 21:32:11 +0800 Subject: Jury duty considered harmful, or at least rare (fwd) Message-ID: <199809240300.WAA13172@einstein.ssz.com> Forwarded message: > Date: Wed, 23 Sep 1998 19:12:01 -0700 > From: "James A. Donald" > Subject: Re: Jury duty considered harmful, or at least rare > To rig a jury by excluding undesirables such as Tim May would > be far too laborious. To rig a jury it would be necessary to Not in the days of computerized records it isn't. ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From apf2 at ctv.es Wed Sep 23 06:35:23 1998 From: apf2 at ctv.es (Albert P. Franco, II) Date: Wed, 23 Sep 1998 21:35:23 +0800 Subject: From Spyking: DNA Technology Message-ID: <3.0.3.32.19980925043213.006a2374@pop.ctv.es> >Date: Wed, 23 Sep 1998 09:26:47 -0400 >From: Sunder >5) From: "Timothy Robarts" >Subject: DNA Technology > >London 16/09/98 > >September 16 1998 > >Police Superintendents' Conference: Stewart Tendler on how science is catching >up with the criminal. > >Dr Sullivan, who worked on the identification of the remains of the last Tsar, >Nicholas II, said that the breakthrough in taking DNA samples from dandruff >would allow investigators to take material from the tiny particles of human >skin that are found at every scene. He said: "People are constantly shedding >skin cells. The majority of household dust is made up of dead skin and we know >we can get DNA from an individual skin cell." > If human skin cells comprise the majority of household dust, and dust can so easily move from place to place, then how will they defend against the claim that the suspect passed near by (five blocks away) six months ago and the dust must have slowly made it's way to the crime scene... Don't answer...I know...truth is not the objective, rather conviction of the target. Now they'll have the tools to do it. The same cop investigating your car this month could inadvertently (or not) deposit a few traces of your skin dust at the scene of a crime next month. They keep getting scarier all the time! Al Franco, II From ravage at einstein.ssz.com Wed Sep 23 06:48:46 1998 From: ravage at einstein.ssz.com (Jim Choate) Date: Wed, 23 Sep 1998 21:48:46 +0800 Subject: IP: Microgov't: Old Red Tape Looks Good in Comparison (fwd) Message-ID: <199809240317.WAA13306@einstein.ssz.com> Forwarded message: > Date: Wed, 23 Sep 1998 16:47:14 -0400 > From: Robert Hettinga > Subject: IP: Microgov't: Old Red Tape Looks Good in Comparison > Imagine that, instead of a Clean Air Act, with its endless rules > for sulfides and scrubbers, we just had a Clean Air Bill of > Rights: "No corporation or business establishment shall impose > an unfair, excessive or unreasonable burden of air pollution on > any person or group." ARTICLE IX. The enumeration of the Constitution, of certain rights, shall not be construed to deny or disparage others retained by the people. [other related material deleted for space] > Write down the finished rules, and make them clear > enough to comply with; That's what amendnments or for. > Don't give bureaucrats a financial stake in their > actions-for instance, don't let them pocket the fines > they levy, lest they turn regulation into a money-making > scheme; I believe there is already a clause that stipulates that *any* material taken for public use *must* be paid for. There is no latitude for how the person got it. > Microgovernment is micro in another sense: not only is it > radically decentralized, but it pokes its nose into everything, > and no corner of life is too small for it to reach. Its > mandate-attaining fairness in every personal > environment-acts as a little microlever, prying here and prying > there, opening one door after another to the onslaught of legal > process. ARTICLE X. The powers not delegated to the United States by the Constitution, nor prohibited by it to the States, are reserved to the States respectively, or to the people. ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From ravage at einstein.ssz.com Wed Sep 23 06:50:23 1998 From: ravage at einstein.ssz.com (Jim Choate) Date: Wed, 23 Sep 1998 21:50:23 +0800 Subject: From Spyking: DNA Technology (fwd) Message-ID: <199809240319.WAA13350@einstein.ssz.com> Forwarded message: > Date: Fri, 25 Sep 1998 04:32:13 +0200 > From: "Albert P. Franco, II" > Subject: From Spyking: DNA Technology > the target. Now they'll have the tools to do it. The same cop investigating > your car this month could inadvertently (or not) deposit a few traces of > your skin dust at the scene of a crime next month. They keep getting > scarier all the time! This is exactly why we won't see this become standard practice in the majority of cases, the expense of guaranteeing the evidence trail. ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From apf2 at ctv.es Wed Sep 23 06:53:49 1998 From: apf2 at ctv.es (Albert P. Franco, II) Date: Wed, 23 Sep 1998 21:53:49 +0800 Subject: Stego-empty hard drives... (fwd) Message-ID: <3.0.3.32.19980925045548.0069dbbc@pop.ctv.es> >From: Jim Choate >> From: "Albert P. Franco, II" > >> I can't imagine that anyone that wasn't already sure that you were playing >> tricks with the HD would be able to detect either of these on a normal >> startup. Again I think the key is that it would vastly expensive and very >> time consuming for customs services to make more than a cursory check. More >> and more people are carrying notebooks with them on trips and just like >> most bag searching has ended due to very fast, but not perfect, technology, >> notebook scanning is limited by the very important public factor--the >> people waiting in line behind you will tend to get very anxious. :) > >That's a rationale for doing TEMPEST scanning I hadn't thought of. Since it >is time consuming and takes special training (which means higher personel >budgets that don't amortise over time like hardware) to operate a floppy >scanner and interpet the results there are budget forces involved. > I snipped the rest, but your point ignores that they still have to scan my hard drive for what they are looking for. So TEMPEST on top of the other measures just makes things slower. Also the vast variety of computers and clock speeds on the market today would make a 30 byte (10-20 clock cycles ... )BIOS patch virtually undetectable. Again...UNLESS they want YOU in particular. I would be more concerned about a Unix-like OS on their disk-following THEM to bypass my BIOS to read the HD. Of course, perhaps another way around this may be to carry a couple copies of an NDA and an Acceptance of Liability for Damages Caused contract. Tell the stooge at the counter that your machine contains highly valuable commercial information and that if it's damaged in any way, shape or form he/she will be held personally liable. Offer the two documents for his/her signature as you explain that since the procedure they intend to use is so fool proof (the stooge is sure to quote the party line...) this would only strengthen your case that damage or discloser to/of contents must be a direct result of negligence or criminal intent on the part of the stooge. "If you can't dazzle 'em with brilliance, baffle 'em with bullshit." It works for Clinton! Al Franco, II From wombat at mcfeely.bsfs.org Wed Sep 23 08:48:20 1998 From: wombat at mcfeely.bsfs.org (Rabid Wombat) Date: Wed, 23 Sep 1998 23:48:20 +0800 Subject: Jury duty considered harmful, or at least rare In-Reply-To: <19980924015428.2767.qmail@hades.rpini.com> Message-ID: On 24 Sep 1998, Anonymous wrote: > On Wed, 23 Sep 1998, Tim May wrote: > > > > > At 11:11 PM -0700 9/22/98, Bill Stewart wrote: > > > > If they do have a list, I'd kind of like to be on it. I'm a college > student, and I _can't_ serve on a jury for more than a day or so. The same > goes for doctors, corporate executives, and others. > Yeah, right. I *never* blew off class to go to the beach. I never go to "meetings" on the golf course, either. Glad to hear the only people with important places to be are doctors, executives, and college students. > There is an inherent flaw in the jury system. You get summoned and are > legally required to blow the entire day down at the courthouse. If you're > a student you miss classes, and if you have a job you miss that too. You > have to pay for transportation, parking, food, and whatever else you need. > In return, you get paid something like $3, which often isn't even enough > to cover the parking and get told every five minutes that this or that > will get you, as a juror or potential juror, thrown in jail. It is a trade-off. If you aren't willing to put in your time, you can't complain when somebody else lets OJ off the hook. You can't whine if you are convicted by a bunch of people who were to stupid to get out of jury duty. > don't want people who can determine that the evidence of one side or the > other is suspect. They don't want people who will actually look at the > facts rather than the emotion of the opening and closing arguments. The > prosecution sure as hell doesn't want anybody who will look at whether a > law should exist in the first place. "They" refers to both sides. We have an adversarial system. Usualy one side or the other is willing to keep jurors who are interested in the facts. (OK, launch the court-appointed-public-defender rant here) One of my employees, a white/male/degreed/job holding/computer programmer was kicked out by the defense, not the prosecutor. > > "Hey, Doctor! Um, I have to serve on a jury. Can you take all my patients > for the next six months while I'm locked in a hotel room? Very few juries are sequestered. In cases where this is likely, jurors are often permitted to be excused if a lengthy trial is expected. This is a bullshit excuse for ducking jury duty. The longest anyone who works with or for me has been absent due to jury duty was three days. Oh, and I need > to still get my full salary to pay my bills. Thanks, buddy." Um, no. > The company I work for pays our salary while we are on jury duty. We have to turn over the $3 a day stipend. > When the trial actually starts, the average juror, regardless of what > council may tell them about due process, is usually biased in favor of the > prosecution, especially if the government is claiming that the defendant > is an evil child molestor. If it's a case involving technology, you get a > bunch of bogus "experts" up there which say what council wants to be said, > because real "experts" refuse to dumb down their testimony to a > kindergarden level. Most defendants are guilty. That doesn't mean the one in front of you is. Take traffic court as an example. How many defandants are there because they are innocent, and the cop was mistaken, didn't calibrate his radar, needed to fill his quota, etc.? A few. How many are there because they want a couple points knocked off the penalty, even theough they were speeding? Most of them. A guilty defendant is entitled to a fair trial. So is an innocent one. You don't help the process by ducking jury duty (or are you one of the stupid people?). > > "Mr. May, will you please explain -- in layman's terms -- exactly how the > microchip fabrication process works?" > The technobable seemed to work in favor of the defense, in the OJ case. People have come to understand and accept fingerprinting (although it was not accpeted initially). Many seem to be unwilling to trust DNA evidence, though. > > Can you imagine trying to be a defense expert in a cryptography case with > a bunch of jurors who can barely read, are unemployed, hate "nerds," and > beat the "geeks" up in high school, while the prosecution is constantly > screaming that the defendant is a kiddy porn trader and you're expected to > dumb your expert testimony down to kindergarden level? > One can always request a judge to hear the case. It isn't a perfect system, but what do you propose as an alternative? Should Tim May judge us all? Should we revert to anarchy, with whomever is left standing is considered innocent, and the dead are the guilty? -r.w. From mb2657b at enterprise.powerup.com.au Thu Sep 24 01:49:10 1998 From: mb2657b at enterprise.powerup.com.au (Scott Balson) Date: Thu, 24 Sep 1998 01:49:10 -0700 (PDT) Subject: Urgent - ABC coverage on One Nation Message-ID: <009801bde798$72c80bc0$f81c64cb@QU.fox.uq.net.ai> Dear One Nation supporter � Att 6.55pm the ABC will be carrying a 5 minute address by One Nation. � We apologise for the short time warning, but we have just been advised. � The One Nation Health Policy released today is now on line at: � http://www.gwb.com.au/onenation/policy/health.html � GWB � � � Scott Balson Pauline Hanson's One Nation Web Master From vznuri at netcom.com Wed Sep 23 11:29:30 1998 From: vznuri at netcom.com (Vladimir Z. Nuri) Date: Thu, 24 Sep 1998 02:29:30 +0800 Subject: IP: Biometric Signature for "Forms w/o Paper" Message-ID: <199809240731.AAA25696@netcom13.netcom.com> From: believer at telepath.com Subject: IP: Biometric Signature for "Forms w/o Paper" Date: Wed, 23 Sep 1998 08:32:25 -0500 To: believer at telepath.com Source: PR Newswire http://www.prnewswire.com Doxis, Inc. Announces Forms Without Paper Version 2.1 Computerized Data/Document Input And Storage System New Release Lets Pharmaceutical Workers Input Process and Analytical Forms/Data Into Secure Document Databases, With Improved Document Authoring Features and Capabilities. Communicates With Key Enterprise Systems. Visit Doxis at WorldPharm '98 Booth #1033 NORWOOD, MA Sept. 22 /PRNewswire/ -- Lewis Bell, President and Chief Executive Officer of Doxis, Inc., Norwood, MA, a pioneer and leader in the development of mobile computer-based forms management software systems, announced today, at WorldPharm '98, the latest version of Forms Without Paper(TM) -- Version 2.1. Doxis developed and markets Forms Without Paper -- the first software package that allows mobile pharmaceutical workers to input critical, real-time batch process, research and analytical forms and data -- with biometric signatures -- directly and interactively into a secure document database. The original data is locked into the form, the electronic equivalent of the original paper copy. However, data can also be made available to enterprise databases without retranscription, and without altering the original form. Forms Without Paper is a client server software toolset that provides data for trend analysis, and can be customized to interface to standards compliant MES (Manufacturing Execution Systems), LIMS (Laboratory Information Management Systems), and ERP (Enterprise Resource Planning) systems. Lewis Bell, Doxis, Inc., President and CEO, said, "Forms Without Paper Version 2.1 features a more advanced and flexible document authoring architecture designed to better facilitate and speed the process of changing and revalidating forms. This is a major breakthrough in computerized data/document input and storage, and provides tremendous advantages to pharmaceutical manufacturers who wish to use electronic records." Forms Without Paper Version 2.1 provides a superior vehicle for the collection of handwritten forms and data by mobile workers. It bridges gaps between the capture of handwritten, signed documents and data collection in highly regulated industries such as pharmaceutical and HBA manufacturing. These industries now have the ability to automate the capture of these documents and data at the point of work. They can also share it over worldwide enterprise systems, with their document management systems, and with other systems, including MES and LIMS. According to Bell, using Forms Without Paper Version 2.1, pharmaceutical companies now have a way to computerize both their existing paper-based batch records and laboratory data sheets that is based upon their current paradigm, and, therefore, is intuitive, non-disruptive to their operations, and painless to implement by industry standards. The software enforces version control and increased accuracy of data collection. It automatically verifies data integrity and applied tolerances per field. It proactively enforces compliance with SOP's, and provides a patented audit trail for changes. The orms Without Paper client runs on a pen-based terminal operating under Windows 95(R)/98(R) -- the equivalent of an electronic clipboard. The hand held unit communicates with the server via wireless LAN. The new release will be available in the first quarter of 1999 to pharmaceutical and consumer product manufacturers subject to FDA regulation. Bell is quick to point out that the new system does not obsolete existing forms processes, but rather automates them, making them more efficient and secure, and less error prone. "Many companies do not want to reinvent the wheel when it comes to processing the forms they use throughout their operations," Bell states. "However, they do want a better way to ensure the accuracy and timeliness of their forms. They want to control their forms throughout their life cycles, as the valuable corporate assets they are." Using Forms Without Paper, a worker now enters the data onto the electronic clipboard using a pen, just as he or she would when using a paper form. The layout of the form is the same as the paper version, and workers can also print out the paper form if they need to. As it is collected, information is date and time stamped, operator identified, and secured within the intelligent form to provide a cGMP compliant audit trail that will include all information captured in association with the data. Digital signatures that are captured are non-excisable, and can also be verified to authenticate the entry, if desired. Completed forms are stored in a Secure Document Database. Once transferred to the user's network, information is available to backend ODBC databases, desktop applications, and ODMA standards compliant document management software. Forms Without Paper can also be used as a front end to enterprise packages such as SAP(R) and BPCS(R), allowing pharmaceutical companies to extend the reach of these applications to mobile workers. Training on the system is available, as well as consultation and professional services, including validation services. Distribution, product support, consultation and professional services will be handled through the Doxis direct sales channel. Forms Without Paper(TM) and Doxis are registered trademarks of Doxis, Inc. All other companies and products mentioned are trademarks of their respective companies. SOURCE Doxis, Inc. �1998 PR Newswire ----------------------- NOTE: In accordance with Title 17 U.S.C. section 107, this material is distributed without profit or payment to those who have expressed a prior interest in receiving this information for non-profit research and educational purposes only. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml ----------------------- ********************************************** To subscribe or unsubscribe, email: majordomo at majordomo.pobox.com with the message: (un)subscribe ignition-point email at address ********************************************** www.telepath.com/believer ********************************************** From vznuri at netcom.com Wed Sep 23 11:29:32 1998 From: vznuri at netcom.com (Vladimir Z. Nuri) Date: Thu, 24 Sep 1998 02:29:32 +0800 Subject: IP: Privacy: FTC Losing Patience w/Business Message-ID: <199809240731.AAA25674@netcom13.netcom.com> From: believer at telepath.com Subject: IP: Privacy: FTC Losing Patience w/Business Date: Wed, 23 Sep 1998 07:33:09 -0500 To: believer at telepath.com Source: New York Times http://www.nytimes.com/library/tech/98/09/biztech/articles/21privacy.html September 21, 1998 F.T.C. 'Losing Patience' With Business on Web Privacy By JOEL BRINKLEY WASHINGTON -- After more than a year of heated debate within the government, the Federal Trade Commission has all but decided that it is going to part company with the Clinton administration over the contention that business can regulate itself when it comes to Internet privacy. "We are losing patience with self-regulation," David Medine, an associate director in the commission's Bureau of Consumer Protection, said in an interview, reflecting the larger agency opinion on this issue. "It's too bad, but I think industry has lost the opportunity to show that they will do it on their own." What was the last straw? Within the F.T.C., they called it "the Big Surf." >From all corners of the agency's headquarters in the spring, dozens of lawyers trooped to special training rooms equipped with personal computers and high-speed Internet connections. And for two weeks, they spent their days trolling the World Wide Web, searching for privacy problems. Their intention was to find Web sites that collected personal information from visitors but neglected to post any notice about how that information would be used. The presumption was that many of the companies sold the information -- some of it highly personal data on health, income and personal preferences -- to Internet-list brokers, merchants and advertisers. The "surfers" had no idea what they would find; no one had ever dedicated the time and manpower needed for this sort of targeted survey of the vast, tangled, largely unfathomable network that is the World Wide Web. But the Big Surf produced startling results published in a report this summer. More than 90 percent of the roughly 1,400 sites examined collected personal information from visitors, but only 14 percent of them disclosed how that information would be used, convincing the F.T.C. that formal regulation would probably be necessary. For more than a year, the Clinton White House had been saying that businesses using the Internet should be allowed to regulate themselves. "If there's ever an arena that should be market driven, this is it," Ira Magaziner, President Clinton's adviser on Internet issues, said as the White House announced its Internet policy last year. But while the White House was formulating this strategy, a few blocks away at the F.T.C. -- an independent federal agency not beholden to the administration -- agency officials were conducting hearings and workshops on Internet privacy, listening to complaints from members of Congress and interest groups. They were also installing up-to-date computer equipment so the agency could carry out the Big Surf and add the Internet to the list of business arenas subject to F.T.C. scrutiny and enforcement. Now, with results from the Big Surf and the industry's reaction to it in hand, several senior F.T.C. officials said, the agency will give industry just a few more months to respond to the recommendations in its report by demonstrating that it is effectively regulating itself. Medine said he would expect the industry to conduct a survey like the Big Surf and hand over the results. If, as most commission officials expect, industry does not provide such proof, the F.T.C. will draft a bill calling for clear Internet privacy standards and ask Congress to pass it. As an independent agency, the commission does not have to get permission from the Clinton administration to do this. And, given Congress' repeated statements of concern about Internet privacy, a bill would probably get the votes needed to pass. "It's not our intention to over-regulate," said Jodie Bernstein, director of the agency's consumer protection bureau. "We don't want to chill new technologies." But, she added, Web sites must begin "telling consumers if they are collecting personal information, what they are going to do with it and how the consumers can get out of it, if they want to." Generally, that means posting a privacy statement that answers these questions. But since the results of the Big Surf were published in June, commission lawyers have begun to believe that some Web sites are actually choosing not to post privacy statements. "There's now a perverse, reverse incentive," said Ori Lev, an F.T.C. official involved in Internet enforcement. "If you don't post a privacy policy, we can't go after you." That became clear last month, after the commission reached a settlement with Geocities, a popular site on the World Wide Web that the commission had accused of lying to its 2 million subscribers. The site offered a privacy statement that promised not to give out personal information collected during registration without permission. But the commission found that Geocities was selling the information anyway. That supposed deception was the basis for the government's case. If Geocities had not promised to keep the information private, then it would probably not have run afoul of the F.T.C.. As a result, Medine said, "clearly there are a lot of corporate lawyers advising their Web clients not to do anything now" -- not to post a privacy statement or anything else. Connie LaMotta, a senior vice president with the Direct Marketing Association, calls that idea nonsense. "It's a very bureaucratic way of thinking," she said. "It's upside down. Businesses want to post privacy statements to establish good customer relationships and customer service. Industry is stepping up to the plate on this." Ms. LaMotta said she and others in the industry agreed with the F.T.C.'s stated Internet privacy goals. But Ms. LaMotta added that she was certain that businesses could accomplish the task on their own. "It's our experience that, when you tap them on the shoulder, change happens. They say: 'Oh, gosh. OK."' With just a few minutes' effort, most anyone can find a Web site that collects personal information from visitors, in registration or order forms, without disclosing how that information will be used. But how those sites respond when asked about this can differ markedly. A site called Soccer Patch (www.soccerpatch.com) is a trading post for soccer-playing children who want to trade team patches. It lists the names, e-mail addresses and in some cases the hometowns of children who want to trade patches. That is a red flag for F.T.C. enforcers. They worry that child molesters can use the information to find victims. As soon as a reporter asked Philip Rubin, president of Edge of Chaos, the company that manages the site, about this, he immediately promised to change the policy. And a few days later, he did. "We now require all contributors to provide us with signed permission letters before e-mail addresses/and or names can be posted," he said. "Contributors under the age of 18 must provide a form signed by their parents or guardians." And the Soccer Patch site posted the form so that it can be printed out and mailed. Rosenthal Honda, a Washington area car dealer, had a different approach. The company, like many car dealers, posts a pre-qualification form for auto loans, requesting a variety of personal information, including income, debt load and the amount of rent or mortgage payments. Nowhere on the site does the company say how that information will be used. And when asked about that, the company issued a statement saying, "We will look at the issue with our Web developer." Asked two weeks later what had come of this, Rosenthal Honda did not respond. F.T.C. officials say they are investigating other Web sites and will almost certainly file charges against other companies, as the agency did with Geocities. Dean Forbes, 31, an F.T.C. lawyer, found the Geocities problem and spends most of his time working on Internet privacy issues. "Generally we get ideas from reading the trade press," he said, as well as from "looking at who is linking up with list brokers; we get tips from interest groups, usenet news group postings -- and complaints." Forbes, for one, disagrees with the idea that a Web site can escape trouble if it simply decides not to post a privacy policy. "If you don't make a visible statement," he said, "that does not mean there isn't an implied claim." But while his agency and the rest of the government figure out whether to push for new rules on Web privacy, Forbes sees a bit of improvement on the Web. "I'm not saying everything's great," he said. "But there is movement." Copyright 1998 The New York Times Company ----------------------- NOTE: In accordance with Title 17 U.S.C. section 107, this material is distributed without profit or payment to those who have expressed a prior interest in receiving this information for non-profit research and educational purposes only. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml ----------------------- ********************************************** To subscribe or unsubscribe, email: majordomo at majordomo.pobox.com with the message: (un)subscribe ignition-point email at address ********************************************** www.telepath.com/believer ********************************************** From vznuri at netcom.com Wed Sep 23 11:29:34 1998 From: vznuri at netcom.com (Vladimir Z. Nuri) Date: Thu, 24 Sep 1998 02:29:34 +0800 Subject: IP: Fwd: SHOWDOWN AT THE FCC (Microbroadcasting) Message-ID: <199809240731.AAA25707@netcom13.netcom.com> From: Bridget973 at aol.com Subject: IP: Fwd: SHOWDOWN AT THE FCC (Microbroadcasting) Date: Wed, 23 Sep 1998 21:50:00 EDT To: ignition-point at majordomo.pobox.com Date: Tue, 22 Sep 1998 23:42:07 -0400 (EDT) From: Sara Zia-Ebrahimi To: chatski at gl.umbc.edu please forward to anyone you know who would be interested UPDATE!!!! SHOWDOWN AT THE FCC!!! FREE RADIO ACTIVISTS MARCH ON WASHINGTON TO CONFRONT THE GLOBAL MEDIA MONOPOLY AND THEIR MARIONNETTES IN GOVERNMENT! Sunday October 4th and Monday October 5th Calling all media activists, radio pirates, people for a democratic media and people just fed up with crappy corporate radio: Come to DC for the first national mobilization for free radio. Microbroadcasters from around the country will gather for two days to share radio skills, organize alliances, speak out to the media and protest at the FCC and NAB buildings, culminating in a live broadcast straight into the offices of the people working so hard to shut us down. Free Radio Berkeley, Radio Mutiny, Steal This Radio and other microstations have all broadcasted live in public and challenged the FCC to shut them down in the light of day, in front of the press and the Feds have never dared to show their face- this time, we're going to take it right to their doorstep and tell them that if they're so sure that their dumb law is worth enforcing, then the Chairman should come down from the 8th floor and put the cuffs on us himself. There will also be workshops to help new folks start stations, appointments will be made to lobby congress people, and press events will be held to show the true, diverse face of the microbroadcasting movement. Schedule Sunday, Latin American Youth Center: @1419 Columbia Rd. NW DC 10am-12pm: *Everything you need to start a community station besides a transmitter: facilitated by Joan and Eli of Free Radio Memphis *The FCC petitions: What's in it for us?: facilitated by Benn Kobb, Stuart Poritzky and Bill Spry *The current legal situation: facilitated by Alan Korn of the Committee for Democratic Communications, Scott Bullock from the Institute for Justice 12-1 lunch 1-3pm: *Transmitters 101: facilitated by Bill Gorz *Starting a legal application to position for another First Amendment case: facilitated by Pete triDish and Alan Korn *The threat of media concentration to democracy: facilitated by Greg Ruggiero from Steal this Radio 3-5 pm: *Transmitters 202: facilitated by *Commercial vs. non-commercial micro-stations: facilitated by Alan Korn *Publicity: Tips on talking to the press and lobbying for support: Jesse Walker of the Competitive Enterprise Institute and Diane Imelda Fleming 5-6:30 dinner @La Casa 3166 Mt. Pleasant St. NW DC 7pm party/puppet making for demonstration @La Casa Monday 9 am Panel and Debate at the Freedom Forum: an event which will probably be broadcast on NPR featuring micro-broadcasters, lawyers and FCC offcials head-to-head From vznuri at netcom.com Wed Sep 23 11:29:36 1998 From: vznuri at netcom.com (Vladimir Z. Nuri) Date: Thu, 24 Sep 1998 02:29:36 +0800 Subject: IP: Biometric Security Showcased at Int'l Conference Message-ID: <199809240731.AAA25685@netcom13.netcom.com> From: believer at telepath.com Subject: IP: Biometric Security Showcased at Int'l Conference Date: Wed, 23 Sep 1998 08:28:26 -0500 To: believer at telepath.com Source: PR Newswire http://www.prnewswire.com SAFLINK and Unisys to Showcase Biometric Security Solutions for Banking at World Wide Users Conference TAMPA, Fla., Sept. 22 /PRNewswire/ -- SAFLINK Corporation (Nasdaq: NRID), a leader in the implementation of biometric technology in the financial industry, will be participating in Unisys Corporation's second annual FBA Navigator Users Conference, October 4 - 7 in Puerto Rico.The conference provides an opportunity for users, and prospective users, of Unisys FBA Navigator retail delivery suite to discuss trends and issues in the banking industry, learn about Unisys product plans, provide feedback to Unisys, and meet with peer users from around the world. Targeted at bank marketing and delivery channel executives, and at senior technical professionals, the conference theme is "Multiple Channels One Solution."Presentations and interactive business sessions focus on one of the most critical issues facing bankers today: how to maintain a consistently high level of customer service while securely delivering products and services through a variety of channels.Among the delivery channels the conference will address are the branch, the call center, the Internet and mobile banking. Conference highlights include: -An on-site tour of Westernbank, a Unisys FBA Navigator client and a SAFLINK finger imaging client.The tour will highlight the recently installed Unisys retail branch solution, which includes finger imaging hardware and software from SAFLINK.Attendees will also receive a private demonstration of the solution and will have an opportunity to address questions to Westernbank, Unisys and Unisys business partners, including SAFLINK, Microsoft Corporation and Genesys Corporation, during a panel discussion following the site visit. -A keynote address by Dr. James B. Moore, Ph. D., President and CEO of highly respected Mentis Corporation, a leading financial services research firm.Mentis recently published a research report on biometric technology entitled 'Beyond the PIN: Evolving Strategies and Implementations of Biometrics-Based Recognition for Financial Services,' which included an overview of SAFLINK's kiosk installation at Purdue Employees Federal Credit Union.(Further information about Mentis is available through the company's web site at http://www.mentis.com.) -A thought-provoking slate of business and technical sessions designed to address the benefits of a multi-channel strategy, and to highlight various implementation considerations and approaches. -A dinner in Mayaguez, sponsored by Unisys, SAFLINK, Microsoft and Genesys, with a special "Welcome to Puerto Rico" address by Frank C. Stipes, President of Westernbank. SAFLINK, a Unisys Marketing Associate business partner, has worked with Unisys to seamlessly integrate biometric technology with the highly regarded Unisys FBA Navigator retail delivery solution.Capabilities developed with Unisys include customer identification, and teller/supervisor log-on and transaction approvals."Our partners add key capabilities to the FBA Navigator solution, to the ultimate benefit of our customers" said Judy Jones, Unisys FBA Navigator Program Director."We are very excited about our partnership with SAFLINK, which enables us to offer our retail delivery clients leading-edge biometric authentication." Westernbank is the first Unisys customer to install the integrated FBA Navigator/SAFLINK solution."We cannot say enough good things about how well this partnership has worked" said Israel Lorenzana, Unisys Account Executive, for Westernbank Puerto Rico."SAFLINK's expertise in integrating biometrics, along with the outstanding support from their technical staff, helped the development and integration effort move quickly.Their willingness to participate in every aspect of the project, including areas such as user training and helping the bank develop informative customer brochures, also contributed to the success of this installation.They are key players in the Westernbank/Unisys team." About SAFLINK SAFLINK Corporation, a National Registry Inc. subsidiary based in Tampa, Florida, brings the Power of Biometric Identificationa to enterprise networks and the Internet.The Company provides cost-effective multi-biometric software solutions to verify individual identity, to protect business and personal information, and to replace passwords and PINs in order to safeguard and simplify access to electronic systems and enable new online services for customers.The Company's Secure Authentication Facility (SAF(TM)) suite of multi-biometric network security products delivers enterprise-level secure access control to a range of software platforms and network applications, including Microsoft(R) Windows NT(R) and Internet Information Server(R). Further information is available through the Company's World Wide Web Site (http://www.saflink.com). About Unisys Unisys is an information technology solutions provider that has a portfolio of information services, technologies and third-party alliances needed to help clients capitalize on their information asset to enhance their competitiveness and responsiveness to customers. Unisys expertise is founded on the strengths of three global businesses: Information Services, providing consulting, application solutions, systems integration and outsourcing; Computer Systems, providing industry-leading technologies; and Global CustomerServices, delivering comprehensive services and products supporting distributed computing environments. Access the Unisys home page on the World Wide Web -- http://www.unisys.com -- for further information. SOURCE SAFLINK Corporation Web Site: http://www.mentis.com �1998 PR Newswire. ----------------------- NOTE: In accordance with Title 17 U.S.C. section 107, this material is distributed without profit or payment to those who have expressed a prior interest in receiving this information for non-profit research and educational purposes only. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml ----------------------- ********************************************** To subscribe or unsubscribe, email: majordomo at majordomo.pobox.com with the message: (un)subscribe ignition-point email at address ********************************************** www.telepath.com/believer ********************************************** From stuffed at stuffed.net Thu Sep 24 04:03:23 1998 From: stuffed at stuffed.net (STUFFED NEWS DAILY) Date: Thu, 24 Sep 1998 04:03:23 -0700 (PDT) Subject: TODAY'S NEWS AND PICS PACKED STUFFED! - READ IT NOW! Message-ID: <19980924071000.4990.qmail@eureka.abc-web.com> + THE ESSENTIALS OF SEDUCTION + CELEBRATE SEX + BUTTNAKED FROLIC + THE BEST OF EUREKA + PLENTY OF SEX ON THE NET + PUSSY FLAVORED CANDY + SEX OLYMPICS + HAUNTING NUDDY PICS ----> http://stuffed.net/98/9/24/ <---- Welcome to today's issue of Stuffed. To read it you should click on the URL above. If it is not made clickable by your email program you will need to use your mouse to highlight the URL, copy it and then paste it into your browser (then press Return). This email is never sent unsolicited. Stuffed is the supplement for the Eureka newsletter you subscribed to. Full instructions on unsubscribing are in every issue of Eureka! ----> http://stuffed.net/98/9/24/ <---- From rah at shipwright.com Wed Sep 23 15:37:26 1998 From: rah at shipwright.com (Robert Hettinga) Date: Thu, 24 Sep 1998 06:37:26 +0800 Subject: Jury duty considered harmful, or at least rare In-Reply-To: <19980924015428.2767.qmail@hades.rpini.com> Message-ID: At 9:54 PM -0400 on 9/23/98, Anonymous wrote: > That is almost enough to make the more paranoid among us think that maybe > they have a "do not summon" list. What Fun! Just today, I got a summons for jury duty... Is there a "do not summon" list? Synchronistic minds want to know. Frankly, I wonder if most people who vote aren't just moving all the time. I've lived in the same place 11 years, and my Jury summons comes every three years, just like clockwork. Cheers, Bob Hettinga ----------------- Robert A. Hettinga Philodox Financial Technology Evangelism 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From ravage at einstein.ssz.com Wed Sep 23 16:15:21 1998 From: ravage at einstein.ssz.com (Jim Choate) Date: Thu, 24 Sep 1998 07:15:21 +0800 Subject: Smoke a spammers phone bill...try it, it's their quarter Message-ID: <199809241244.HAA14249@einstein.ssz.com> Forwarded message: > From: mmanning68 at hotmail.com > Date: Thu, 24 Sep 1998 02:30:55 -0700 (PDT) > Subject: Did you receive my last message? > It is finally here............... > Your own bulk friendly ISP! > And we are giving them away for FREE! > ************************************************** > To proof it, we are willing to give you, your > own e-mail account for the next 30 days for FREE! > See yourself - The earning potential is enormous! > *************************************************** > so please mention access 474- E for this > special offer. Call today! 1.800.600.0343 ext 2669 > and we will give you all the details. Enjoy! ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From petro at playboy.com Wed Sep 23 18:59:11 1998 From: petro at playboy.com (Petro) Date: Thu, 24 Sep 1998 09:59:11 +0800 Subject: Jury duty considered harmful, or at least rare In-Reply-To: Message-ID: At 9:12 PM -0500 9/23/98, James A. Donald wrote: > >To rig a jury by excluding undesirables such as Tim May would >be far too laborious. To rig a jury it would be necessary to No, no, On the contrary, far too easy. There are certain people who are NEVER called to jury duty, people convicted of felonies & etc. simply put the name of an undesirable on this list, don't release it as a _list_ of "criminals", and no one will complain. After all, who complains about _not_ being called? Then, as you screen jurors who have recieved summons, you simply add the most extreme to the list. Others aren't a problem because they show up, and are dismissed. It's hard to do all at once, but they have all the time in the world. >include only desirables, thus the pool from which the jury is >selected would be vastly smaller than the official pool, and >simple statistics would show this up. If anyone were to look. Security thru obscurity works until someone looks at it. If no one thinks to look tho... -- petro at playboy.com----for work related issues. I don't speak for Playboy. petro at bounty.org-----for everthing else. They wouldn't like that. They REALLY Economic speech IS political speech. wouldn't like that. From sunder at brainlink.com Wed Sep 23 19:31:11 1998 From: sunder at brainlink.com (Sunder) Date: Thu, 24 Sep 1998 10:31:11 +0800 Subject: Jury duty considered harmful, or at least rare In-Reply-To: Message-ID: <360A650D.9F535A71@brainlink.com> Petro wrote: > There are certain people who are NEVER called to jury duty, people > convicted of felonies & etc. simply put the name of an undesirable on this > list, don't release it as a _list_ of "criminals", and no one will > complain. After all, who complains about _not_ being called? Why the FUCK not, it is supposed to be a jurry of your PEERS. If you've already been convicted of a felony, a fellow felon is your peer. :^) -- =====================================Kaos=Keraunos=Kybernetos============== .+.^.+.| Sunder |Prying open my 3rd eye. So good to see |./|\. ..\|/..|sunder at sundernet.com|you once again. I thought you were |/\|/\ <--*-->| ------------------ |hiding, and you thought that I had run |\/|\/ ../|\..| "A toast to Odin, |away chasing the tail of dogma. I opened|.\|/. .+.v.+.|God of screwdrivers"|my eye and there we were.... |..... ======================= http://www.sundernet.com ========================== From mmotyka at lsil.com Wed Sep 23 20:46:42 1998 From: mmotyka at lsil.com (Michael Motyka) Date: Thu, 24 Sep 1998 11:46:42 +0800 Subject: Additional drive/stego/tempest/customs NOIZE Message-ID: <360A77DD.575E@lsil.com> Dear Sir, Sunder Wrote: > You seem to think these guys are actually super spies, not clueless > overpaid (for their level of skills) bored burrowcrats working on an > assembly line. You're over estimating their abilities by at least > four orders of magnitude there. > Through the *magic* of taxation and government contracts the opponents you are so casually dismissing as dull-witted drones are your peers. So unless you really are smarter than everyone else I would say that your above statement is rash. If the motivation to snoop is strong enough the resources will be put into place by the current crop of ground-dwelling representatives and any imaginable technology could be applied to the *problem*. I doubt in this case, at this time, that the motivation is enough to pay for a database of EMI analyses of PC bootups. Mike I found this one interesting: http://www.jya.com/fbi-en7898.htm Our elected representatives probably believe this official-looking analysis more than they do mere citizen's opinions. I have LOTS of copper materials. I have a source for conductive paints. Could you suggest a good source for ferrites in powder and tile form? All this to insure my privacy whilst I compute in my own house! The snoopers have, by their very existence, a chilling effect on speech. From rah at shipwright.com Wed Sep 23 21:21:08 1998 From: rah at shipwright.com (Robert Hettinga) Date: Thu, 24 Sep 1998 12:21:08 +0800 Subject: hurricanes and digital commerce and financial cryptography Message-ID: --- begin forwarded text X-Sender: rodney at module-one.tillerman.nu Date: Thu, 24 Sep 1998 07:32:20 -0400 To: dcsb at ai.mit.edu From: Rodney Thayer Subject: hurricanes and digital commerce and financial cryptography Mime-Version: 1.0 Sender: bounce-dcsb at ai.mit.edu Precedence: bulk Reply-To: Rodney Thayer Status: U Ok, Anguilla has had it's liter of rainwater worth of fame from this damn hurricane. Time for South Florida. So, ahem,... It's Thursday and there's a hurricane coming. There's plenty of beer in the starboard refrigerator and plenty of frozen White Castle hamburgers in the port refrigerator. The gas generator is all set to keep the server and the notebook PC battery chargers running. The local badly run telephone monopoly claims it can keep the telephone network up, we'll see if they are telling the truth when there's a foot of water on the road. In spit of the crypto-refugee claims, there's plenty of crypto work here, and this 'offshore' location is only about 100 feet from the mainland so it's not actually exporting code when I drive back to the office from the local computer store with the PC in my car. Here's my commerce question. How often do people expect to cycle private keys from PKI systems? I mean, suppose you have a web server, or an IPSec router, or some related device. I would assume you'd actually generate a new key pair every time you get a new certificate. So, for example, if you get a new certificate every six months for a web server, you would use a new private key. It turns out there is some debate over this. Some people assume the private key lives essentially forever, and that you'd simply get a new certificate against the same old key pair. I myself think this is rock stupid because one of the threat models is that the private key gets stolen, and the longer it's used the longer it's stealable. This relates to hurricanes. If you know any IPSec-aware routers, or any secure web servers, or any other PKI-based devices, and they are in the Florida Keys, you had better assume they'll need new key pairs as of some time Sunday. You see, unless I've missed the "waterproofing" requirements in FIPS 140 (the government security hardware standard), then those boxes will all be under water and will require replacement. So any of these PKI Service Provider models that assume the private key is immortal are about to be proven wrong. And there better be something in your revocation procedure for "the private key was destroyed by an act of nature". Look that up in your CPS and your Digital Signature legislation. But I need to go prepare, it's supposed to start getting exciting here in Clearwater, some time today. [I pass the torch to some DCSB subscriber in the New Orleans area...] -------- Rodney Thayer "layer of sand separate transmitted and received packets". (with apologies to Keith Law son.) For help on using this list (especially unsubscribing), send a message to "dcsb-request at ai.mit.edu" with one line of text: "help". --- end forwarded text ----------------- Robert A. Hettinga Philodox Financial Technology Evangelism 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From rah at shipwright.com Wed Sep 23 21:24:25 1998 From: rah at shipwright.com (Robert Hettinga) Date: Thu, 24 Sep 1998 12:24:25 +0800 Subject: NRO goes COTS: "Born Secret" ain't what it used to be... Message-ID: --- begin forwarded text Delivered-To: ignition-point at majordomo.pobox.com Date: Thu, 24 Sep 1998 01:52:01 -0400 From: Richard Sampson Organization: Unknown Organization MIME-Version: 1.0 To: "ignition-point at majordomo.pobox.com" Subject: IP: NRO TO LAUNCH SATELLITE TO EXPLORE TECHNOLOGIES By Frank Wolfe Sender: owner-ignition-point at majordomo.pobox.com Precedence: list Reply-To: Richard Sampson Status: U NRO TO LAUNCH SATELLITE TO EXPLORE TECHNOLOGIES By Frank Wolfe Sep. 23, 1998 (DEFENSE DAILY, Vol. 200, No. 24 via COMTEX) -- CHANTILLY, Va.-The National Reconnaissance Office (NRO) plans to launch the Space Technology Experiment (STEX) satellite Oct. 1 at Vandenberg AFB, Calif., to test and validate 29 new technologies. "The NRO recognizes the national need and challenges of providing future overhead collection systems with good performance at reduced cost, so we're aggressively pursuing technology options," John Schaub, the STEX program director, told reporters yesterday at NRO headquarters here. The STEX satellite is the first the NRO has announced prior to launch, officials said. With the end of the Cold War and the shrinking defense budget, NRO now believes it needs to justify its programs in a more open forum, officials said. Launched aboard an Orbital Sciences Corp. [ORB] Taurus launch vehicle, STEX is designed to explore new commercial-off-the-shelf (COTS) technologies to enhance future space missions, like overhead collection, at a lower cost. The 1,540-pound satellite is designed to last two years in space. The STEX program began three years ago when NRO partnered with Lockheed Martin [LMT] in Colorado, the Naval Research Laboratory and the Air Force Research Laboratory. The cost of the satellite--its booster, launch costs and ground support--is less than $90 million, the NRO said. "Keeping the schedule short was a key contributor to keeping the total costs low," Schaub said. "It's significantly cheaper." NRO director Keith Hall has said he wants to increase NRO's research and development efforts from 8 percent to 10 percent of the agency's total budget and STEX is part of that plan (Defense Daily, May 26). STEX is the first in a series of low-cost demonstrations by the NRO's Advanced Systems and Technology Directorate. The technologies to be tested aboard STEX include an Electric Propulsion Demonstration Module using a Russian-built engine, a 51- gigabit solid state data recorder (the world's largest), multifunction solar cells, high-density nickel-hydrogen batteries and an Advanced Tether Experiment, Schaub said. The NRO hopes the Advanced Tether Experiment, which is to use four miles of Spectra 1000-reinforced tether deployed from the satellite, will boost the agency's knowledge about how to do such things as raising and lowering spacecraft by tethers and how to increase the survivability of tethered space systems. "The program has really managed in a streamlined way. We've used commercial practices attempting to speed the development of low cost next generation spacecraft. It's the NRO's version of better, faster, cheaper," Schaub said. -0- Copyright Phillips Publishing, Inc. News provided by COMTEX. [!BUSINESS] [!HIGHTECH] [!INFOTECH] [!PUBLIC+COMPANIES] [!WALL+STREET] [AIR+FORCE] [BUDGET] [COLORADO] [NEWS] [NEWSGRID] [NICKEL] [PHL] [POUND] [RESEARCH] [TECHNOLOGY] [WAR] -- ----------------------- NOTE: In accordance with Title 17 U.S.C. section 107, this material is distributed without profit or payment to those who have expressed a prior interest in receiving this information for non-profit research and educational purposes only. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml ----------------------- ********************************************** To subscribe or unsubscribe, email: majordomo at majordomo.pobox.com with the message: (un)subscribe ignition-point email at address ********************************************** www.telepath.com/believer ********************************************** --- end forwarded text ----------------- Robert A. Hettinga Philodox Financial Technology Evangelism 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From gina.lombartti at usa.net Wed Sep 23 22:05:55 1998 From: gina.lombartti at usa.net (gina.lombartti at usa.net) Date: Thu, 24 Sep 1998 13:05:55 +0800 Subject: Hello from Hamburg, Message-ID: <199809241801.NAA20389@galaxy.galstar.com> The Matchmaker, Agenzia di Matrimonio Biuro Matrymonialne Die Partnersuche I'm Gina from Milano, Italia and I help Singles from all over the world who are seeking for someone SPECIAL, a Romance, a new Friendship or Relationship. Just simply send me an e-mail and tell me little about yourself. Regards, Gina Lo'mbartti Ginna Agenzia di Matrimonio Via Galvani 12 20124 Milano Italia gina.lombartti at usa.net From nobody at replay.com Wed Sep 23 22:52:45 1998 From: nobody at replay.com (Anonymous) Date: Thu, 24 Sep 1998 13:52:45 +0800 Subject: No Subject Message-ID: <199809241854.UAA27801@replay.com> Just heard a tape of one of his radio appearences from Aug 1998. I'm not a huge fan of country/filk music, but CJ is actually quite good. He apparently wants a "Silly Horses In Trees" song on it to be passed along to cypherpunks... --Declan From hedges at infopeace.com Wed Sep 23 23:03:41 1998 From: hedges at infopeace.com (Mark Hedges) Date: Thu, 24 Sep 1998 14:03:41 +0800 Subject: Greenspan Farts, Market Tumbles Message-ID: Greenspan Farts, Market Tumbles NEW YORK (AP) -- American stock markets nose-dived today immediately after a press conference at the Federal Reserve Bank, when Alan Greenspan, Fed Chairman, passed gas in an audible expulsion of flatulence. Investors, spooked by the ominous noise, panicked. The Dow Jones industrial average lost 364 points in 20 minutes. Luckily for investors, the Fed Chief then uttered vague, ambiguous statements which could be interpreted as hints of an upcoming rate cut by the masses of illiterate investors. The market soared up more than 450 points, restoring confidence in a bullish market even in the face of the sensational Asian crisis. A key banking player from Merrill Lynch & Co., speaking on condition of anonymity, said, "That really stank. Greenspan must have eaten beans for breakfast." Other bankers at the press conference expressed similar misgivings about Greenspan breaking wind. "It sincerely disturbs me that this man's accidental passing of gas affects market performance in such a substantive way," said another banker. "Doesn't anyone believe that market behavior depends on more than this single man's intestinal fortitude?" Representatives at the Federal Reserve issued only a single statement, saying "Greenspan is in good spirits, and seems to be amused that majorities of investors give his flatulance this power. He is in good health, and his intestinal disturbance passed." The Dow index gained 90 points within 2 minutes of the release of the Fed statement. George Soros, billionaire hedge fund manager and global money market speculator, said regarding Greenspan's noxious vapors, "I don't give a damn what Alan ate for breakfast. This entire spectacle is ridiculous. If you or I farted, as everyone does, probably no one would notice. But for some insane, perhaps inane reason, nearly every American and many foreign investors dote on Greenspan's every comment and action, interpreting them as signs of apocalypse or a wealthy paradise, depending on their mood." In this exclusive report, a senior Fed official, speaking on condition of anonymity, said, "Perhaps I'm the only one in the world who sees rate cuts as a psychological panacea. A truly stable, substantive economy takes more than a slightly lower interest rate in an already flawed system of debt mechanics. We need to restructure the economy on solid grounds with long- term growth goals. The economy must not be structured only to increase the short-term profits of investors who are only interested in the bottom-line monetary numbers, but who do not care about the real effects their money has in our world." Fed officials declined further comment on the incident. Some financial analysts believe Greenspan's foul air is a clear sign the Fed will decide to cut interest rates at next week's strategy meeting. ----------------------- NOTE: In accordance with Title 17 U.S.D. section 107, this erroneous and humorous material is distributed without profit or payment to those who have expressed a prior interest in receiving this information for purpose of laughs and giggles only. ----------------------- ________________________________________________________________ Mark Hedges hedges at infopeace.com www.infopeace.com "One does not establish a dictatorship in order to safeguard a revolution; one makes the revolution in order to establish a dictatorship." O'Brien from 1984, George Orwell ________________________________________________________________ From rah at shipwright.com Wed Sep 23 23:09:39 1998 From: rah at shipwright.com (Robert Hettinga) Date: Thu, 24 Sep 1998 14:09:39 +0800 Subject: Crisis in the Burg: the 100GB Bug Message-ID: --- begin forwarded text Resent-Date: Thu, 24 Sep 1998 14:47:22 -0400 X-Authentication-Warning: qnx.com: localhost [127.0.0.1] didn't use HELO protocol To: 0xdeadbeef at substance.abuse.blackdown.org Subject: Crisis in the Burg: the 100GB Bug Date: Thu, 24 Sep 1998 14:29:38 -0400 From: glen mccready Resent-From: 0xdeadbeef at substance.abuse.blackdown.org X-Mailing-List: <0xdeadbeef at substance.abuse.blackdown.org> archive/latest/212 X-Loop: 0xdeadbeef at substance.abuse.blackdown.org Precedence: list Resent-Sender: 0xdeadbeef-request at substance.abuse.blackdown.org Forwarded-by: nev at bostic.com Forwarded-by: Dave Del Torto Forwarded-by: Victor Milan, FBNS Forwarded-By: Charles Reuben EXPERTS WARN OF THREAT FROM 100GB BUG Firebringer News Service (FBNS) - Experts warned today of a new and deadly threat to our beleaguered civilization: the 100GB Bug. As most people know, McDonald's restaurant signs show the number of hamburgers the giant chain has sold. That number now stands at 99 billion burgers, or 99 Gigaburgers (GB). Within months or even weeks, that number will roll over to 100GB. McDonald's signs, however, were designed years ago, when the prospect of selling one hundred billion hamburgers seemed unthinkably remote. So the signs have only two decimal places. This means that, after the sale of the 100 billionth burger, McDonald's signs will read "00 Billion Burgers Sold." This, experts predict, will convince the public that, in over thirty years, no McDonald's hamburgers have ever in fact been sold, causing a complete collapse of consumer confidence in McDonald's products. The ensuing catastrophic drop in sales is seen as almost certain to force the already-troubled company into bankruptcy. This, in turn, will push the teetering American economy over the brink, which, finally, will complete the total devastation of the global economy, ending civilization as we know it, and forcing us all to live on beetles. "The people who know -- the sign-makers -- are really scared of 100GB," one expert said. "I don't know about you, but I'm digging up a copy of THE FIELD GUIDE TO NORTH AMERICAN INSECTS and heading for the hills." ### reported by Victor Milan, FBNS forward freely, please attribute --- end forwarded text ----------------- Robert A. Hettinga Philodox Financial Technology Evangelism 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From petro at playboy.com Thu Sep 24 01:02:03 1998 From: petro at playboy.com (Petro) Date: Thu, 24 Sep 1998 16:02:03 +0800 Subject: IP: Privacy: FTC Losing Patience w/Business In-Reply-To: <199809240731.AAA25674@netcom13.netcom.com> Message-ID: At 2:31 AM -0500 9/24/98, Vladimir Z. Nuri wrote: >From: believer at telepath.com >Subject: IP: Privacy: FTC Losing Patience w/Business >Date: Wed, 23 Sep 1998 07:33:09 -0500 >To: believer at telepath.com > >Source: New York Times >http://www.nytimes.com/library/tech/98/09/biztech/articles/21privacy.html > >September 21, 1998 > >F.T.C. 'Losing Patience' With Business on >A site called Soccer Patch (www.soccerpatch.com) is a trading post for >soccer-playing children who want to trade team patches. It lists the names, >e-mail addresses and in some cases the hometowns of children who want to >trade patches. That is a red flag for F.T.C. enforcers. They worry that >child molesters can use the information to find victims. Since when is it the job of the F.T.C worry about child molesters? -- petro at playboy.com----for work related issues. I don't speak for Playboy. petro at bounty.org-----for everthing else. They wouldn't like that. They REALLY Economic speech IS political speech. wouldn't like that. From listmaster at extensis.com Thu Sep 24 18:12:46 1998 From: listmaster at extensis.com (listmaster at extensis.com) Date: Thu, 24 Sep 1998 18:12:46 -0700 (PDT) Subject: More Tools. No "Futzing" - Mask Pro 2.0 Message-ID: Announcing Extensis Mask Pro 2.0 Now, get more tools, more control, and NO "futzing" with Mask Pro 2.0 http://www.extensis.com/products/MaskPro/ � NEW! EdgeBlender technology removes background colors from mask edges. � NEW! PrecisionEdge detection creates EDITABLE magic paths for precise edging. � NEW! IntelliBrush removes background color from an individual layer. � NEW! Global choke tightens your entire mask-instantly. � IMPROVED! Smarter color-matching technology gives one-click masking. Extensis MaskPro 2.0 is a significant upgrade to the industry standard in masking software. Mask Pro 2.0 features an expanded and enhanced set of sophisticated tools that let you take on any masking challenge and deliver professional, print-ready results. Mask Pro 2.0 gives you the power tools to create precision masks which far exceed the standard tools available in Photoshop 5. With Extensis Mask Pro 2.0, spend your time creating, not "futzing". With NEW EdgeBlender technology, instantly remove background colors from your mask edges, providing superior edges with NO halos. Then, use IntelliBrush and IntelliWand to remove background colors from a single layer-in a single click. Experiment freely without concern-Mask Pro 2.0 has incremental and entire brush-stroke undos. Better yet, for complex edges, use PrecisionEdge to automatically create an editable magic path-adjust the tolerance, choke, threshold or edit the path on a pixel-level for the most precise edges possible. Best yet, access all of Mask Pro's tools from the NEW Extensis menu-right in Photoshop-using the commands you already know. More Tools. More Control. No "Futzing". Mask Pro 2.0. SPECIAL UPGRADE OFFER to Mask Pro 1.0 Owners: Upgrade to Mask Pro 2.0 NOW for only $99.95 (SAVE $200) SPECIAL OFFER to all Extensis Customers: Buy Mask Pro 2.0 NOW for only $249.95 (SAVE $50!) OFFER FOR EXTENSIS FRIENDS: Buy Mask Pro 2.0 NOW for only $299.95- and save on future Extensis purchases! To ORDER, download a free demo, or for more information, please visit: http://www.extensis.com/products/MaskPro/ Or call Extensis at (800) 796-9798 or (503) 274-2020. Extensis Mask Pro is fully compatible with Adobe Photoshop 4 and 5 (Mac and Windows) and Photo-Paint (Windows). ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ PS. We have made every effort to ensure this message is being sent only to people who have expressed interest in Extensis products. If we have sent this to you in error, please accept our apologies and reply with "REMOVE" in the subject line for automatic exclusion from future communications. If you know someone who would like to be on our mailing list have them send an email to listmaster at extensis.com with "ADD" in the subject line and their email address in the body. P.P.S. This message is intended for North American customers. If you are located outside of North America and have received this message, please visit www.extensis.com/purchase/ to find the nearest local distributor in your country. From edsmith at IntNet.net Thu Sep 24 18:45:12 1998 From: edsmith at IntNet.net (Edwin E. Smith) Date: Thu, 24 Sep 1998 18:45:12 -0700 (PDT) Subject: This is a good one! Message-ID: <3.0.2.32.19980924214334.007e97d0@mailhost.IntNet.net> If you have Microsoft Word (6.0 or later), and have a thesaurus installed, do the following: 1) Open a new, blank document. 2) Type in the words: I'd like to see Bill Clinton resign. 3) Highlight the entire sentence. 4) Click on the tools menu and select thesaurus (tools, language, thesaurus) Look what is immediately highlighted in the selection box. From nobody at replay.com Thu Sep 24 04:11:56 1998 From: nobody at replay.com (Anonymous) Date: Thu, 24 Sep 1998 19:11:56 +0800 Subject: No Subject Message-ID: <199809250014.CAA25085@replay.com> At 07:01 AM 9/23/98 -0500, Bruce Schneier wrote: > >Sorry. I am under NDA. Be sure to drink plenty of fluids and get plenty of rest afterwards; that stuff wears you out ;-) From nobody at replay.com Thu Sep 24 04:13:01 1998 From: nobody at replay.com (Anonymous) Date: Thu, 24 Sep 1998 19:13:01 +0800 Subject: No Subject Message-ID: <199809250013.CAA24987@replay.com> At 01:54 AM 9/24/98 -0000, Anonymous wrote: >There is an inherent flaw in the jury system. You get summoned and are >legally required to blow the entire day down at the courthouse. If you're >a student you miss classes, and if you have a job you miss that too. You >have to pay for transportation, parking, food, and whatever else you need. >In return, you get paid something like $3, which often isn't even enough >to cover the parking and get told every five minutes that this or that >will get you, as a juror or potential juror, thrown in jail. Basically this is unconstitutional seizure of your time = money. This is slavery, which is prohibited, again by that pesky constitution. The postal service sends datagrams; they are not acknowledged. But you can't subvert if you don't participate. From nobody at replay.com Thu Sep 24 04:15:34 1998 From: nobody at replay.com (Anonymous) Date: Thu, 24 Sep 1998 19:15:34 +0800 Subject: No Subject Message-ID: <199809250013.CAA24949@replay.com> At 10:38 AM 9/23/98 -0500, Jim Choate wrote: > >It becomes possible to scan for sureptitous clock devices (their tick, tick, >tick in the EM), mod'ed hardware, and software. > >Follow this with a gas spectrograph and a x-ray and you'd have the vast >majority of bases covered. "Ummmm...I left my laptop in a room full of Canadian snowboarders...dude" From billp at nmol.com Thu Sep 24 04:22:08 1998 From: billp at nmol.com (bill payne) Date: Thu, 24 Sep 1998 19:22:08 +0800 Subject: salman rushdie Message-ID: <360ADE95.4B33@nmol.com> dave --- ABQ J 9/24/98 Iran May Withdraw Writer's Death Threat LONDON - Author Salman Rushdie met with British Foreign Office officials Wednesday amid reports Iran is preparing to withdraw the threat on his life. The late Ayatollah Ruhollah Khomeini pronounced a "fatwa," death sentence, against Rushdie in 1989 after the publication of his book "Satanic Verses," which many Muslims deemed blasphemous. Islamic militants then put a $2 million bounty on Rushdie's head, forcing the author to live largely in under British police protection. --- I THINK that I heard tonight and saw Rushie's picture on TV that the above was called off. Progress. I am reading again your stuff at http://www.jya.com/filth-spot.htm Let's all hope for release of the requested documents and SETTLEMENT. bill Title: Black and White Test of Cryptographic Algorithms Jump to Forum Click Image to Jump to Next Article Go to Text Only Print Version Black and White Test of Cryptographic Algorithms by William H. Payne This article requires special formatting. Please Click Here to Read Send This Article to a Friend: � Your Name: � Email Address of your Friend: � Your Email address: � � � � � Back to Home Page Quick Menu Visit the Button Shop Interactive Forum Black and White Test of Cryptographic Algorithms E-mail the Editor � From nobody at replay.com Thu Sep 24 04:24:36 1998 From: nobody at replay.com (Anonymous) Date: Thu, 24 Sep 1998 19:24:36 +0800 Subject: No Subject Message-ID: <199809250013.CAA24957@replay.com> GOD'S TOTAL QUALITY MANAGEMENT QUESTIONNAIRE God would like to thank you for your belief and patronage. In order to better serve your needs, God asks that you take a few moments to answer the following questions. Please keep in mind that your responses will be kept completely confidential, and that you need not disclose your name or address unless you prefer a direct response to comments or suggestions. 1. How did you find out about your deity? __ Newspaper __ Bible __ Torah __ Television __ Book of Mormon __ Divine Inspiration __ Dead Sea Scrolls __ My Mama Done Tol' Me __ Near Death Experience __ Near Life Experience __ National Public Radio __ Tabloid __ Burning Shrubbery __ Other (specify): _____________ 2. Which model deity did you acquire? __ Yahweh __ Father, Son & Holy Ghost [Trinity Pak] __ Jehovah __ Jesus __ Krishna __ Zeus and entourage [Olympus Pak] __ Odin and entourage [Valhalla Pak] __ Allah __ Satan __ Gaia/Mother Earth/Mother Nature __ None of the above, I was taken in by a false god 3. Did your God come to you undamaged, with all parts in good working order and with no obvious breakage or missing attributes? __ Yes __ No If no, please describe the problems you initially encountered here. Please indicate all that apply: __ Not eternal __ Finite in space/Does not occupy or inhabit the entire cosmos __ Not omniscient __ Not omnipotent __ Not infinitely plastic (incapable of being all things to all creations) __ Permits sex outside of marriage __ Prohibits sex outside of marriage __ Makes mistakes (Geraldo Rivera; Michael Jackson) __ Makes or permits bad things to happen to good people __ When beseeched, does not stay beseeched __ Requires burnt offerings __ Requires virgin sacrifices 4. What factors were relevant in your decision to acquire a deity? Please check all that apply. __ Indoctrinated by parents __ Needed a reason to live __ Indoctrinated by society __ Needed focus in whom to despise __ Imaginary friend grew up __ Wanted to know Jesus in the Biblical sense __ Hate to think for myself __ Wanted to meet girls/boys __ Fear of death __ Wanted to piss off parents __ Needed a day away from work __ Desperate need for certainty __ Like Organ Music __ Need to feel Morally Superior __ Thought Jerry Falwell was cool __ Shit was falling out of the sky __ My shrubbery caught fire and a loud voice commanded me to do it 5. Have you ever worshipped a deity before? Is so, which false god were you fooled by? Please check all that apply. __ Mick Jagger __ Cthulhu __ Baal __ The Almighty Dollar __ Bill Gates __ Left Wing Liberalism __ The Radical Right __ Ra __ Beelzebub __ Barney T.B.P.D. __ The Great Spirit __ The Great Pumpkin __ The Sun __ Elvis __ Cindy Crawford __ The Moon __ A burning shrubbery __ Other: ________________ 6. Are you currently using any other source of inspiration in addition to God? Please check all that apply. __ Tarot __ Lottery __ Astrology __ Television __ Fortune cookies __ Ann Landers __ Psychic Friends Network __ Dianetics __ Palmistry __ Playboy and/or Playgirl __ Self-help books __ Sex, Drugs, Rock and Roll __ Biorhythms __ Alcohol __ Bill Clinton __ Tea Leaves __ EST __ The Internet __ Mantras __ Jimmy Swaggert __ Crystals (not including Crystal Gayle) __ Human Sacrifice __ Pyramids __ Wandering around a desert __ Insurance policies __ Burning Shrubbery __ Barney T.B.P.D. __ Teletubbies __ Other:_____________________ __ None 7. God employs a limited degree of Divine Intervention to preserve the balanced level of felt presence and blind faith. Which would you prefer (circle one)? a. More Divine Intervention b. Less Divine Intervention c. Current level of Divine Intervention is just right d. Don't know...what's Divine Intervention? 8. God also attempts to maintain a balanced level of disasters and miracles. Please rate on a scale of 1 - 5 his handling of the following: (1=unsatisfactory, 5=excellent): A. Disasters: flood 1 2 3 4 5 famine 1 2 3 4 5 earthquake 1 2 3 4 5 war 1 2 3 4 5 pestilence 1 2 3 4 5 plague 1 2 3 4 5 SPAM 1 2 3 4 5 AOL 1 2 3 4 5 b. Miracles: rescues 1 2 3 4 5 spontaneous remissions 1 2 3 4 5 stars hovering over jerkwater towns 1 2 3 4 5 crying statues 1 2 3 4 5 water changing to wine 1 2 3 4 5 walking on water 1 2 3 4 5 VCRs that set their own clocks 1 2 3 4 5 Saddam Hussein still alive 1 2 3 4 5 getting any sex whatsoever 1 2 3 4 5 9. Do you have any additional comments or suggestions for improving the quality of God's services? (Attach an additional sheet if necessary): If you are able to complete the questionnaire and return it to one of Our conveniently located drop-off boxes by July 30 you will be entered in The One Free Miracle of Your Choice drawing (chances of winning are approximately one in 6.023 x 10 to the 23rd power, depending on number of beings entered). Thank You, Daryl Clerk of the Supreme Being of the Apocalypse From nobody at replay.com Thu Sep 24 06:14:58 1998 From: nobody at replay.com (Anonymous) Date: Thu, 24 Sep 1998 21:14:58 +0800 Subject: Jury duty considered harmful, or at least rare Message-ID: <199809250216.EAA02681@replay.com> On Tue, 22 Sep 1998, Rabid Wombat wrote: > On 24 Sep 1998, Anonymous wrote: > > > On Wed, 23 Sep 1998, Tim May wrote: > > > > > > > > At 11:11 PM -0700 9/22/98, Bill Stewart wrote: > > > > > > > > If they do have a list, I'd kind of like to be on it. I'm a college > > student, and I _can't_ serve on a jury for more than a day or so. The same > > goes for doctors, corporate executives, and others. > > > > Yeah, right. I *never* blew off class to go to the beach. I never go to > "meetings" on the golf course, either. Glad to hear the only people with > important places to be are doctors, executives, and college students. Maybe you skipped class all the time. Maybe you didn't have to compete to get into a competitive graduate school or graduate from that school. Maybe you hold your "meetings" on the golf course and cheat your company. I don't. That isn't the point. Glad to hear that you make a habit of blowing off class and playing golf on company time. Snip. > Oh, and I need > > to still get my full salary to pay my bills. Thanks, buddy." Um, no. > > > > The company I work for pays our salary while we are on jury duty. We have > to turn over the $3 a day stipend. That's nice for people who work at your company. It won't work for a small business where the juror own and operates it. It also won't work for a small business owner to hire more help and still pay the juror, because then it's cheating the owner. The court system summons the people under penalty of law. The court system puts them on a jury. The government isn't repealing all the bullshit legislation. The government can pay the bills. Can't afford it? Maybe we should redirect some of that welfare money. > Most defendants are guilty. That doesn't mean the one in front of you is. > Take traffic court as an example. How many defandants are there because > they are innocent, and the cop was mistaken, didn't calibrate his radar, > needed to fill his quota, etc.? A few. How many are there because they > want a couple points knocked off the penalty, even theough they were > speeding? Most of them. A guilty defendant is entitled to a fair trial. So > is an innocent one. You don't help the process by ducking jury duty (or > are you one of the stupid people?). That's primarily because of all the bullshit laws and legal events we have: drug laws, computer crime laws, frivolous lawsuits, set-ups by the cops, ITAR/EAR, and other things along that line of thought. The last time I was called for jury duty was back in college, where they got me in the week of finals. Of course, they hit me on that day, so I have to jump through all sorts of hoops and seriously piss a couple of professors off. Nothing keeps those professors from giving somebody like that a harder final either, under the pretense that they might have talked to others in the class about what the questions and answers were, which means that their grades relative to others in the class are then skewed, but the curve is still applied to them. Repeat with similar situations for any profession which isn't like canning at a tomato sauce plant. How many people do you think are found guilty because 11 people in the jury think he should be, and 1 person in the jury thinks the law shouldn't even be there but lets it go because the other 11 people on the jury don't understand the concept of jury nullification, they all just want to go home and not keep losing their livelihood, it *is* the law no matter how unconstitutional it may be, and the offense is relatively minor anyway? From bill.stewart at pobox.com Thu Sep 24 06:30:24 1998 From: bill.stewart at pobox.com (Bill Stewart) Date: Thu, 24 Sep 1998 21:30:24 +0800 Subject: No Privacy for Privacy Hypocrites In-Reply-To: Message-ID: <3.0.5.32.19980924090519.00b4c730@idiom.com> Sounds like a great idea, in the "Asking for truth from power" category. I doubt you'll get a lot of responses, but good luck. > The group, named "No Privacy for Privacy Hypocrites," (on >the web at http://www.noprivacy.org) intends to make Congress >confront the privacy concerns that are raised by the >investigation, by asking Members of Congress to declare their own >standards regarding privacy, and deal with the consequences. ... > On Monday, September 28, 1998, the group will distribute a >survey to Members of Congress asking: > > Do you believe any branch of government should investigate > allegations that elected officials have committed adultery, > including allegations that they have lied about it? > > If a Member answers yes or if the Member refuses to answer >the first question, then (and only then) they will be asked: > > Have you ever committed adultery, and have you ever lied > about it? Of course, if the Member answers "No", then the obvious followon is "So what are you trying to hide?" :-) but that's really best left for the version of the survey for appointed officials asking if they think appointed officials should be investigated. Thanks! Bill Bill Stewart, bill.stewart at pobox.com PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639 From bill.stewart at pobox.com Thu Sep 24 06:40:46 1998 From: bill.stewart at pobox.com (Bill Stewart) Date: Thu, 24 Sep 1998 21:40:46 +0800 Subject: sex, lies, and videotape In-Reply-To: <199809230415.GAA08895@replay.com> Message-ID: <3.0.5.32.19980924091028.00b4c730@idiom.com> At 06:15 AM 9/23/98 +0200, Count of Monte Carlo wrote: >What the fuck, the TLAs leveraged their POTUS bugs for >years... There's been some suggestion that the Filegate files included a lot of Republicans in compromising positions, which is keeping some of them better behaved than they might otherwise be (even if they don't know if the files include them, they may still be worried.) It's not clear if this includes the picture of Orrin Hatch that's rumoured to be floating around Salt Lake. >The only regret is that Frank Zappa was not alive >to put it all to music. It's all a bunch of bogus pomp anyway :-) Thanks! Bill Bill Stewart, bill.stewart at pobox.com PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639 From ravage at EINSTEIN.ssz.com Thu Sep 24 06:55:20 1998 From: ravage at EINSTEIN.ssz.com (Jim Choate) Date: Thu, 24 Sep 1998 21:55:20 +0800 Subject: Test [No Reply] Message-ID: <199809250323.WAA17403@einstein.ssz.com> Test [No Reply] From jf_avon at citenet.net Thu Sep 24 07:17:09 1998 From: jf_avon at citenet.net (Jean-Francois Avon) Date: Thu, 24 Sep 1998 22:17:09 +0800 Subject: Waste of money. Message-ID: <199809250306.XAA28614@cti06.citenet.net> ====== forwarded from Canadian Firearms Digest, V2 # 605 ========== Date: Thu, 24 Sep 1998 10:22:34 -0600 From: "David BREWERTON" Subject: FedUp II rally To the Editor, Halifax Herald: Regarding your "Sticking to their guns" article. I would like to correct a few inaccuracies in your piece. 1> "..to join about 8,000 others at the Fed Up II Rally.." - the RCMP estimate was 30,000 people, one of the largest if not THE largest rally ever on Parliament Hill. 2>"The new law, Bill C-68, will come into effect on Dec. 1, two months after it was first scheduled to be implemented." NO, this is the FIFTH extension of it's implementation date, now totalling three years. 3>"Ms. McLellan said the delay was at the request of Ontario law enforcement officials and not due to problems with the federal government's new system." FALSE, only 8 days before the law was scheduled to go into effect, gun dealers and Police departments still do not have the information on how to comply with the law. Confirm this with the Provincial Firearms Officers - they don't have the information yet. The fault is Federal. I asked gun dealers here and confirmed this with them, they still have nothing from the Federal government. 4>"Ms. McLellan said the program is still expected to cost about $185 million over the first five years" NO, they've already spent $135 million (that they'll acknowledge) THIS YEAR ALONE, and $250+ million so far in 3 years before registering a single firearm and they claim $60 million annually to run it. That's impossible since the current handgun registration system costs just under $100 per gun to register and with estimates (RCMP) of up to 25 million guns in Canada, that's $2.5 BILLION to do the job. Add to that the $200 million the Canadian Police Association must have to upgrade it's computer system to use the data from this system, the price is now somewhere around $3 Billion. That would help a lot of Hep-C victims and cancer patients. 5>"The minister also denied the government has a secret agenda to confiscate everyone's guns and use the registry to let the police know where to find firearms." False, since the goverment has already announced that they're turning 58% of the legitimately owned handguns in Canada into prohibited firearms and confiscating them without compensation. (Also illegal under the Charter of Rights) As for the Police access to the information - that was the main selling point by the Liberals to get the Canadian Police Chiefs to agree to support it. They were to have this information before going into a house to be prepared for any eventuality. They've now been informed that the system won't give them that information. The support of main line Police officers doesn't exist either. 85-91% of officers surveyed in several provinces (where their leaders would allow the survey to be done) say that they don't support the law. Please, lets keep the facts straight on this. There are 7 million people in this country who own firearms (RCMP estimates) and they're all voters and taxpayers. The utter waste of some $3 Billion on something with early estimates of a minimum 50% error rate (from the Ministers Select group of firearms experts) that will do nothing to combat crime since criminals won't register their guns and 90% of firearms crime (RCMP figures) is done with unregistered handguns which have had mandatory registration since 1934, cannot be tolerated. The NFA put together a system of firearm owner licensing some 30 years ago that would take care of most of what the government theoretically wants to accomplish with a very low cost. They refuse to consider it. The existing handgun registry has an estimated 30-45% error rate and even the courts refuse to accept data from it in court since it's so inaccurate. The Federal government can't even get their figures straight, since their numbers don't match either the RCMP or StatsCan figures for crime rates. They were caught inflating RCMP crime figures by 900% to strengthen their case in the Alberta Court of Appeal. They used the argument that even if a firearm was present at a location (locked in a gun safe and not involved in the crime) then it was a firearm crime. That's like saying that if there's a domestic dispute in a home and there's a car in the driveway then it's an automobile accident. That doesn't wash with me, I don't know about you. Please, lets keep the facts straight so that your readers can make an accurate assessment of the news, not a distorted one. From jamesd at echeque.com Thu Sep 24 07:17:09 1998 From: jamesd at echeque.com (James A. Donald) Date: Thu, 24 Sep 1998 22:17:09 +0800 Subject: Jury duty considered harmful, or at least rare In-Reply-To: <199809240225.TAA21955@proxy4.ba.best.com> Message-ID: <199809250319.UAA07944@proxy4.ba.best.com> -- At 9:12 PM -0500 9/23/98, James A. Donald wrote: > > To rig a jury by excluding undesirables such as Tim May > > would be far too laborious. To rig a jury it would be > > necessary to At 09:52 AM 9/24/98 -0500, Petro wrote: > No, no, On the contrary, far too easy. > > There are certain people who are NEVER called to jury duty, > people convicted of felonies & etc. simply put the name of > an undesirable on this list, The number of identifiable undesirables is too small to guarantee the desired trial outcome. To ensure a desired outcome it would be necessary to screen out a very large number of potential undesirables. It would be much easier to screen in a small number of desirables. > > and simple statistics would show this up. > If anyone were to look. --digsig James A. Donald 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG M+t9fZl1uB+ChARqSR+DFzmoEJWNgr/rn5RGHaZA 4/GeYPAq0AtkguzZ+40UycomDZMeuRMUpYyjzWHDJ ----------------------------------------------------- We have the right to defend ourselves and our property, because of the kind of animals that we are. True law derives from this right, not from the arbitrary power of the omnipotent state. http://www.jim.com/jamesd/����� James A. Donald From vznuri at netcom.com Thu Sep 24 07:25:26 1998 From: vznuri at netcom.com (Vladimir Z. Nuri) Date: Thu, 24 Sep 1998 22:25:26 +0800 Subject: IP: National ID Message-ID: <199809250327.UAA03872@netcom13.netcom.com> From: Larry Becraft Subject: IP: National ID Date: Wed, 23 Sep 1998 17:17:56 -0500 To: ignition-point at majordomo.pobox.com To Whom It May Concern, Lots of people are interested in fighting the national ID and lots of info and even suggested letters to object to the proposed regulation are posted to Scott McDonald's webpage which is accessed thru: http://www.networkusa.org/index.shtml Also attached to this note is my letter of objection which you may personalize and send to the DoT. This letter was the 4th objection submitted to the DoT. The reason I write now is because we have only about another week (Oct. 2) to get in more objections to this regulation. I have just visited the DoT webpage and found that there are about 2100 objections. We need many more. The DoT webpage lists all the people who have submitted objections and I have read the names of every objector. Remarkably, many of the people that I thought would submit an objection have not. If you have not, please do so immediately. If you don't object to this regulation, then I suggest keeping your mouth shut if this reg is adopted. Please, it should not take very long for you to personalize the attached letter and send it in. Thanks very much. Larry Becraft Attachment Converted: "c:\eudora\attach\FedRegObjection.rtf" ********************************************** To subscribe or unsubscribe, email: majordomo at majordomo.pobox.com with the message: (un)subscribe ignition-point email at address ********************************************** www.telepath.com/believer ********************************************** From vznuri at netcom.com Thu Sep 24 07:25:42 1998 From: vznuri at netcom.com (Vladimir Z. Nuri) Date: Thu, 24 Sep 1998 22:25:42 +0800 Subject: IP: Y2K Horror Stories a Foretaste of Breakdowns to Come Message-ID: <199809250327.UAA03883@netcom13.netcom.com> From: believer at telepath.com Subject: IP: Y2K Horror Stories a Foretaste of Breakdowns to Come Date: Wed, 23 Sep 1998 23:08:03 -0500 To: ignition-point at majordomo.pobox.com Source: http://www.garynorth.com/y2k/detail_.cfm/2665 Category: Noncompliant_Chips Date: 1998-09-23 11:10:48 Subject: Horror Stories That Are a Foretaste of Breakdowns to Come Link: http://www.greenspun.com/bboard/q-and-a-fetch-msg.tcl?msg_id=000AUk Comment: This document speaks for itself. Mutiply this through every institution that uses embedded systems. There is a lesson here. Any time anyone tells you, "This will work. No problem," ask him to demonstrate how it will work with no problem. Companies are just like governments. They stonewall. They pretend. They lie. Mainly, when caught, they lie. "I did not have noncompliance with that product!" This was especially interesting: "Nearly a month after I sent email to two different year 2000 addresses at the company, I received a phone call from the company. The caller described herself as a liaison with technical support and admitted to having no technical knowledge of the instrument. She said that their legal department would only allow verbal communication in this matter. She was prohibited from replying by email or written communication. "She said the embedded systems 'could be a problem' if new firmware wasn't installed. When questioned, she admitted that new firmware was not available and she did not know when it would be." Substitute the term "Western civilization" for "new firmware." * * * * * * * * * * * I am an analytical chemist specializing in inductively coupled plasma atomic emission spectroscopy (ICP-AES). ICP-AES is a method used to determine trace amounts of metals in solutions in the part per million and part per billion range. I am responsible for two spectrometers each of which cost approximately $130,000. Both instruments contain embedded microprocessor systems that are in turn controlled by external computers. The first uses a PDP-11/53 for the external computer. It is running the instrument control software under RT-11 and TSX-Plus. No hardware real time clock exists in the system. This version of RT-11 only accepts 1979 to 1999 as valid years for the system clock. There is no 2000 or 00. If left powered up, the system clock rolls over from 99 to 100. The file system is not designed to handle dates outside of the 79 to 99 range. A compliant version of RT-11 has just become available, but the manufacturer of the instrument says this won't help with problems in the instrument control software. We have been told that the software will "crash and burn" when hit with year 2000. The instrument was manufactured in 1988 and the software is no longer supported by the company. In fact, the company no longer employs anyone who worked on the Fortran source. The company's solution is to replace the PDP-11 with a PC and purchase a $6000 software package that runs under Windows. If we did this, we would no longer be able to use the quality control and data transfer programs we have written for the current system. We would also have several weeks of down time while entering our current analytical methods into the new system. My experience with a beta version of the PC software leads me to believe productivity would suffer in the end. The second instrument was controlled with a DEC 466 (486-66) running instrument control software under SCO-UNIX System V/386 Release 3.2. This system became very confused after the real time clock (RTC) was set to 12/31/99. Allowing the clock to roll over with the power off gave a RTC date of 1900. On boot up, Unix said the system year was 2000. However, the instrument software reported the current date as 01/01/10 and the RTC was reset to 1970. With the RTC set to 2000, the instrument software still reported the date as 01/01/10, but now the RTC was reset to 2070. On the next boot up, Unix would report the system date as 1970. At any time, typing in 000101 in the yymmdd field on boot up resulted in the RTC being reset to 1970. SCO has a patch for the operating system, but again this would not solve problems in the instrument control software. In this case, we have replaced the 486 with a Y2k compliant Pentium 300 and installed instrument control software that runs under Windows 95. The manufacturer no longer supports the software that ran under Unix. The instrument is two years old. Inside the instrument are two embedded 68000 microprocessor systems with real time clocks. Access to the clocks requires a program normally supplied only to service technicians. Execution of that program requires a password. The real time clocks can run without external power for up to ten years on internal lithium batteries. One function of the clocks is to insure the proper start-up sequence is followed after shutdowns of different lengths (hot or cold start). Extensive damage could be caused by an error in the control of heating, cooling, or gas flow systems. The clocks are also used in the monitoring of safety interlocks and sensors. Both clocks rollover from 1999 to 1900 and can not be set to 2000. The clocks also count off the days of the week. I am reluctant to extensively test the system myself because of the possibility of damage. When I first talked to technical support about my concerns, the technician pulled out a copy of the year 2000 compliance certificate for the new software and read it over. He then stated: "This certification only covers the software - not the *instrument*." This instrument and software is being sold as the company's year 2000 solution to replace almost all earlier systems. My next contact was with a different technician who was in the lab to repair an electronic problem in the instrument. He told me: "Don't worry, we use four digit dates." I asked him to demonstrate setting the clocks ahead. He ran the program on the main computer and it allowed him to type the year 2000 on the entry screen. He then executed the command to send the date to the embedded system. There were no error messages. He gave me a look that implied "I told you so". I then asked him to read back the current time from the clock he just set. He was visibly startled when he saw 1900 appear on the screen. He said he would have one of their experts call me. A few days later I heard from the "expert" who tried to reassure me with phrases like "they're just timers" and "the instrument doesn't _need_ to know what day it is". However, since he didn't seem to have a mastery of what the clocks actually do, I wasn't reassured. For example: I can put the instrument into standby (sleep mode) over the weekend with instructions to be ready to operate at 8:00 AM Monday. This will conserve gases (nitrogen and argon) and reduce power needs. 73 minutes before the assigned ready time, the embedded systems will query the main computer for start-up instructions. If the main system is running, it takes control of the sequence. If the main system is off, the embedded systems will look for it for 10 minutes and then independently begin the start-up sequence in the instrument EPROM. The "expert" didn't seem to have even this depth of knowledge of the system. Nearly a month after I sent email to two different year 2000 addresses at the company, I received a phone call from the company. The caller described herself as a liaison with technical support and admitted to having no technical knowledge of the instrument. She said that their legal department would only allow verbal communication in this matter. She was prohibited from replying by email or written communication. She said the embedded systems "could be a problem" if new firmware wasn't installed. When questioned, she admitted that new firmware was not available and she did not know when it would be. She also said that the clocks were used for the "wake up" procedure and not used for anything else. Since she had no knowledge of the instrument, there was no point in asking about system error (SYSERROR) message 75 described in the appendix of the manual: 75 Real-Time Clock. Call Service. The real-time clock, used to monitor the status of interlocks (and sensors), is not functioning. This will not shut down the system; however, a XXXXXXXX service engineer should be contacted. "This will not shut down the system" means I can start up a sustained 10,000 degree plasma in a confined space with uncertainty as to whether the interlocks and sensors will detect a malfunction. It's my belief that in thinking about embedded systems, this company has been in "sleep mode". I may have been the first to sound a "wake up" alarm about this instrument. Now they have to muster the people and resources to re-write the programs stored in the EPROM's, produce new chips, and install them in hundreds of instruments around the world. I should also mention that this is only one instrument in a large product line that has other Y2k problems. Will they get them all done? On time? I don't think they know. Link: http://www.greenspun.com/bboard/q-and-a-fetch-msg.tcl?msg_id=000AUk ---------------------- NOTE: In accordance with Title 17 U.S.C. section 107, this material is distributed without profit or payment to those who have expressed a prior interest in receiving this information for non-profit research and educational purposes only. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml ----------------------- ********************************************** To subscribe or unsubscribe, email: majordomo at majordomo.pobox.com with the message: (un)subscribe ignition-point email at address ********************************************** www.telepath.com/believer ********************************************** From vznuri at netcom.com Thu Sep 24 07:26:43 1998 From: vznuri at netcom.com (Vladimir Z. Nuri) Date: Thu, 24 Sep 1998 22:26:43 +0800 Subject: IP: NSA listening practices called European`threat' Message-ID: <199809250327.UAA03893@netcom13.netcom.com> From: believer at telepath.com Subject: IP: NSA listening practices called European`threat' Date: Thu, 24 Sep 1998 14:54:05 -0500 To: believer at telepath.com Source: Baltimore Sun http://www.sunspot.net/cgi-bin/editorial/story.cgi?storyid=900000194001 NSA listening practices called European`threat' European Parliament report accuses agency of widespread spying By Neal Thompson Sun Staff The National Security Agency has incurred the wrath of some U.S. allies and triggered debate about increased global eavesdropping, thanks to a new report that accuses the agency of spying on European citizens and companies. With the help of a listening post in the moors of northern England, NSA for nearly a decade has been snatching Europe's electronic communications signals, according to a report for the European Parliament. "Within Europe, all e-mail, telephone and fax communications are routinely intercepted by the United States National Security Agency, transferring all target information to Fort Meade," said the report. `Powerful threat' It warned that the NSA's tactics represent a "powerful threat to civil liberties in Europe" at a time when more communication -- and commerce -- is conducted electronically. A preliminary version of the report circulated overseas in recent months, touching off heated debate, with front-page stories in Italy, France, Scotland, England, Belgium and even Russia. The NSA won't discuss the report or even admit that the listening post exists. But this week, two days of debate in the European Parliament continued the extraordinary public disclosure of comprehensive post-Cold War spying by the agency. On Wednesday, the Parliament passed a resolution seeking more accountability from such eavesdropping arrangements and more assurances that they won't be misused. "We want to make sure that somebody's watching them," said Glyn Ford, a British member of the European Parliament, the legislative body for the 15-member European Union. Observers say this was the first time a governmental body has described in detail -- and then criticized -- the NSA's tactics. "The cat's well and true out of the bag," said Simon Davies, director of the London-based watchdog group Privacy International. "I would argue that we have made the grandest step in 50 years toward accountability of such national security transparencies." The report describes a sophisticated program called Echelon, which the NSA established in conjunction with British intelligence agencies. The program includes a listening post in Menwith Hill, in Yorkshire, whose satellite dishes soak up the satellite and microwave transmissions carrying Europe's telephone conversations, faxes and e-mail. Unlike Cold War spying aimed at the military, Echelon is a global electronic surveillance system that targets individuals, businesses, governments and organizations, the report says. The U.S. shares the information with Britain, Canada, Australia and New Zealand as part of an intelligence-sharing agreement called UKUSA. Each nation has its own set of key words, so it can seek information on specific issues, the report states. Europe is but a fraction of Echelon's target area -- and the Menwith Hill post is one of at least 10 around the world, the report adds. "One reason its a bigger deal over there than it is over here [in the U.S.] is because the SIGINT [signals intelligence] systems are over their heads and not our heads," said Jeffrey Richelson, an analyst with the National Security Archives, a U.S. group seeking to declassify intelligence related documents. Echelon repercussions But the disclosure of Echelon could soon resonate across the Atlantic after the European Parliament action. Furthermore, it could complicate current negotiations between the U.S. and the European Union over encryption programs that scramble or encode computer information, said Parliament member Ford. The U.S. has been lobbying for back-door access to such codes for security reasons. Originally published on Sep 19 1998 ----------------------- NOTE: In accordance with Title 17 U.S.C. section 107, this material is distributed without profit or payment to those who have expressed a prior interest in receiving this information for non-profit research and educational purposes only. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml ----------------------- ********************************************** To subscribe or unsubscribe, email: majordomo at majordomo.pobox.com with the message: (un)subscribe ignition-point email at address ********************************************** www.telepath.com/believer ********************************************** From vznuri at netcom.com Thu Sep 24 07:26:43 1998 From: vznuri at netcom.com (Vladimir Z. Nuri) Date: Thu, 24 Sep 1998 22:26:43 +0800 Subject: IP: Funny Money: New $20 FRNs are here Message-ID: <199809250327.UAA03904@netcom13.netcom.com> From: believer at telepath.com Subject: IP: Funny Money: New $20 FRNs are here Date: Thu, 24 Sep 1998 17:05:38 -0500 To: believer at telepath.com Source: US Newswire http://www.usnewswire.com/topnews/Current_Releases/0924-109.txt U.S. Treasury, Federal Reserve Issue New $20 Note U.S. Newswire 24 Sep 10:45 U.S. Treasury, Federal Reserve Issue New $20 Note To: National and Financial Desks Contact: Hamilton Dix of the U.S. Department of the Treasury, 202-622-2960, or Bob Moore of the Federal Reserve, 202-452-3215 WASHINGTON, Sept. 24 /U.S. Newswire/ -- Treasury Secretary Robert E. Rubin and Federal Reserve Board Chairman Alan Greenspan today announced the issuance of the redesigned $20 note, which includes new and modified security features to deter counterfeiting of U.S. currency. Rubin and U.S. Treasurer Mary Ellen Withrow marked the issuance of the new notes in a ceremony at Treasury's Cash Room in Washington, D.C. More than two dozen regional events hosted by Federal Reserve banks and branches and major retailers were also conducted around the country. "We have introduced a series of features that greatly raise the hurdle for counterfeiters," Rubin said. "Together these features amount to a formidable tool, and make spotting a counterfeit note easier than ever. For them to be effective, it is important that people stop for a moment to look for the new features." The new $20 will replace older notes gradually, and older series $20 notes still in good condition will be recirculated. About $83 billion worth of $20 notes is currently in circulation, 80 percent of those in the U.S. More than $450 billion worth of U.S. currency circulates around the globe. The Series 1996 $20 note is the third U.S. currency note to be redesigned to include new and modified security features. New $10 and $5 notes are expected to be issued simultaneously in 2000, and a new $1 note with a more modest redesign will follow. "We are confident that the introduction of this third redesigned note will be as smooth as that of the $100 and $50 notes," Chairman Greenspan said. "Older notes will not be recalled or devalued. All existing notes will continue to be legal tender." Like the Series 1996 $100 and $50 notes introduced since 1996, the new $20 note has a familiar appearance. The size, color and historical subjects have not changed. It also incorporates several security features that have proved effective against would-be counterfeiters: a watermark; enhanced security thread; fine-line printing patterns; color-shifting ink; and a larger, off-center portrait that is the most noticeable change in the overall architecture of the note. There are also two features for the blind and visually impaired. The new $20 note includes a capability that will allow the development of technology to help the blind ascertain the denomination of their currency. In addition, the $20 and $50 notes have a large numeral on the back that make the notes easier for millions of Americans with low vision to read. The continuing introduction of redesigned notes is a critical component of the Federal government's anti-counterfeiting effort. The new series aims to maintain the security of the nation's currency as computerized reprographic technologies such as color copiers, scanners and printers become more sophisticated and more readily available. The $20 note is the most frequently counterfeited note in the United States. Since the $20 note is so widely used in daily commerce and most frequently dispensed by ATMs, broad nationwide recognition of the new note when it is introduced will minimize apprehension on the part of the public. A public education campaign now underway encourages the public and people who handle cash every day to become familiar with the design and security features of the new notes. Retailers and financial institutions are educating their employees and customers by sending posters to their outlets, training cashiers, offering pamphlets to the public, and including information about the new note in advertising circulars and on shopping bags. More than 100 constituency organizations have helped reach small business owners, loss prevention managers, visually impaired and older Americans, and others with a stake in the new note's introduction. U.S. embassies and consulates are using materials translated into 15 languages to conduct localized education outreach to ensure that local users of U.S. currency as well as financial institutions are prepared for the issuance of the new note. Fact sheets on the new note, the history of U.S. currency and related agencies are available at http://www.moneyfactory.com. -0- /U.S. Newswire 202-347-2770/ 09/24 10:45 Copyright 1998, U.S. Newswire ----------------------- NOTE: In accordance with Title 17 U.S.C. section 107, this material is distributed without profit or payment to those who have expressed a prior interest in receiving this information for non-profit research and educational purposes only. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml ----------------------- ********************************************** To subscribe or unsubscribe, email: majordomo at majordomo.pobox.com with the message: (un)subscribe ignition-point email at address ********************************************** www.telepath.com/believer ********************************************** From mb2657b at enterprise.powerup.com.au Thu Sep 24 23:19:05 1998 From: mb2657b at enterprise.powerup.com.au (Scott Balson) Date: Thu, 24 Sep 1998 23:19:05 -0700 (PDT) Subject: Release of Veterans' Affairs policy Message-ID: <006601bde84c$717e40e0$f81c64cb@QU.fox.uq.net.ai> Please check: � http://www.gwb.com.au/onenation/policy/vet.html � GWB � � � Scott Balson From nobody at replay.com Thu Sep 24 10:24:19 1998 From: nobody at replay.com (Anonymous) Date: Fri, 25 Sep 1998 01:24:19 +0800 Subject: No Subject Message-ID: <199809250615.IAA18004@replay.com> Friday, September 25, 1998 - 08:08:49 MET You know for what the acronym CLINTON stands for ? Call Lewinsky, I Need The Oral Now ! From howree at cable.navy.mil Thu Sep 24 11:13:04 1998 From: howree at cable.navy.mil (Reeza!) Date: Fri, 25 Sep 1998 02:13:04 +0800 Subject: IP: Privacy: FTC Losing Patience w/Business In-Reply-To: <199809240731.AAA25674@netcom13.netcom.com> Message-ID: <3.0.5.32.19980925171547.00825620@205.83.192.13> At 03:20 PM 9/24/98 -0500, Petro wrote: >At 2:31 AM -0500 9/24/98, Vladimir Z. Nuri wrote: >>From: believer at telepath.com >>Subject: IP: Privacy: FTC Losing Patience w/Business >>Date: Wed, 23 Sep 1998 07:33:09 -0500 >>To: believer at telepath.com >> >>Source: New York Times >>http://www.nytimes.com/library/tech/98/09/biztech/articles/21privacy.html >> >>September 21, 1998 >> >>F.T.C. 'Losing Patience' With Business on >>A site called Soccer Patch (www.soccerpatch.com) is a trading post for >>soccer-playing children who want to trade team patches. It lists the names, >>e-mail addresses and in some cases the hometowns of children who want to >>trade patches. That is a red flag for F.T.C. enforcers. They worry that >>child molesters can use the information to find victims. > > Since when is it the job of the F.T.C worry about child molesters? It's always been Big Brothers business, to mind other peoples business. Reeza! From stuffed at stuffed.net Fri Sep 25 02:49:35 1998 From: stuffed at stuffed.net (STUFFED NEWS DAILY) Date: Fri, 25 Sep 1998 02:49:35 -0700 (PDT) Subject: TODAY'S NEWS AND PICS PACKED STUFFED! - READ IT NOW! Message-ID: <19980925071000.4056.qmail@eureka.abc-web.com> + BOP TIL YOU DROP + SEX MAD FOR IT + STUPID SPICE + THE BEST OF EUREKA + PANTY THEIF + LEZ BE PALS + WHIP U + DO I TAFT TO ----> http://stuffed.net/98/9/25/ <---- Welcome to today's issue of Stuffed. To read it you should click on the URL above. If it is not made clickable by your email program you will need to use your mouse to highlight the URL, copy it and then paste it into your browser (then press Return). This email is never sent unsolicited. Stuffed is the supplement for the Eureka newsletter you subscribed to. Full instructions on unsubscribing are in every issue of Eureka! ----> http://stuffed.net/98/9/25/ <---- From winkler.elke at usa.net Fri Sep 25 05:19:25 1998 From: winkler.elke at usa.net (winkler.elke at usa.net) Date: Fri, 25 Sep 1998 05:19:25 -0700 (PDT) Subject: Hello from USA, Message-ID: <199809251219.FAA00402@toad.com> Here is Elke agian, it's been a while we've exchanged our e-mails. I'd like to touch bases with you again on the Network Branch. Are you still interested in setting your own business on the internet? Our project is ready to be taken over. So you can run your branch of an International Dating, Matchmaking and Travel Service in your region. We will provide for you all necessary setup, software, etc., and you can start making your money right away! So, please get back to me on that. Warmly, Elke Winkler Berlin, Germany winkler.elke at usa.net From Marita.Nasman-Repo at DataFellows.com Fri Sep 25 08:55:38 1998 From: Marita.Nasman-Repo at DataFellows.com (Marita Näsman-Repo) Date: Fri, 25 Sep 1998 08:55:38 -0700 (PDT) Subject: MEDIA RELEASE: Data Fellows and BackWeb sign agreement Message-ID: <3.0.32.19980925160509.00971740@smtp.datafellows.com> For immediate release. September 25, 1998 #################################### Data Fellows to integrate BackWeb's technology into CounterSign architecture Helsinki, Finland, September 25, 1998 - Data Fellows Ltd., a leading data security vendor, and BackWeb Technologies, a leader in push solutions for Knowledge Distribution, today announced an agreement to integrate BackWeb�s Polite Server and Agent technology into Data Fellows� CounterSign management architecture. The CounterSign architecture provides a scalable, policy-based framework for managing the security infrastructure. By including BackWeb technology in Data Fellows products, protection against security breaches reaches the highest level, as the security system will automatically and transparently keep itself up-to-date during idle time online. BackWeb�s solution will complement the existing Internet update technology in F-Secure security products, which include F-Secure Workstation Suite, F-Secure Anti-Virus, F-Secure FileCrypto, F-Secure VPN+, F-Secure SSH and F-Secure NameSurfer. "Combining our integrated security solutions with BackWeb�s Polite distribution technology provides clear benefits to corporate customers in today�s insecure Internet environments," said Risto Siilasmaa, President and CEO of Data Fellows. "The use of bandwidth-friendly and scaleable push technology is a natural extension of our strong Internet approach." F-Secure utilizes BackWeb�s new client, which allows data transfer to customer networks securely even through firewalls. Administrators of corporate networks will be able to make the decision about deploying a particular version update in their networks, on a case-by-case basis, if they prefer to evaluate the updates before deployment. This type of implementation ensures that customers always have the latest versions on hand and are able to follow company security policy on software distribution. Data Fellows will also utilize the BackWeb broadcast channel for delivering alerts as well as relevant product service and support information to the corporate administrators and to its partners world-wide. Data Fellows� future plans include establishing partnerships with ISPs for using BackWeb�s push technology and its down- and upstream capabilities to enable ISPs to find new sources of revenue from value-added services, such as well-managed security services. About Data Fellows Data Fellows is one of the world�s leading developers of data security products. The Company develops, markets and supports anti-virus, data security and cryptography software products for corporate computer networks. It has offices in San Jose, California, and Espoo, Finland, with corporate partners, VARs and other distributors in over 80 countries around the world. All F-Secure products are integrated into the CounterSign management architecture, which provides a three-tier, scaleable, policy-based management infrastructure to minimize the costs of security management. F-Secure Workstation Suite consists of malicious code detection and removal, unobtrusive file and network encryption, and personal firewall functionality, all integrated into a policy-based management architecture. F-Secure Anti-Virus, with multiple scanning engines (including F-PROT and AVP), is the most comprehensive, real-time virus scanning and protection system for all Windows platforms. F-Secure VPN+ provides a software-based, IPSEC-compliant Virtual Private Network solution for large corporate networks as well as remote and small office networks. F-Secure FileCrypto is the first and only product to integrate strong real-time encryption directly into the Windows file system. F�Secure SSH provides secure remote login, terminal, and other connections over unsecured networks. It is the most widely used secure remote administration tool. F-Secure NameSurfer is the solution for remote Internet and Intranet DNS administration. Its easy-to-use WWW user interface automates and simplifies DNS administration. The Company has customers in more than 100 countries, including many of the world�s largest industrial corporations and best-known telecommunications companies, major international airlines, European governments, post offices and defense forces, and several of the world�s largest banks. The Company was named one of the Top 100 Technology companies in the world by Red Herring magazine in its September 1998 issue. Other commendations include Hot Product of the Year 1997 (Data Communications Magazine); Best Anti-Virus product (SVM Magazine, May 1997); Editor�s Choice (SECURE Computing Magazine); and the 1996 European Information Technology Prize. For more information, please contact: USA: Data Fellows Inc. Mr. Petri Laakkonen, President Tel. +1 408 938 6700, fax +1 408 938 6701 E-mail: Petri.Laakkonen at DataFellows.com Europe: Data Fellows Oy Mr. Jari Puhakka, Director, Business Development PL 24 FIN-02231 ESPOO Tel. +358 9 859 900, fax. +358 9 8599 0599 E-mail: Jari.Puhakka at DataFellows.com or visit our web site at http://www.DataFellows.com -- Marita.Nasman-Repo at DataFellows.com, World-Wide Web http://www.DataFellows.com From edsmith at IntNet.net Fri Sep 25 08:59:54 1998 From: edsmith at IntNet.net (Edwin E. Smith) Date: Fri, 25 Sep 1998 08:59:54 -0700 (PDT) Subject: Georges Message-ID: <3.0.2.32.19980925115803.00818600@mailhost.IntNet.net> The rain has started here in north Tampa. Hope to see all of you in the next life. :-) From jya at pipeline.com Thu Sep 24 18:21:10 1998 From: jya at pipeline.com (John Young) Date: Fri, 25 Sep 1998 09:21:10 +0800 Subject: EU-US Relations and Spy Satellit Message-ID: <199809251410.KAA06539@dewdrop2.mindspring.com> http://www.europarl.eu.int/dg3/sdp/pointses/en/p980914s.htm#6 EU-US relations and spy satellite Monday 14 September MEPs adopted the resolution emphasising the importance of EU-US relations and welcoming the New Transatlantic Agenda agreed at the 18 May London Summit. MEPs see the agreement as a means of reducing potential sources of conflict between both sides but want Congress to scrap the extra-territorial Helms-Burton and d'Amato Acts. The resolution recognises the importance of cooperation in the field of electronic surveillance for tracking down international criminal terrorists and drug traffickers but takes the view that "protective measures concerning economic information and effective encryption" should be taken to guard against abuse and threat to civil liberties posed by international telecommunications such as the "Echelon" US system. ----- We were unable to find the full resolution online and would appreciate a pointer, or a hardcopy: US Fax: 212-873-8700 Snail: John Young 251 West 89th Street, Suite 6E New York, NY 10024 No response from DoD on our request to interview Secretary Cohen about Echelon. And despite the spate of news reports on the recent Euro Parliament debate about it, there have been no questions about Echelon in DoD press briefings. Perhaps one of our esteemed journalists with Pentagon links could follow up on the Baltimore Sun coverage. Duncan Campbell, the first to write of Echelon in 1988, is offering information on Menwith Hill (NSA Echelon base) obtained by British protestors: http://jya.com/en092198.htm From petro at playboy.com Thu Sep 24 18:35:34 1998 From: petro at playboy.com (Petro) Date: Fri, 25 Sep 1998 09:35:34 +0800 Subject: Jury duty considered harmful, or at least rare In-Reply-To: Message-ID: At 10:01 PM -0500 9/24/98, James A. Donald wrote: > -- >At 9:12 PM -0500 9/23/98, James A. Donald wrote: >> > To rig a jury by excluding undesirables such as Tim May >> > would be far too laborious. To rig a jury it would be >> > necessary to > >At 09:52 AM 9/24/98 -0500, Petro wrote: >> No, no, On the contrary, far too easy. >> >> There are certain people who are NEVER called to jury duty, >> people convicted of felonies & etc. simply put the name of >> an undesirable on this list, > >The number of identifiable undesirables is too small to >guarantee the desired trial outcome. To ensure a desired >outcome it would be necessary to screen out a very large >number of potential undesirables. It would be much easier to >screen in a small number of desirables. At first yes, but over time the list could/would be grown. Also, the list of non-criminal undersirables is _only_ those people who would WANT to serve on the jury, but are too smart/savy/stubborn to pant at the feet of the lawyers. -- petro at playboy.com----for work related issues. I don't speak for Playboy. petro at bounty.org-----for everthing else. They wouldn't like that. They REALLY Economic speech IS political speech. wouldn't like that. From petro at playboy.com Thu Sep 24 18:38:33 1998 From: petro at playboy.com (Petro) Date: Fri, 25 Sep 1998 09:38:33 +0800 Subject: sex, lies, and videotape In-Reply-To: <199809230415.GAA08895@replay.com> Message-ID: At 11:10 AM -0500 9/24/98, Bill Stewart wrote: >It's not clear if this includes the picture >of Orrin Hatch that's rumoured to be floating around Salt Lake. > Gif! Gif! -- petro at playboy.com----for work related issues. I don't speak for Playboy. petro at bounty.org-----for everthing else. They wouldn't like that. They REALLY Economic speech IS political speech. wouldn't like that. From 59426627 at 27995.com Fri Sep 25 09:50:20 1998 From: 59426627 at 27995.com (FYI Stock Alert) Date: Fri, 25 Sep 1998 09:50:20 -0700 (PDT) Subject: What does IBM Know about ClearWorks that you don't? Message-ID: <199809251643.LAA00964@sparky.clearworks.net>

"ClearWorks Technologies...announced it has been 
selected as an IBM Authorized Home Systems Integrator."

"ClearWorks has been trained by IBM to provide superior installation and
reliable service...[to] residents throughout the US."
--Excerpts from the ClearWorks Technologies Official Press release,
September 25th, 1998

Don't miss this one!  CLWK (OTC BB)
To read the rest of the offical press release go to:
http://www.fyistockalert.com

For more information e-mail sales at fyistockalert.com









From jf_avon at citenet.net  Thu Sep 24 19:14:26 1998
From: jf_avon at citenet.net (Jean-Francois Avon)
Date: Fri, 25 Sep 1998 10:14:26 +0800
Subject: [flames] a clueless can't see parallel between crypto-freedom and 2nd amendment...
Message-ID: <199809251459.KAA08436@cti06.citenet.net>



-----BEGIN PGP SIGNED MESSAGE-----

From: jf_avon at citenet.net
Date: 25 sept 98  10h57 EST
Topic: [flames] a clueless can't see parallel between crypto-freedom
and 2nd amendment...

On Fri, 25 Sep 1998 10:11:10 +0200, Hans-Juergen Wiesner wrote:

Your comment is the first and only one complaint I ever received while
posting on this subject.  OTOH, I occasionnally receive mail to either
objectively discuss the topic or to comment in a positive ways my
posts.

Beside, post to the owner-cypherpunks to your hearth content, I am
not, as of a few weeks ago, on the list.  I jump in and off depending
on my time availability.


>At 14:53 24.09.98 -0400, you wrote:
>>   ====== forwarded from Canadian Firearms Digest, V2 # 605
==========
>
>I won't comment on your somewhat distortet view on reality and your
>miserable sense of logic proven by your "arguments".

Please submit me with your valid data.  I'll welcome it.

> I won't even lose a
>word on your misuse of HTML instead of plain ASCII for sending mail.

Then, don't... 

>It's just that I don't know why you distribute your meaningless
factoids by
>way of mailing lists like Cypherpunks (which is how I'm bothered by
your
>postings every single day).

Please feel free to enlighten me about reality and debunk my factoids.

As for why I fwd to the Cypherpunks, ask Tim May about the link
between govt trying to ban guns and govt trying to ban strong crypto. 
Or even better than bothering Tim, go back an read the archives of
Cypherpunks...


> Cypherpunks is a mailing list for users of 
>cryptographic technology. Topics are concerned mainly with software
and the
>implications of using certain programs.

Mainly.  But it is also *highly* concerned by the ethics and politics
of it.  Guns and crypto are, at the abstraction level, extremely
similar and therefore, it is not surprizing to see govt react the same
to both topic.  

An individual's specific psycho-epistemology and definition of Man
will, usually, lead to the same conclusions on theses two apparently
different topics. 

>Arms,which seem to be YOUR concern, are for shooting people or game.

Arms are NOT my concern, my concern is Freedom.  Guns are not for
anything in particular, they *are*.  Your choice to prefer to shoot
peoples than game or targets or simply to engineer a  more performing
piece of hardware is what you choose to do with it.  And is happens
that by the nature of them, e.g. the capacity to exert coercion at a
distance, they are the ultimate tools of choice of governments, which
by nature, are coercives.  Govts have their roles.  History has shown
over and over again ad nauseaum that govts are *dangerous* entities if
taken over by a certain category of individuals.

In order to defend the freedom of the individual, guns, i.e. tools of
tele-coercion are the ultimate deterrent.  Ask any american about it. 
Or consult the Constitution of the United States and see Thomas
Jefferson's explanation for the reason of the second ammendment.

>think this difference is big enough to justify my asking you to post
your
>stuff elsewhere.

I suppose you ignore that crypto is ruled by ITAR in North-America and
that the liberty-to-own-guns advocates also have their grips with ITAR
?

>I don't want to be bothered by unsolicited junk mail like
>yours any more.

when you sent the line subscribing line to the majordomo
subscribe cypherpunk-unedited hjwiesner at uni-tuebingen.de,  which
letters of the word "unedited" did you not understand?

There is *a lot* of junk mail coming from the cypherpunks list and my
posts represent my opinion, which in itself is legitimate,  an facts
obtained from the Royal Canadian Mounted Police itself.

If you don't want to receive any junk mail, send an e-mail to
majordomo at toad.com, leave the subject line blank and send the
following message:

unsubscribe cypherpunks-unedited hjwiesner at uni-tuebingen.de

Ciao

jfa
[note: when I post to gun groups, I use a crypto-oriented .sig and
when I post to crypto groups, I usually use a gun-oriented .sig.]

-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 5.5.3i for non-commercial use 

iQEVAwUBNguvx8iycyXFit0NAQGhqgf9G3Kl3NR2rPac87kQJlx3meMSmU6NM5G6
gx3OElO+LHQw2beD0WOTD1Lj6whLIit0oW/I6uJqHKWhnYAjCM9jm8+REQdiY2Ge
s3ISQmSGNyf3rARWIPA6ecrJsMCLJy3vJD60HDtanq4/5GXZTp2Xq3iEOMbLjkp9
36z53e4E0IcF2Betyg2gpyrPajm7cFCv066mSPpUZaEUqG9PwmLRxNYyn03A9bSV
PAkUKwyZ/MZy+CHwyuR5lfCPojOuFuFPzA0UINdD6GVk+OK5Gm6ys+GKAcV00SBL
y5gqTyGI4Y29nuYiUn27q3dXORxtw4+vbccBqnoonkAmReH+T4lGXA==
=AuSQ
-----END PGP SIGNATURE-----


Definition:  FASCISM: n.:  a political and economic movement, strongly nationalistic, magnifying the rights of the state as opposed to those of the individual, in which industry, though remaining largely under private ownership, and all administrative
political units, are controlled by a strong central government.
        -------------------------------------------------
"One of the ordinary modes by which tyrants accomplish their purpose, without resistance, is by disarming the people and making it an offense to keep arms".  - Joseph Story, U.S. Supreme Court Justice.
        -------------------------------------------------
the German gun control laws were enacted by the "liberal" Weimar Republic government that preceded Hitler, and were a strong aid to his coming to power -- because they disarmed Hitler's opponents, and Hitler's adherents ignored them -- as criminals have always ignored gun control laws.

Disarming the public is a frequent first step toward dictatorships and genocides.  Once the disarming is complete, the public is helpless against those who have the guns.        -------------------------------------------------

PGP keys: http://bs.mit.edu:8001/pks-toplev.html
PGP ID:C58ADD0D:529645E8205A8A5E F87CC86FAEFEF891 
PGP ID:5B51964D:152ACCBCD4A481B0 254011193237822C






From mok-kong.shen at stud.uni-muenchen.de  Thu Sep 24 21:33:35 1998
From: mok-kong.shen at stud.uni-muenchen.de (Mok-Kong Shen)
Date: Fri, 25 Sep 1998 12:33:35 +0800
Subject: An Extended Version of My Encryption Algorithm WEAK3
Message-ID: <360BD384.25A9228D@stud.uni-muenchen.de>



I have done a trial implementation of a number of suggestions received
for improving my encryption algorithm WEAK3 and have decided to
integrate a subset of these into WEAK3 to form an extended version of
it designated WEAK3-E. The added features are the following:

   1. Text block chaining. Two options are provided. These are similar 
      though not identical to the block chaining methods PBC and CBCC
      as described in B. Schneier's book.

   2. Another block chaining method that is specific to our scheme. It
      consists in modifying, depending on the text being processed, the
      pointers that are used to access the various pseudo-randomly
      generated tables of the algorithm.

   3. All pseudo-randomly generated tables used in the algorithm can now
      be refreshed at user specified periods.

   4. Checksums of the chaining values in (1) and (2) above are output
      to provide integrity checking.

An implementation in Fortran 90 is available in:

     http://www.stud.uni-muenchen.de/~mok-kong.shen/#paper12

The rationales of design of the base version, WEAK3, are given in

     http://www.stud.uni-muenchen.de/~mok-kong.shen/#paper11

The implemented new features largely follow the suggestions of CWL.
I like also to thank GR and CK for construcive critiques and TPS for
validating the program code. All eventual remaining deficiencies and
errors are however exclusively mine.

A binary executable file for PC may be downloaded through:

     http://www.stud.uni-muenchen.de/~mok-kong.shen/#software

Critiques comments and suggestions for improvements are sincerely
solicited.

M. K. Shen





From registrar at mailer.switchboard.com  Thu Sep 24 22:18:01 1998
From: registrar at mailer.switchboard.com (Switchboard Registrar)
Date: Fri, 25 Sep 1998 13:18:01 +0800
Subject: Welcome to Switchboard: [FBJJM,695]
Message-ID: <19980925180408454.AAA87@www1>



To confirm your Switchboard registration, simply REPLY to this
letter.  DO NOT modify the "Subject:" field. Your new or updated
listing (and homepage if you created one) will NOT appear in
Switchboard until you do.

-----------------------------------------------------------------
 
Thank you for becoming a Switchboard member! To login at any time,
use the following password with your Email address:
 
     Email: cypherpunks at toad.com
  Password: OffFour
 
You can change your password to something familiar the next time
you login.
 
  [Please NOTE:  This is not a password for your Internet Service 
   Provider account or a valid login for Switchboard's Free E-mail 
   service.]
 
To log in to Switchboard, point your browser to our home page at 
http://www.switchboard.com and click the My Corner icon. From the My
Corner page, you can select either the Modify My Listing or the 
Create/Modify My Homepage Option.  You'll then be prompted to enter 
your complete email address as it appears above and your Switchboard 
password to login.
 
If you choose to **Modify your Listing** you'll have the opportunity 
to include the following:
  
Business information
Cell phone number
FAX number
Pager number
Home page URL
Groups you are affiliated with
Schools you attended
And more!
 
You can also take advantage of Switchboard's unique Knock-Knock
feature to secure your email address or add an alternate listing to 
identify a nickname, maiden name or additional family member. If 
necessary, logging in allows you also to change your password or 
unlist yourself.
 
If you choose to **Create / Modify your Homepage** you can take 
advantage of My Studio, Switchboard's easy-to-use, interactive 
homepage builder.  Switchboard homepages are FREE and My Studio makes 
it so simple that even a beginner internet user can create a stylish 
homepage in no time at all.  
 
Remember - only after you REPLY or LOG IN once will your listing (and 
homepage) appear in Switchboard as you requested. These actions verify 
to us that the e-mail address you supplied was valid.
 
If you have questions, point your browser to Switchboard's on-line 
help files at http://www.switchboard.com/suptctr.htm or write to 
webmaster at switchboard.com. (Do not reply to this letter with 
questions, because the Registrar is an automated mailbox and your 
letter may not be read by a person.) 
 
If you did not request Switchboard membership, either forward 
this letter to webmaster at switchboard.com with comments, or reply 
to this letter with the "Subject:" field changed to "cancel".
 
Thank you again for using Switchboard.  
 
P.S. Don't forget to try other My Corner offerings, like FREE E-mail!





From danmcd at Eng.Sun.COM  Thu Sep 24 22:39:09 1998
From: danmcd at Eng.Sun.COM (Dan McDonald)
Date: Fri, 25 Sep 1998 13:39:09 +0800
Subject: 40-bit brute force RC4 speed records?
Message-ID: <199809251826.LAA09275@kebe.eng.sun.com>



Just curious, what's the speed record?  What if I had, oh, say, a 4-way Ultra
Enterprise 450 at my disposal?

Thanks,
Dan





From jvb at ssds.com  Thu Sep 24 22:45:12 1998
From: jvb at ssds.com (Jim Burnes)
Date: Fri, 25 Sep 1998 13:45:12 +0800
Subject: Just who should Kenneth Starr work for next?
In-Reply-To: <3.0.3.32.19980925091151.006b98a0@ego.idcomm.com>
Message-ID: 



On Fri, 25 Sep 1998, Pat Cain wrote:

> Folks - 
> 
> Allegedly a Reuters story, from sources unknown (too many forwards to give
> proper credit).
> 
> pjc
> 
> =====================================================
> Flynt offers Starr job as porno aide
> 

Pretty amusing.  After Billy has resigned/been impeached he could star in
porno movies that Flynt produces -- maybe use the proceeds to pay the
taxpayer back for all the wasted time and money.

The real problem with all this is that Star was forced to reveal exactly
what acts took place because Clinton insisted on defining the minutia of
what constituted "sexual relations" -- thus revealing whether he did or
didn't conform to that definition was mandatory.  The question of perjury
balances on these facts. 

Any adult with half a brain knows that sexual relations are relations that
are sexual in nature.  A reasonable man/woman (especially wives of
the adulterer in question) would consider oral sex sexual relations.

But that is beside the point.  Billy C is being hoist on his own petard. 
The fishing expedition discovery process allowed by sexual harrasment
suits were an invention of NOW (and the club of socialist lawyers that Mr
Clinton clearly is a member of.) 

By any stretch of the imagination Clinton has either perjured himself in
his civil deposition (a felony offense), perjured himself before a federal
grand jury (an even more serious felony offense), obstructed justice or
all three. 

Of course the whole thing could have been avoided if Clinton had simply
told the truth during the deposition and to the American people. 
(Actually it could have been avoided if Mr. Clinton had not made a habit
of making his private life a matter of public record). 

Now Clinton has put either himself or the Republic in a very precarious
situtation. 

(1) Either the perjury and obstruction of justice laws apply equally to
everyone, or they apply to no one.  If the judicial system fails to
enforce these laws they set an example.  Next time someone is under oath
they can decide what they can and can't lie about.  They can decide that
"alone" means something other than what a reasonable man would agree with.
They can decide to deceive the judge and jury if the prosecution is
hostile (as if the prosecution is ever anything but).  They can give
testimony before a federal grand jury over a closed circuit video feed so
that they are free to refuse to answer questions without chance of being
held in contempt and jailed. 

(2) Admit that he lied under oath and open himself up to prosecution (and
definite impeachment). 

(3) Resign and save (a) the Democratic Party (b) tax payers dollars (c)
his own skin

(4) Refuse (2) and (3) and trash the democratic party in the elections,
waste huge amounts of taxpayer dollars and jeopardize the institution of
the presidency and the legal system. (whats left of them ;-)

And before all the dems on this list bitch that I'm just being partisan
and just "let the man get on with his job" -- let me state that telling
the people the truth *is* part of "his job".  (and I'm neither a democrat
or a republican -- not that there is much differnce anymore)

We all laugh at and belittle politicians for lying to us when "their
mouths are moving", but when they move those mouths under oath they are
held to a high legal standard.  Would you prefer this standard not apply
when taking the oath of office?  Would you countenance a politician who,
appearing as a witness in a murder case, lied about who he had seen
stabbing whom?  Part of the oath of office swears out the fact that they
will faithfully execute the laws of the land.  Is this another sworn
oath we could write off as the "trappings" of the republic?

More importantly, as Noam Chomsky points out in "Manufacturing Consent",
lying politicians are the modern democratic equivalent of feudal tyrants
beating or executing citizens in more "uncivilized times".  When the king
decided to supress the power of the citizens he simply beat, killed or
imprisoned them.  When modern politicos want to relieve people of power
they lie to them straightfaced, then do whatever they choose.  The more
slick they are, the less the people even know whats being done to them --
and the more dangerous they are.  They become tools of force for those
who wish to buy them.  The velvet glove over the iron fist.  In this
Heinlein is dead right -- democracy is force.

If anyone could watch the clinton testimony on video tape and not believe
that he is a congenital liar then you are deluding yourself. 

And as for getting on with the business of government that most "liberals"
hope for: education, welfare, more money for more people -- maybe they
ought to start thinking more about what is being done *to* them than *for*
them. 

"When we got organized as a country and we wrote a fairly radical
Constitution with a radical Bill of Rights, giving a radical amount of
individual freedom to Americans, it was assumed that the Americans who had
that freedom would use it responsibly.... [However, now] there's a lot of
irresponsibility. And so a lot of people say there's too much freedom. 
When personal freedom's being abused, you have to move to limit it."
President Bill Clinton, MTV's "Enough is Enough" 3-22-94

(*gulp*, the Founders are rolling in their graves like blenders
on frappe.  The true colors of a "communitarian")

In any case, since I'm neither Demoblican or RepublicRat I see the whole
issue like a bystander at the crash of the Hindenberg.  The first flames
are breaking out on top and you know that the thing is made of hydrogen
and flammable materials.  The conflagration is not going to go out until
the fuel is exausted.  Between Lewinsky, TravelGate, FBIFileGate,
DonationGate, Whitewater, Elections, Satellite News and the Internet thats
a hell of a lot of fuel.  Add Y2K to the fire and you just know the thing
is going to burn to a cinder as it grounds out.  "Oh, the humanity"

Being of libertarian disposition I'm no fan of the nature of sexual
harrasment proceedings, but if you are the chief executive of those laws
then you must also live by them or risk undermining the very underpinnings
of the legal system.  If you want to be the banker in the game of
Monopoly, don't complain that you don't like the rules when someone
catches you cheating.

(i know the original post was intended humoursly, but I'm so tired of the
prevarication, deceit, etc I had to put a word or two in ;-) 

taking a deep breath,

jim burnes

"Libery cannot be preserved without a general knowledge among the 
people, who have .. a desire to know; .. that most dreaded and
envied kind of knowledge.  I mean of the characters and conduct 
of their rulers."
    -- John Adams
    A Dissertation on the Canon and Feudal Law [1765]





From nmir at usa.net  Fri Sep 25 00:17:48 1998
From: nmir at usa.net (NMIR)
Date: Fri, 25 Sep 1998 15:17:48 +0800
Subject: [salman rushdie]
Message-ID: <19980925192238.27047.qmail@www0n.netaddress.usa.net>



Does anyone have any idea what this guy is on about?.

Regards,

NMIR

www.netlink.co.uk/users/impact/namir/namirm.html

billp at nmol.com wrote:
dave
---
ABQ J 9/24/98 
Iran May Withdraw
Writer's Death Threat

LONDON - Author Salman
Rushdie met with British Foreign
Office officials Wednesday amid
reports Iran is preparing to
withdraw the threat on his life.
The late Ayatollah Ruhollah
Khomeini pronounced a "fatwa," death sentence, 
against Rushdie in
1989 after the publication of his
book "Satanic Verses," which many
Muslims deemed blasphemous.
Islamic militants then put a $2
million bounty on Rushdie's head,
forcing the author to live largely in
under British police protection.
---

I THINK that I heard tonight and saw 
Rushie's picture on TV that the above
was called off.

Progress.

I am reading again your stuff at
http://www.jya.com/filth-spot.htm

Let's all hope for release of the requested documents
and SETTLEMENT.

bill


> --------------------------------------------- 
>	Attachment:�bw1.html  
>	MIME Type:�text/html 
> --------------------------------------------- 

____________________________________________________________________
Get free e-mail and a permanent address at http://www.netaddress.com/?N=1





From nobody at replay.com  Fri Sep 25 00:44:42 1998
From: nobody at replay.com (Anonymous)
Date: Fri, 25 Sep 1998 15:44:42 +0800
Subject: No Subject
Message-ID: <199809252034.WAA19047@replay.com>



On Thu, 24 Sep 1998 21:43:34 -0400 "Edwin E. Smith" 
writes:
>
>
>
>If you have Microsoft Word (6.0 or later), and have a thesaurus
>installed, do the following:
>
>1) Open a new, blank document.
>2) Type in the words: I'd like to see Bill Clinton resign.
>3) Highlight the entire sentence.
>4) Click on the tools menu and select thesaurus (tools, language,
>   thesaurus)
>
>Look what is immediately highlighted in the selection box. 
>

This was almost funny. Too bad the following sentences also work:
I'd like to drink frog urine
I'd like to hug large, purple dinosaurs
I'd like to cook onions with garlic and tomatoes
I'd like to strangle you with a mouse cable





From nobody at replay.com  Fri Sep 25 01:41:14 1998
From: nobody at replay.com (Anonymous)
Date: Fri, 25 Sep 1998 16:41:14 +0800
Subject: No Subject
Message-ID: <199809252130.XAA24262@replay.com>



                       Flowers for Alger Anon
                                       - FPP#3

  The two youths ducked quickly behind a tree to avoid
being spotted by the senile old fart who had finally given up
on finding his shoes and climbed barefoot up the step-ladder
to begin drilling out the cannon muzzle on the War Surplus
Army Tank he had recently acquired.
  As he labored he mumbled grouchily to himself about
how he was going to "show that Commie Bastard, Igor", and all
of the other former residents of The Home(TM) what he thought
of their efforts to take over "his" CypherPunks Mailing List.

  "Distributed, my ass!" the old fart scowled as he
climbed down the ladder, then grinned madly as he patted the
stack of shells sitting next to the tank.
  "I'll distribute those bastards...They should'a
Checked The Archives", he said, pausing to scratch his head
and add, "TradeMark". Then continuing, "before they fucked
with me. Then they'da seen how I ChopChopped them Torah-
Torah Bastards when they tried to muscle in on my list."

  "It's 'mine'!" the grouchy, paranoid old fart shouted,
turning his head around quickly in all directions, as if
challenging, and half-expecting, Unseen Beings to dispute
his claim.

  The two youngsters ducked and tried not to giggle
as they ran down the hill, finally collapsing on the dirt
road near the bottom and venting their laughter.

  Tim C. May was the most hilarious of the Cypher
Punks they'd investigated so far, but 'all' of the CPUNX
were "more than suitable", as Carol Anne Cypherpunk had
declared while they were evaluating Jim Choate, "for slicing
and buttering, and placing on a tray of Christmas snacks."
  Blanc Weber had agreed heartily with the new
coconspirator (sometimes spelled with a hyphen), in their
'Quest to Question Anonymity', as the Army o' Dog-Bitch
Battallion Warrior Godesses, as they had proclaimed them-
selves, had Code Named their Chosen Mission From Dog.

  Carol Anne, choosing Androgyny over Anonymity,
changed her name to Carroll for The Mission, vowing to
balance the Tao by taking on any tasks requiring "male
energy", which, on a CypherPunks Mission From Dog(TM),
Carroll stated with a straight face, might include
"blowing Dimitri".
  The Girls(Maybe) split a gut laughing over Blanc's
reply that, being of a more peaceful nature than the 'Nuke
DC Clique', they might have to "blow" their way out of
dangerous situations by the use of Soft Targets rather
than with Heavy Weaponry.
  Then they decided to get serious, before they, too,
became candidates for The Home.


  Blanc Weber, a veteran Cypher Punk Cult of One
Neophyte(TM) had felt slighted when the Author, a relative
newcomer to the CPUNX list (at least under his 'TOTO' persona),
had chosen to initiate two male Cypher Punks, Back and
McCrackin, into his 3-Entity Circle of Eunuchs Gorilla Cell,
instead of including Blanc, who had established a fairly
close rapport with TOTO in their private email exchanges.
   Even more to Blanc's surprise, disappointment,
and suspicion, TOTO failed to respond even to her offer to
engage in joint Army of Dog Maneuvers with him across various
Electronic Boundaries of the InterNet.  She had begun to
suspect that TOTO's lack of response to her Digital Warrior
overtures were the result of something more sinister than
simple male chauvinism.
   Her suspicions were confirmed when she caught up
with TOTO, using his CJ Parker alias, at Defcon 6.0, as he

was Pontificating, under the guise of 'Chief Cypher Punks
Spokes Person', on the 'Anonymizer', for a guillible group
of young hackers.
   "It is run by a HedgeHog riding Lance's Coat Tails,
since Lance invented that thing that hangs on the back of
toilet bowls, and the Anonymizer is the Blue Thing that
hangs on the back of the hard drive.
   Blanc, stunned that TOTO, who claimed to be the
Author, was a Total Fucking Moron (TM), listened as he
continued .
   "The Anonymizer prevents Peeping TOMS from being
able to tell whose hairy dick is making a bad smell on the
carpet of the recipient's computer, after No Mail from
NoBody comes out of the Email Chutechute.
  Blanc realized that CJ Parker was also a Total
Fucking Lunatic(TM) as he glanced furtively around to
whisper a dire warning to the spellbound young hackers
hanging on his everyword.
  "And the Peeping Toms are everywhere.
  "As a matter of fact", he added glancing quickly
over both shoulders, "when you can't see them at all..."
he paused for effect, "...then you know that they're 'good'".
  "Real good", he added, turning to direct his
wild-eyed stare at Blanc, who had just finished going
through his knapsack while he was distracted.
  Blanc had hurried away, deeply disturbed by what
she had found in TOTO's bag.  It wasn't just stationery
from The Home--it was 'personalized' stationery from
The Home for the Criminally Insane.
  Blanc Weber's confusion and suspicions deepened
when her attempts to warn other CPUNKS about TOTO were
ignored by all except the few apparent females on the list,
such as Carol Anne Cypherpunk and World Renowned Bottle
Collector Lynn Harrison (who was long rumored to have
joined the male-dominated mailing list only as a forum
to trade her panties to young CPUNX in the throbbing
throes of puberty, in return for the Standard Issue Klien
Bottles, they received upon joining the Digital Anarchist
Union, Local 01, rumored to be headquartered in Bienfait,
Saskatchewan).
  When The Girls(Maybe) of the Bitch Battallion took
to the road to investigate the remaining CypherPunks, they
quickly discovered that 'all' of the verifiable Meat Space
Personalities they positively linked to the various
Cyperpunks Consistent Net Personas (TM) were, in fact,
certifiably Cuckoo Cock Suckers(TM) in MeatSpace Reality.
With the only readily apparent link between them being
their connection to the Home for the Criminally Insane.
  Some of the MeatSpace Personalities behind the
Digital Personas on the CPUNX Mailing List--Ian Goldberg,
Alec de Jeune, Ulf Moeller, Peter Trei and Jim Choate--were
Highly Social Sociopaths, capable of putting ona suit and
tie, if need be, and glad-handing business people and
purchasing agents (all the while slitting their sleeping
throats, in the Dark Corners of their mind).
  John Gilmore, Declan McCullagh, Robert Hettinga,
Vin McClellan, even Froomkin--all of the Mainstream
Dream/Actively Connected To Society/Cypherpunks MeatSpace
Verifiable Identities, without fail, shared the same
connection to The Home as id the Lithium Dream/Social
Outcast CPUNX Meatballs such as T.C. May, A.T. Hun,
Wm Geiger III, S. Sequencr, JYA, and the late Dale Thorn
(whose mysterious death was rumored to be the work of the
Shadowy Figures(TM) lurking behind the ctrl-alt-delete.com
website).
  Blanc and Carroll watched in total amazement as
Jim Choate's ludicrous/inane computer and business theories
seemed to be somehow transformed, by unseen hands working
behind the scenes, into fully functional and viable
RealWorld(TM) concepts, in Choate's work with the Armadillo
Group.  The Unseen Hands made The Girls(Maybe) very, very
nervous.
  What pushed the Army of Dog-Bitch Battalion
Warrior Godesses beyond nervousness, toward Paranoia & Fear,
was the fact that the MeatSpace Personalities behind the
Digital Personas of the CypherPunks inevitably appeared
to be verifiable outside of The Home 'only after the
CPUNKS PERSONA'S original appearance on the mailing list'.
  A Cloaked Anonymous Random Source(TM) that The
Girls(Maybe) knew only as Digital Throat, speaking to
Larynx in an UnderGround Reptilian Nazi Parking Garage
in DC (after having been fooled into believing she was
talking to Defcon McCullagh Chain Saw). told them,
"I was the head of the Personelle Department at Intel,
at the time Tim May claims to have been there.
  "Even though we couldn't spell the name of our
Department right, let alone the names of the employees,
I never forget a face, and Tim C. May definitely was
never employed at Intel.
  "As a matter of fact", Digital Throat revealed,
"when Intel's Legall Department sent Mr. May a letter
that warned him to Cease & Decist with his claims, he
showed up on our doorstep, barefoot, in a MailMan's Uniform,
with a Veritable ShitLoad(TM) of heavy weapons and arms,
and, after that, as far as most of us were concerned,
if Tim c. May said he was the goddam 'President' of
Intel, then he was the goddam President--end of story."
  Blanc Weber and Carol Anne Cypherpunk found the
same patterns repeated time and again in their investiga-
tions of CypherPunks MeatSpace Ident Histories.
  Records, Information and Data-- such as birth
certificates, school records, credit and employment
histories-- were not only 'existant', but were inevitably
'consistent' with claims made in posts to the CPUNKS
mailing list, in regard to the MeatSpace Ident Histories
behind the Digital Personas.
  However, once The Girls(Maybe) had begun
researching the Human Historical Records of the MeatSpace
Ident Histories--speaking to alleged friends, family,
coworkers, and the like--the paper Trails quickly
unravelled, and the Physical Ident Histories of ALL of
the male subscribers to the CypherPunks Disturbed Male
LISP were, in the end, traceable 'only' back to the Home...







From nobody at replay.com  Fri Sep 25 01:41:25 1998
From: nobody at replay.com (Anonymous)
Date: Fri, 25 Sep 1998 16:41:25 +0800
Subject: 
Message-ID: <199809252131.XAA24463@replay.com>



How about:

I'd like humping your mom with a prosthetic limb.
I'd like Hillary to get down on both knees and eat out Monica's ass.
I'd like nothing more than for anyone who even thinks about mentioning
Bill Clinton to spontaneously combust, preferably right in front of a gas
pump where his whole family is sitting in some sort of catatonic stupor,
unable to digest any information beyond that which The Machine feeds
them every day.

Who the fuck wouldn't drink to that?  For Christ's sake, I'd be buying!


At 10:34 PM 9/25/98 +0200, Anonymous wrote:
>On Thu, 24 Sep 1998 21:43:34 -0400 "Edwin E. Smith" 
>writes:
>>
>>
>>
>>If you have Microsoft Word (6.0 or later), and have a thesaurus
>>installed, do the following:
>>
>>1) Open a new, blank document.
>>2) Type in the words: I'd like to see Bill Clinton resign.
>>3) Highlight the entire sentence.
>>4) Click on the tools menu and select thesaurus (tools, language,
>>   thesaurus)
>>
>>Look what is immediately highlighted in the selection box. 
>>
>
>This was almost funny. Too bad the following sentences also work:
>I'd like to drink frog urine
>I'd like to hug large, purple dinosaurs
>I'd like to cook onions with garlic and tomatoes
>I'd like to strangle you with a mouse cable
> 





From pnet at proliberty.com  Fri Sep 25 02:19:50 1998
From: pnet at proliberty.com (pnet at proliberty.com)
Date: Fri, 25 Sep 1998 17:19:50 +0800
Subject: IP: National ID
Message-ID: 



>From: Larry Becraft 
>Subject: IP: National ID
>Date: Wed, 23 Sep 1998 17:17:56 -0500
>To: ignition-point at majordomo.pobox.com

>    The reason I write now is because we have only about another week
>(Oct. 2) to get in more objections to this regulation. I have just
>visited the DoT webpage

Do you have a URL for this page?

- tppt: Tom Paine, Perpetual Traveller; webmaster at proliberty.com
================================================================
The USA has the highest incarceration rate in the world (1.6 m)
Most of those in prison are there for victimless 'crimes' (63%)
Since 1979, property seized without trial, has increased by 2500%
In the 'War On Drugs', drugs do not die. People do.






From pnet at proliberty.com  Fri Sep 25 02:20:07 1998
From: pnet at proliberty.com (pnet at proliberty.com)
Date: Fri, 25 Sep 1998 17:20:07 +0800
Subject: IP: Funny Money: New $20 FRNs are here
Message-ID: 



Excerpt from the following:
>It also incorporates several
>>security features that have proved effective against would-be
>>counterfeiters: a watermark; enhanced security thread;

Of course no mention is made here of the enhanced ability for goons to
steal your money.

It has been reported that these 'security threads' enable detection
equipment at airports to measure, or estimate, the amount of cash a person
is carrying. This further enables seizures which are now taking place in
the proximity of US borders, with the excuse that the carrier of the cash
could be 'intended' to cross a border, without filing a customs report.
Mere possesion of 'large' amounts of cash, in the proximity of a US border,
is coming to be considered 'prima facie' evidence of 'money-laundering'.

See previous message:
>Date: Sat, 19 Sep 1998 08:32:43 -0400
>To: cypherpunks at cyberpass.net
>From: Robert Hettinga 
>Subject: IP: Tougher laws are sought to seize cash

If I had been smart enough to see this coming when they came out with the
new security threads in $100 bills, I never would have traded the old ones
in.

Of course, carrying gold or silver will set off the metal detectors too.

I wonder if diamonds show up on the scanners?

- Tom Paine


At 3:27 AM 9/25/98, Vladimir Z. Nuri wrote:
>From: believer at telepath.com
>Subject: IP: Funny Money: New $20 FRNs are here
>Date: Thu, 24 Sep 1998 17:05:38 -0500
>To: believer at telepath.com
>
>Source:  US Newswire
>http://www.usnewswire.com/topnews/Current_Releases/0924-109.txt
>
>U.S. Treasury, Federal Reserve Issue New $20 Note
>U.S. Newswire
>24 Sep 10:45
>
> U.S. Treasury, Federal Reserve Issue New $20 Note
> To: National and Financial Desks
> Contact: Hamilton Dix of the U.S. Department of the Treasury,
>          202-622-2960, or
>          Bob Moore of the Federal Reserve,
>          202-452-3215
>
>   WASHINGTON, Sept. 24 /U.S. Newswire/ -- Treasury Secretary Robert
>E. Rubin and Federal Reserve Board Chairman Alan Greenspan today
>announced the issuance of the redesigned $20 note, which includes new
>and modified security features to deter counterfeiting of U.S.
>currency.
>
>   Rubin and U.S. Treasurer Mary Ellen Withrow marked the
>issuance of the new notes in a ceremony at Treasury's Cash Room in
>Washington, D.C. More than two dozen regional events hosted by
>Federal Reserve banks and branches and major retailers were also
>conducted around the country.
>
>   "We have introduced a series of features that greatly raise the
>hurdle for counterfeiters," Rubin said. "Together these features
>amount to a formidable tool, and make spotting a counterfeit
>note easier than ever. For them to be effective, it is important that
>people stop for a moment to look for the new features."
>
>   The new $20 will replace older notes gradually, and older series
>$20 notes still in good condition will be recirculated. About
>$83 billion worth of $20 notes is currently in circulation, 80
>percent of those in the U.S. More than $450 billion worth of
>U.S. currency circulates around the globe.
>
>   The Series 1996 $20 note is the third U.S. currency note to be
>redesigned to include new and modified security features. New $10 and
>$5 notes are expected to be issued simultaneously in 2000, and a new
>$1 note with a more modest redesign will follow.
>
>   "We are confident that the introduction of this third redesigned
>note will be as smooth as that of the $100 and $50 notes," Chairman
>Greenspan said. "Older notes will not be recalled or devalued. All
>existing notes will continue to be legal tender."
>
>   Like the Series 1996 $100 and $50 notes introduced since 1996, the
>new $20 note has a familiar appearance. The size, color and
>historical subjects have not changed. It also incorporates several
>security features that have proved effective against would-be
>counterfeiters: a watermark; enhanced security thread; fine-line
>printing patterns; color-shifting ink; and a larger, off-center
>portrait that is the most noticeable change in the overall
>architecture of the note. There are also two features for the blind
>and visually impaired. The new $20 note includes a capability that
>will allow the development of technology to help the blind ascertain
>the denomination of their currency. In addition, the $20 and $50
>notes have a large numeral on the back that make the notes easier for
>millions of Americans with low vision to read.
>
>   The continuing introduction of redesigned notes is a critical
>component of the Federal government's anti-counterfeiting effort.
>The new series aims to maintain the security of the nation's currency
>as computerized reprographic technologies such as color copiers,
>scanners and printers become more sophisticated and more readily
>available. The $20 note is the most frequently counterfeited note in
>the United States.
>
>   Since the $20 note is so widely used in daily commerce and most
>frequently dispensed by ATMs, broad nationwide recognition of the new
>note when it is introduced will minimize apprehension on the part of
>the public. A public education campaign now underway encourages the
>public and people who handle cash every day to become familiar with
>the design and security features of the new notes. Retailers and
>financial institutions are educating their employees and customers by
>sending posters to their outlets, training cashiers, offering
>pamphlets to the public, and including information about the new note
>in advertising circulars and on shopping bags. More than 100
>constituency organizations have helped reach small business owners,
>loss prevention managers, visually impaired and older Americans, and
>others with a stake in the new note's introduction. U.S. embassies
>and consulates are using materials translated into 15 languages to
>conduct localized education outreach to ensure that local users of
>U.S. currency as well as financial institutions are prepared for the
>issuance of the new note.
>
>   Fact sheets on the new note, the history of U.S. currency and
>related agencies are available at http://www.moneyfactory.com.
>
> -0-
> /U.S. Newswire  202-347-2770/
> 09/24 10:45
>
>Copyright 1998, U.S. Newswire
>-----------------------
>NOTE: In accordance with Title 17 U.S.C. section 107, this material is
>distributed without profit or payment to those who have expressed a prior
>interest in receiving this information for non-profit research and
>educational purposes only. For more information go to:
>http://www.law.cornell.edu/uscode/17/107.shtml
>-----------------------
>
>
>
>
>**********************************************
>To subscribe or unsubscribe, email:
>     majordomo at majordomo.pobox.com
>with the message:
>     (un)subscribe ignition-point email at address
>**********************************************
>www.telepath.com/believer
>**********************************************






From aba at dcs.ex.ac.uk  Fri Sep 25 03:06:18 1998
From: aba at dcs.ex.ac.uk (Adam Back)
Date: Fri, 25 Sep 1998 18:06:18 +0800
Subject: 40-bit brute force RC4 speed records?
In-Reply-To: <199809251826.LAA09275@kebe.eng.sun.com>
Message-ID: <199809252244.XAA04853@server.eternity.org>




> Just curious, what's the speed record?  What if I had, oh, say, a 4-way Ultra
> Enterprise 450 at my disposal?

A Maspar: 1.5M keys/sec 

see:

	http://www.dcs.ex.ac.uk/~aba/ssl/

Adam





From blancw at cnw.com  Fri Sep 25 03:49:52 1998
From: blancw at cnw.com (Blanc)
Date: Fri, 25 Sep 1998 18:49:52 +0800
Subject: Is Toto in Kansas, or in MO
In-Reply-To: <199809252130.XAA24262@replay.com>
Message-ID: <000401bde8e0$2dd516e0$388195cf@blanc>




Who said this, "Toto":

   	"A long time ago, being crazy meant something.
  	"Now, everybody's crazy."

    ?

    ..
Blanc





From nobody at replay.com  Fri Sep 25 03:55:44 1998
From: nobody at replay.com (Anonymous)
Date: Fri, 25 Sep 1998 18:55:44 +0800
Subject: No Subject
Message-ID: <199809252358.BAA03888@replay.com>



"More importantly, as Noam Chomsky points out in "Manufacturing Consent",
lying politicians are the modern democratic equivalent of feudal tyrants
beating or executing citizens in more "uncivilized times".  "

Zappa said politics was the entertainment branch of industry.








  








From die at die.com  Fri Sep 25 04:03:31 1998
From: die at die.com (David Emery)
Date: Fri, 25 Sep 1998 19:03:31 +0800
Subject: arms collectors...
Message-ID: <19980925195613.A3801@die.com>



----- Forwarded message from "Thomas B. Roach"  -----


Washington Times, 25 Sep 98
Operable missile seized in customs
By Bill Gertz THE WASHINGTON TIMES

U.S.  and British authorities are investigating how a Russian-design
Scud missile was imported illegally by a weapons collector in
California, The Washington Times has learned.

"This is a full-blown missile," said John Hensley, a senior agent of the
U.S.  Customs Service in Los Angeles.  "The only thing missing is the
warhead."

A Scud B missile and its mobile transporter-erector launcher --minus the
warhead -- were seized Sept.  2 by customs agents in Port Hueneme,
Calif., about 35 miles north of Los Angeles, said officials familiar
with the case.

The missile system was licensed for importation by the Bureau of
Alcohol, Tobacco and Firearms.  But paperwork in the case was falsified,
and the missile system was not "demilitarized" -- rendered inoperable --
as required by import rules, Mr.  Hensley told The Times.

British customs officials are investigating the seller, a small firm
outside London, and U.S.  investigators are questioning an arms
collector from Portola Valley, Calif., near Palo Alto, who bought the
system, Mr.  Hensley said.

The missile transfer has raised fears about the proliferation of weapons
of mass destruction and missile-delivery systems.  It also could be an
embarrassment for the Clinton administration, which is engaged in a
major international diplomatic effort to halt missile exports by Russia
and China to the Middle East.  The importation raises questions about
U.S.  national security controls.

Mr.  Hensley said U.S.  military experts examined the missile and
determined that it was produced in Czechoslovakia in 1985.  The missile
was identified as an SS-1C, which the Pentagon has designated as a Scud
B.

Transfers of missiles like the Scud B, with a range of 186 miles, are
banned under the international export agreement known as the Missile
Technology Control Regime.

Customs officials said the missile was not identified until it was
driven off the British freighter that delivered it and an inspector
called customs agents to examine it.

Such weapons can be imported but must first be cut up with a blowtorch
so they can never be reassembled.

The officials identified the buyer only as a wealthy man who is a U.S.
citizen.  He is a legitimate arms collector -- apparently not linked to
terrorists or illicit arms dealers.  But the false paperwork has raised
questions about the deal and prompted the U.S. investigation.

			 Mr.  Hensley said the buyer had purchased a Scud missile earlier
that had been properly rendered inoperable.  But a photograph of that
missile was attached to the illegal system, seized Sept.  2, in an
effort to fool customs officials.

After examining the missile, customs agents called the ATF and were
surprised to learn that an ATF license had been issued for the missile
importation.

"We thought they were nuts," said one official close to the case.  The
missile system is being stored at the Navy's Pacific Missile Testing
Center in nearby Point Mugu, near Oxnard, where it has been impounded.

John D'Angelo, an ATF agent in Los Angeles, had no official comment on
the case.  "Routinely, the ATF and U.S.  Customs Service examine items
to determine their suitability for importation under federal
regulations," he said.  "We have not yet completed the inspection of
this importation and therefore can't discuss it."

The SS-1 Scud is a liquid-fueled missile that is among the most widely
deployed weapons in the world.  It is in service with more than 16
nations.  Iraq's military forces were able to extend the range of the
missile, which was fired extensively during the 1991 Persian Gulf war.

The chassis of the missile's launcher was identified as a MAZ-543 truck
used commonly by the former Soviet and Warsaw Pact forces for
short-range missiles.

"The guidance was totally intact and the engine was ready to go," Mr.
Hensley said.  "All you needed to do was strap on a garbage can full of
C-4 and you had a weapon." C-4 is military high explosive.

Concerning how the missile was handled by the British firm, Mr.  Hensley
said, "It is illegal to import this into the U.K., so the Brits are
wondering how this guy got this company to do this."

Investigators suspect the missile may have been bought in Europe on the
black market.

"Our concern is not so much that [the buyer] might have a licensing
problem," Mr.  Hensley said.  "It's just that in the aftermath of the
embassy bombings in Africa and the Oklahoma City bombing, that this
could be a real problem."

The Customs Service is intensifying its efforts to check for illegal
imports of such weapons, he said.

Stephen Bryen, a former Pentagon technology-transfer official, said
weapons like the Scud must be fully dismantled before they can be
allowed into the country.

"You have to worry anytime somebody brings a missile into the United
States, whatever cover it might be," Mr.  Bryen said. He noted that
terrorists or rogue states could use such collectors to acquire missiles
illegally.







From jvb at ssds.com  Fri Sep 25 06:00:50 1998
From: jvb at ssds.com (Jim Burnes)
Date: Fri, 25 Sep 1998 21:00:50 +0800
Subject: arms collectors...
In-Reply-To: <19980925195613.A3801@die.com>
Message-ID: 



On Fri, 25 Sep 1998, David Emery wrote:

> ----- Forwarded message from "Thomas B. Roach"  -----
> 
> 
> Washington Times, 25 Sep 98
> Operable missile seized in customs
> By Bill Gertz THE WASHINGTON TIMES
> 
> U.S.  and British authorities are investigating how a Russian-design
> Scud missile was imported illegally by a weapons collector in
> California, The Washington Times has learned.
> 
> "This is a full-blown missile," said John Hensley, a senior agent of the
> U.S.  Customs Service in Los Angeles.  "The only thing missing is the
> warhead."
> 
> A Scud B missile and its mobile transporter-erector launcher --minus the
> warhead -- were seized Sept.  2 by customs agents in Port Hueneme,
> Calif., about 35 miles north of Los Angeles, said officials familiar
> with the case.
> 

Scuze me for picking nits, but if the missile doesn't have a
warhead then its just a rocket (plus some guidance systems).

When does a rocket become a "weapon of mass destruction"?

Maybe what American officials should be investigating is how US defense
contractors got an export license to sell ICBM components to the ChiCom's. 
I heard it was OK'd by the pres himself -- theorectically for big
campaign donations.

If those missiles are targeted at US, then that would constitute
blatant treason, would it not?

Inquiring minds want to know.

jim







From billp at nmol.com  Fri Sep 25 06:33:48 1998
From: billp at nmol.com (bill payne)
Date: Fri, 25 Sep 1998 21:33:48 +0800
Subject: response much appreciated
Message-ID: <360C4F3D.5B6C@nmol.com>

Friday 9/25/98 7:34 PM

raymoon at moonware.dgsys.com
http://www.cis.ohio-state.edu/text/faq/usenet/assembly-language/x86/microsoft/faq.html

>Sorry, I have not done any ASM DLL programming and none with Visual
>Basic.  I looked for obvious errors but could not find any.
>
>Sorry that I could not be of any more help.
>
>Ray


Thanks so much for responding.

I have VB 6.0 and masm 6.11.

Got masm 6.11 working okay.

But I get an error 48 in VB 6.0.

I am sleuthing-out what is going wrong.

By starting simple.

I looked at the NT samples!

I notice that the NT 32 bit code is different from the 16 bit
api.

I thought I might have grossed you out.

And therefore got no response.

I am SICK about what happened.

But the word is getting out.  http://www.aci.net/kalliste/bw1.htm

I got PAID to write the attached.

I will let you know WITH SOURCE CODE of my progress.

And thanks so much for helping.

I am SUPER-PLEASED with

Applied Computer Online Services
2901 Moorpark Avenue Suite 100, San Jose, CA 95128, USA
el: (408) 248-8811 U.S. Sales: (888) 927-7543 or 888-9-APPLIED Fax:
(408) 249-2884

Sam and Joyce were VERY NICE.  Sam declared me a Delphi user.  And, 
therefore,  I got VB 6.0 for me for $261.43. http://www.samintl.com

With its 800 mb of documentation.  Grollier's encylopedia fits on a
650 mb cd rom!

I got a separate sheet showing the billing to my credit card.  Which
I will pass on.

Let me show you the machines I did the work for.

http://metriguard.com/HCLT.HTM

One version used the Forth from my book.

I wrote the assembler dlls for the PC Data System version which
interfaces to VB 3.0.

My feeling is that you might get some CONSULTING business if you create
a FORUM on masm at your site.

John Young is a LEADER on internet FORUMS http://www.jya.com/index.htm. 

And J Orlin Grabbe  http://www.aci.net/kalliste/, who edited the
attached article, is a leader on FORUMS on economics and CLINTON. 
Grabbe was on 60 minutes.

BUT you have to create a 

           DYNAMIC 

SIMPLE SITE containg INFORMATION OF USE.

Hope to hear from you again.  And NOTHING EVIL.

Other than MASM, FORTH, LINK, ML, NMAKE, Microsoft ... Worse, of couse,
than
the Great Satan.

best 
bill

Title: Black and White Test of Cryptographic Algorithms




	

	
		
			
				
					Jump to Forum
					Click Image to Jump to Next Article 
					Go to Text Only Print Version 
				
			
			
			Black and White Test
			of Cryptographic Algorithms
			by William H. Payne
			This article requires special formatting.
			Please Click Here to Read
			
				Send This Article to a Friend:
				
					
						
						�
					
						
							Your Name:
					
					
						
							
					
				
				
					�
					
						
							Email Address of your Friend: 
					
					
						
							
					
				
				
					�
					
						
							Your Email address:
					
					
						
							
					
				
				
					�
					�
					�
				
				
					�
					
						
							
					
				
			
			�
			Back to Home Page
			Quick Menu 
			Visit the Button Shop 
			
			
			Interactive Forum
			Black and White Test
			of Cryptographic Algorithms
			
			
			
			
			
			E-mail the Editor
			
			
			
			
			
			
			�
		
	





From vznuri at netcom.com  Fri Sep 25 08:17:55 1998
From: vznuri at netcom.com (Vladimir Z. Nuri)
Date: Fri, 25 Sep 1998 23:17:55 +0800
Subject: clinton body count
Message-ID: <199809260419.VAA10300@netcom13.netcom.com>



the sheeple shearing continues...

------- Forwarded Message

Date: 	Fri, 25 Sep 1998 10:50:33 -1000
From: Jonathan David Boyne 
To: Undisclosed recipients:;
Subject: [earthchanges] Re: The Clinton 'body count' - New alarm.. (fwd)



 http://www.worldnetdaily.com/exclusiv/980924.exrivero_clinton_bo.html
 THURSDAY SEPTEMBER 24, 1998
 
                    ------------------------------------------
                    [WorldNetDaily Exclusive]
                    ------------------------------------------
 
                    The Clinton 'body count'
                    New alarm over growing list
                    of dead close to president
 
                    By Michael Rivero
                    Copyright 1998, WorldNetDaily.com
 
                    "Dear Sir," began Monica Lewinsky's
                    somewhat peevish letter of July 3rd,
                    1997. In it, according to the recently
                    released report by Kenneth Starr, the
                    former intern chided the president for
                    failing to secure for her a new White
                    House job, and hinted that continued
                    stalling would result in word of their
                    affair leaking out.
 
                    The next day, Monica confronted Bill
                    Clinton in an Oval Office meeting she
                    described as "very emotional"; a meeting
                    which ended when the president warned
                    her, "It's illegal to threaten the
                    president of the United States."
 
                    Three days later, another former White
                    House intern, Mary Mahoney, was shot five
                    times in the back of the Georgetown
                    Starbuck's she managed. Two of her
                    co-workers were also killed. Even though
                    cash remained in the register, the triple
                    murder was quickly dismissed as a botched
                    robbery. No suspects have ever been
                    arrested.
 
                    Coincidence? Maybe.
 
                    Former Democratic National Committee
                    fundraiser and Commerce Secretary Ron
                    Brown was under criminal investigation.
                    Indictments seemed imminent. Ron Brown
                    had reportedly told a confidante that he
                    would, "not go down alone." Days later,
                    his plane crashed on approach to
                    Dubrovnik airport during a trade mission
                    excursion to Croatia. Military forensics
                    investigators were alarmed by what
                    appeared to be a .45-caliber bullet hole
                    in the top of Brown's head.
 
                    Coincidence? Maybe.
 
                    Yet another fundraiser was Larry
                    Lawrence, famed for his short residence
                    at Arlington National Cemetery. Less well
                    known is that he had been under criminal
                    investigation by the State Department for
                    three weeks when he died.
 
                    Coincidence? Maybe.
 
                    But for a growing number of Americans,
                    the sheer numbers of strange deaths
                    surrounding the career of Bill Clinton
                    has begun to raise serious questions. In
                    a meeting with Vernon Jordan, Monica
                    Lewinsky reportedly expressed fears that
                    she might, "end up like Mary Mahoney,"
                    and began to make sure that others knew
                    of her affair with Bill Clinton.
 
                    Of all the strange deaths surrounding the
                    Clintons, none has come under more
                    renewed scrutiny than the fate of White
                    House Deputy Counsel Vincent Foster, who
                    was found dead in Fort Marcy Park on July
                    20, 1993. The official investigation
                    concluded that Foster inserted a gun into
                    his mouth and pulled the trigger. Yet
                    according to the lab results neither
                    Foster's fingerprints nor blood was on
                    the gun, nor were powder granules or
                    bullet fragments traceable to that gun in
                    his wounds. The purported "suicide note"
                    was found to be a forgery by three
                    independent experts. The record of a
                    second wound on Foster's neck, and an FBI
                    memo that contradicts the official
                    autopsy, strongly suggests that Foster's
                    wounds were misrepresented in the
                    official report. The FBI's own records
                    revealed that deliberate deception was
                    used to link Foster with the gun found
                    with his body. Partly on the basis of
                    that evidence, the FBI is now in federal
                    court on charges of witness harassment
                    and evidence tampering in the case.
 
                    In normal police procedure, homicide is
                    assumed right from the start. Suicide
                    must be proven, because homicides are
                    often concealed behind phony suicides.
                    Yet in the case of Foster, serious doubts
                    persist regarding the credibility of the
                    evidence offered up in support of the
                    claim of suicide, and a recent Zogby Poll
                    revealed that more than two-thirds of all
                    Americans no longer think the official
                    conclusion of suicide is believable
 
                    The official conclusion regarding
                    Commerce Secretary Ron Brown's death was
                    that his plane was brought down by, "the
                    worst storm in a decade." However, the
                    Dubrovnik airport weather office, just
                    two miles from the crash site, could not
                    confirm the existence of any such storm,
                    nor did any other pilots in the area.
                    According to the April 8, 1996, Aviation
                    Week & Space Technology, three separate
                    radio links to the aircraft all quit
                    while the aircraft was still seven miles
                    from the crash, evidence that the plane
                    suffered a total electrical failure in
                    flight which was never investigated. The
                    perfectly cylindrical hole in Ron Brown's
                    skull never triggered an autopsy. After
                    Ron Brown's death, his co-worker, Barbara
                    Wise, was found locked in her office at
                    the Department of Commerce, dead,
                    bruised, and partially nude. Following
                    Brown's death, John Huang's new boss at
                    Commerce was Charles Meissner, who
                    shortly thereafter died in yet another
                    plane crash.
 
                    These and other questionable deaths have
                    been collected together in a document
                    known as the "Dead Bodies List," which
                    can now be found in many locations on the
                    World Wide Web. Some of the cases are
                    poorly documented and have been dismissed
                    until now as "conspiracy theory."
                    However, analysis of the "Dead Bodies
                    List" by experts on the Internet revealed
                    that in many cases, deaths whose
                    circumstances demanded an investigation
                    had been ignored.
 
                    Some events officially declared to be
                    accidents seem to stretch the bounds of
                    credulity. In one case, Stanley Heard,
                    member of a Clinton advisory committee
                    and chiropractor to Clinton family
                    members, and his lawyer Steve Dickson
                    were flying to a meeting with a reporter.
                    Heard's private plane caught fire, but he
                    was able to make it back to his airport
                    and rent another plane to continue his
                    journey. The rented plane then caught
                    fire. This time, Heard did not make it
                    back to the airport. Gandy Baugh,
                    attorney for Clinton friend and convicted
                    cocaine distributor Dan Lasater, fell out
                    of a building. Baugh's law partner was
                    dead just one month later. Jon Parnell
                    Walker, an RTC investigator looking into
                    Whitewater, interrupted his inspection of
                    his new apartment to throw himself off of
                    the balcony.
 
                    Nor does the pattern of suspicious deaths
                    discriminate by gender. Susan Coleman was
                    reportedly a mistress to Clinton while he
                    was Arkansas attorney general; she was
                    seven months pregnant with what she
                    claimed was Clinton's child when she
                    died. Judy Gibbs, a former Penthouse Pet
                    and call girl, reportedly counted Bill
                    Clinton among her clients. Shortly after
                    agreeing to help police in an
                    investigation into Arkansas cocaine
                    trafficking, Judy burned to death. Kathy
                    Ferguson, a witness in the Paula Jones
                    case, was killed with a gunshot behind
                    the ear and was declared a suicide, even
                    though her suitcases had all been packed
                    for an immediate trip. One month later,
                    Bill Shelton, Kathy's boyfriend and a
                    police officer who had vowed to get to
                    the bottom of Kathy's murder, was also
                    dead of a gunshot, his body dumped on
                    Kathy's grave.
 
                    Another alarming trend observed in these
                    deaths is how society's safeguards
                    against murder appear to have been
                    compromised. Many of the questionable
                    deaths involved either negligence or the
                    complicity of medical examiners.
 
                    Dr. Fahmy Malek was the Arkansas medical
                    examiner under then-Gov. Bill Clinton.
                    His most famous case involved his ruling
                    in the "Train Deaths" case of Don Henry
                    and Kevin Ives in which Dr. Malek ruled
                    that the two boys had fallen asleep on
                    the railroad tracks and been run over by
                    a train. A subsequent autopsy by another
                    examiner found signs of foul play on both
                    the boys' bodies and concluded that they
                    had been murdered. According to Jean
                    Duffey, the prosecutor in the Saline
                    County Drug Task Force, the two boys
                    accidentally stumbled onto a "protected"
                    drug drop and were killed for it. Dan
                    Harmon, the Arkansas investigator who
                    concluded there was no murder, is now in
                    prison on drug charges. Despite the
                    evidence for murder and national
                    exposure, the Henry/Ives case has never
                    officially been re-opened, and Jean Duffy
                    has since left Arkansas out of fear for
                    her life. Several witnesses in the
                    Henry/Ives case later died and were ruled
                    as either suicides or natural causes by
                    Dr. Malek, whose willingness to provide
                    an innocuous explanation for these deaths
                    is illustrated in one case where he
                    claimed that a headless victim had died
                    of natural causes. Malek claimed that the
                    victim's small dog had eaten the head,
                    which was later recovered from a trash
                    bin. When pressed to fire Dr. Malek, Gov.
                    Clinton excused the medical examiner's
                    performance as the result of overwork and
                    gave him a raise.
 
                    Dr. Malek's Washington D.C. counterpart
                    was Fairfax, Virginia, Medical Examiner
                    James C. Beyer. Long before his autopsy
                    on Vincent Foster, Beyer's work was
                    disputed. In the case of Tim Easely,
                    Beyer ignored obvious defensive wounds,
                    and eyewitness reports of an argument
                    between Easely and his girlfriend, to
                    conclude that Easely had committed
                    suicide by stabbing himself in the chest.
                    When an outside expert called attention
                    to the fact that Easely had been stabbed
                    clear through one of his palms, the
                    girlfriend confessed to the murder. In
                    the case of Tommy Burkett, Beyer ignored
                    signs of violence done to Burkett to rule
                    it was a simple suicide. A subsequent
                    autopsy showed that Beyer had not even
                    done the work he claimed in his original
                    autopsy. Even though Beyer showed X-rays
                    to Burkett's father, Beyer later claimed
                    they did not exist. When Beyer performed
                    the Foster autopsy, he wrote in his
                    report that X-rays had been taken, then
                    again claimed they never existed when
                    asked to produce them.
 
                    In some cases, the deaths simply have no
                    innocuous explanation, One witness, Jeff
                    Rhodes (who had information on the
                    Henry/Ives murders) was found with his
                    hands and feet partly sawn off, shot in
                    the head, then burned and thrown in a
                    trash bin. Another obvious murder was
                    Jerry Parks, Clinton's head of security
                    in Little Rock. Immediately following
                    news of Foster's death, Parks reportedly
                    told his family, "Bill Clinton is
                    cleaning house." Just weeks after the
                    Parks' home had been broken into and his
                    files on Clinton stolen, Parks was shot
                    four times in his car.
 
                    Ron Miller, on whose evidence Nora and
                    Gene Lum were convicted of laundering
                    Clinton campaign donations, went from
                    perfect heath to death in just one week
                    in a manner so strange that his doctors
                    ordered special postmortem tests. The
                    results of those tests have never been
                    released, but toxicologists familiar with
                    the case suggest that Miller's symptoms
                    are consistent with Ricin, a cold war
                    assassin's poison.
 
                    For a fortunate few the murder attempts
                    have failed. In the case of Arkansas drug
                    investigator Russell Welch, his doctors
                    were able to identify that he had been
                    infected with military anthrax in time to
                    save his life. Gary Johnson, Gennifer
                    Flowers' neighbor whose video
                    surveillance camera had accidentally
                    caught Bill Clinton entering Flowers'
                    apartment, was left for dead by the men
                    who took the video tape. Gary survived,
                    although he is crippled for life. L.J.
                    Davis, a reporter looking into the
                    Clinton scandals, was attacked in his
                    hotel room but survived (his notes on
                    Clinton were stolen). Dennis Patrick,
                    whose bond trading account at Dan
                    Lasater's company was used to launder
                    millions of dollars of drug money, has
                    had four attempts on his life.
 
                    But the real importance of the "Dead
                    Bodies List" isn't what it tells us of
                    modern political intrigues, but what it
                    tells us of ourselves, in how we respond
                    to it. The list has been around for quite
                    some time, largely ignored by the general
                    public, completely ignored by the
                    mainstream media. The common reaction has
                    been that such a list is unbelievable,
                    not for its contents, but for its
                    implications. For that reason, most
                    Americans have, until recently, accepted
                    at face value the official assurances
                    that all these deaths are isolated
                    incidents with no real meaning; that all
                    the indications of foul play and cover-up
                    are just an accumulation of clerical
                    error and "overwork"; that it's all just
                    "coincidence."
 
                    On Aug. 17, as Bill Clinton admitted his
                    "inappropriate relationship" with Monica
                    Lewinsky on nationwide television,
                    Americans began to confront the
                    unavoidable fact that this president and
                    his administration had lied to the public
                    about a rather trivial matter. Americans
                    came to realize that this president and
                    his administration could no longer safely
                    be assumed to have told the truth on more
                    serious matters.
 
                    In this new climate of doubt, the "Dead
                    Bodies List" has enjoyed a new vogue,
                    albeit a dark one. Talk radio discusses
                    it. Total strangers e-mail it to each
                    other. What was unthinkable a few months
                    ago has become all too plausible.
                    Political murder has come to America.
                    Those cases on the "Dead Bodies List"
                    where hard evidence directly contradicts
                    the official conclusion have come under
                    renewed scrutiny.
 
                    It takes courage for the average citizen
                    to accept that the government has lied to
                    them, for by doing so, the citizen also
                    accepts the obligation to do something
                    about it. Americans know beyond a doubt
                    that they have been lied to. Americans
                    are discovering that they cannot ignore
                    the fact of being lied to without
                    sacrificing that part of the American
                    self-image that holds honor and justice
                    as ideals. But as the above poll would
                    suggest, such a sacrifice is no longer
                    acceptable.
 
                 -----------------------------------------------------------
                                  [WorldNetDaily.com]
                   ---------------------------------------------------------
                               � 1998 Western Journalism Center
                   ---------------------------------------------------------
                     This page was last built 9/24/98; 11:51:28 
                              Site: matlanta at mindspring.com
 
 *** A List of Strange Deaths of Individuals Who All Had Verifiable 
     Ties with Bill Clinton
 http://www.devvy.com/death_list.html
 
 VINCE FOSTER FIVE YEARS AFTER
 Unsolved Mystery Hampers All Starr's Probes By Carl Limbacher
 http://www.esotericworldnews.com/vince.htm
 
 VINCE FOSTER INVESTIGATIONCHRIS RUDDY, (PITTSBURGH TRIBUNE) 
 http://www.ruddynews.com
 Christopher Ruddy's New Web Site 
 http://www.newsmax.com/insidecover.shtml
 Vince Foster - Patrick Knowlton v. FBI Agent Bransford
 http://www.monumental.com/lawofcjc/pk/
 *** Foster "J'Accuse!"
 http://www.angelfire.com/fl/pjcomix/zola1.html
 
 EENIE MENA MINIE MOE...
 http://www.esotericworldnews.com/eenie.htm
 
 The Mena Coverup
 http://www.esotericworldnews.com/mena.htm
 
 THE "SECRET" CHEMICAL FACTORY THAT NO ONE TRIED TO HIDE
 http://www.esotericworldnews.com/london.htm
 
 
 American Patriot Friends Network (APFN)
 APFN EMAIL LIST SUBSCRIBE/UNSCBSCRIBE IN SUBJECT LINE TO APFN at netbox.com
 APFN ONELIST: http://www.onelist/subscribe.cgi/apfn
 http://w20.hitbox.com/wc/index.cgi?W50887524
 http://esotericworldnews.com/apfncont.htm
 http://www.freeyellow.com/members5/apfn/
 
 
 ----------------------- Headers --------------------------------
 Return-Path: 
 Received: from  rly-za04.mx.aol.com (rly-za04.mail.aol.com [172.31.36.100])
by air-za04.mail.aol.com (v50.11) with SMTP; Thu, 24 Sep 1998 22:49:20 -0400
 Received: from heather.greatbasin.com (heather.greatbasin.net
[207.228.35.41])
 	  by rly-za04.mx.aol.com (8.8.8/8.8.5/AOL-4.0.0)
 	  with ESMTP id WAA15772;
 	  Thu, 24 Sep 1998 22:46:20 -0400 (EDT)
 Received: from caliente.igate.com ([207.228.53.226])
 	by heather.greatbasin.com (8.9.0/8.8.8) with ESMTP id SAA08413;
 	Thu, 24 Sep 1998 18:38:04 -0700 (PDT)
 Message-ID: <360AF264.C0288E60 at caliente.igate.com>
 Date: Thu, 24 Sep 1998 18:31:16 -0700
 From: American Patriot Friends Network 
 Reply-To: APFN at netbox.com
 Organization: American Patriot Friends Network
 X-Mailer: Mozilla 4.05 [en] (Win95; I)
 MIME-Version: 1.0
 To: "\"apfn at onelist.com\"" 
 Subject: The Clinton 'body count' - New alarm..
 Content-Type: text/plain; charset=iso-8859-1
 Content-Transfer-Encoding: 8bit
 
  >>


- - ------------------------------------------------------------------------
To unsubscribe from this mailing list, or to change your subscription
to digest, go to the ONElist web site, at http://www.onelist.com and
select the User Center link from the menu bar on the left.



- - --------------0F193EECF4CB9441348B1B97--


- ------- End of Forwarded Message


------- End of Forwarded Message





From vznuri at netcom.com  Fri Sep 25 08:33:42 1998
From: vznuri at netcom.com (Vladimir Z. Nuri)
Date: Fri, 25 Sep 1998 23:33:42 +0800
Subject: IP: ISPI Clips 4.73: Europeans Bristle Over NSA's ECHELON-So Should You
Message-ID: <199809260435.VAA11807@netcom13.netcom.com>




From: "ama-gi ISPI" 
Subject: IP: ISPI Clips 4.73: Europeans Bristle Over NSA's ECHELON-So Should You
Date: Fri, 25 Sep 1998 01:12:58 -0700
To: 

ISPI Clips 4.73: Europeans Bristle Over NSA's ECHELON-So Should You
News & Info from the Institute for the Study of Privacy Issues (ISPI)
Friday September 24, 1998
ISPI4Privacy at ama-gi.com
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
This From: The Baltimore Sun, September 19, 1998
http://www.sunspot.net

NSA listening practices called European `threat'
European Parliament report accuses agency of widespread spying
http://www.sunspot.net/cgi-bin/editorial/story.cgi?storyid=900000194001

By
Neal Thompson
Sun Staff

The National Security Agency has incurred the wrath of some U.S. allies and
triggered debate about increased global eavesdropping, thanks to a new
report that accuses the agency of spying on European citizens and
companies.

With the help of a listening post in the moors of northern England, NSA for
nearly a decade has been snatching Europe's electronic communications
signals, according to a report for the European Parliament.

"Within Europe, all e-mail, telephone and fax communications are routinely
intercepted by the United States National Security Agency, transferring all
target information to Fort Meade," said the report.

`Powerful threat'

It warned that the NSA's tactics represent a "powerful threat to civil
liberties in Europe" at a time when more communication -- and commerce --
is conducted electronically.

A preliminary version of the report circulated overseas in recent months,
touching off heated debate, with front-page stories in Italy, France,
Scotland, England, Belgium and even Russia.

The NSA won't discuss the report or even admit that the listening post
exists.

But this week, two days of debate in the European Parliament continued the
extraordinary public disclosure of comprehensive post-Cold War spying by
the agency. On Wednesday, the Parliament passed a resolution seeking more
accountability from such eavesdropping arrangements and more assurances
that they won't be misused.

"We want to make sure that somebody's watching them," said Glyn Ford, a
British member of the European Parliament, the legislative body for the
15-member European Union.

Observers say this was the first time a governmental body has described in
detail -- and then criticized -- the NSA's tactics.

"The cat's well and true out of the bag," said Simon Davies, director of
the London-based watchdog group Privacy International. "I would argue that
we have made the grandest step in 50 years toward accountability of such
national security transparencies."

The report describes a sophisticated program called Echelon, which the NSA
established in conjunction with British intelligence agencies. The program
includes a listening post in Menwith Hill, in Yorkshire, whose satellite
dishes soak up the satellite and microwave transmissions carrying Europe's
telephone conversations, faxes and e-mail.

Unlike Cold War spying aimed at the military, Echelon is a global
electronic surveillance system that targets individuals, businesses,
governments and organizations, the report says.

The U.S. shares the information with Britain, Canada, Australia and New
Zealand as part of an intelligence-sharing agreement called UKUSA. Each
nation has its own set of key words, so it can seek information on specific
issues, the report states.

Europe is but a fraction of Echelon's target area -- and the Menwith Hill
post is one of at least 10 around the world, the report adds.

"One reason its a bigger deal over there than it is over here [in the U.S.]
is because the SIGINT [signals intelligence] systems are over their heads
and not our heads," said Jeffrey Richelson, an analyst with the National
Security Archives, a U.S. group seeking to declassify intelligence related
documents.

Echelon repercussions

But the disclosure of Echelon could soon resonate across the Atlantic after
the European Parliament action. Furthermore, it could complicate current
negotiations between the U.S. and the European Union over encryption
programs that scramble or encode computer information, said Parliament
member Ford.

The U.S. has been lobbying for back-door access to such codes for security
reasons.


--------------------------------NOTICE:------------------------------
ISPI Clips are news & opinion articles on privacy issues from
all points of view; they are clipped from local, national and international
newspapers, journals and magazines, etc. Inclusion as an ISPI Clip
does not necessarily reflect an endorsement of the content or opinion
by ISPI. In compliance with Title 17 U.S.C. section 107, this material is
distributed free without profit or payment for non-profit research
and educational purposes only.
---------------------------------------------------------------------------

ISPI Clips is a FREE e-mail service from the "Institute for the Study
of Privacy Issues" (ISPI). To receive "ISPI Clips" on a regular bases
(up to 3 - 8 clips per day) send the following message  "Please
enter [Your Name] into the ISPI Clips list: [Your e-mail address]" to:
ISPIClips at ama-gi.com  .

The Institute for the Study of Privacy Issues (ISPI) is a small
contributor-funded organization based in Victoria, British Columbia
(Canada). ISPI operates on a not-for-profit basis, accepts no
government funding and takes a global perspective.

ISPI's mandate is to conduct & promote interdisciplinary research
into electronic, personal and  financial privacy with a view toward
helping ordinary people understand the degree of privacy they have
with respect to government, industry and each other and to likewise
inform them about techniques to enhance their privacy.

But, none of this can be accomplished without your kind and
generous financial support. If you value in the ISPI Clips service or if
you are concerned about the erosion of your privacy in general, won't
you please help us continue this important work by becoming an "ISPI
Clips Supporter" or by taking out an institute Membership?

We gratefully accept all contributions:

  Less than $60    ISPI Clips Supporter
          $60 - $99    Primary ISPI Membership (1 year)
      $100 - $300    Senior ISPI Membership (2 years)
More than $300    Executive Council Membership (life)

Your ISPI "membership" contribution entitles you to receive "The ISPI
Privacy Reporter" (our bi-monthly 12 page hard-copy newsletter in
multi-contributor format) for the duration of your membership.

For a contribution form with postal instructions please send the following
message "ISPI Contribution Form" to ISPI4Privacy at ama-gi.com .

We maintain a strict privacy policy. Any information you divulge to ISPI
is kept in strict confidence. It will not be sold, lent or given away to
any third party.











**********************************************
To subscribe or unsubscribe, email:
     majordomo at majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email at address
**********************************************
www.telepath.com/believer
**********************************************





From vznuri at netcom.com  Fri Sep 25 08:33:48 1998
From: vznuri at netcom.com (Vladimir Z. Nuri)
Date: Fri, 25 Sep 1998 23:33:48 +0800
Subject: IP: Analysis of a Hack: Why was NYT Different?
Message-ID: <199809260435.VAA11818@netcom13.netcom.com>




From: believer at telepath.com
Subject: IP: Analysis of a Hack: Why was NYT Different?
Date: Fri, 25 Sep 1998 04:09:43 -0500
To: believer at telepath.com

Source:  Online Journalism Review
http://olj.usc.edu/indexf.htm?/sections/

September 17, 1998

Analysis of a Hack
By Doug Thomas, Online Journalism Review Staff Columnist 
 
The following report is based in part on interviews conducted with Kevin
Mitnick and John Markoff, two key people whose names were invoked as part
of the September 13, 1998 hack of The New York Times Web site. 
 
On Sunday, September 13, a group calling themselves "Hackers for Girlies"
hacked into The New York Times Web site, forcing the Times to take its site
offline for nine hours - hours that happened to be on what was potentially
one of the paper's biggest days in the paper's online history. According to
the Times, traffic that was already up 35% on Saturday was expected to
double on Sunday, in large part due to The New York Times' coverage of the
Starr Report and the report's full text, which was also on the site. 
 
The hack, which was by all accounts a fairly sophisticated attack, is
different from most previous hacks in a number of ways. There have
previously been hacks of Web pages designed to express political
dissatisfaction. The Department of Justice Web page, for example, was
hacked in response to the passage
of the Communications Decency Act. Sites of both the Conservative and Labor
parties in Britain were hacked prior to elections. But this is the first
hacking incident - which could also be considered a political intervention
- where a major media outlet has been financially damaged over the public
perception that their coverage was unfair. 
 
At the heart of the dispute is the case of Kevin Mitnick, and at issue for
hackers is the question of Times technology reporter John Markoff's
coverage of Mitnick's case. Mitnick, who has served the last three and a
half years as a pre-trial detainee at the federal Metropolitan Detention
Center in Los Angeles, was the subject of several Times stories written by
Markoff. He was ultimately the subject of a best-selling novel co-authored
by Markoff and Tsutomu Shimomura, the San Diego-based security expert who
helped the FBI track and capture Mitnick. 
 
Hackers allege that Markoff used his position at the Times to hype the
story of Mitnick's arrest and capture - and to demonize Mitnick in the
public imagination. These perceptions, according to the hacker community,
account in large part for Mitnick's continued incarceration in a
maximum-security jail and his denial of the right to a bail hearing. He is
only four months from trial on a 25-count federal indictment for alleged
hacking. 

 In short, the message that hackers left on the Times Web site could be
boiled down to this: They feel that the way hackers are covered by the
mainstream media generally, and by The New York Times specifically, is
unfair. They are disturbed both by what is written about hackers, as well
as what stories are overlooked. 

 The battle over such representations continues to be played out in the
coverage of the hack itself. Mitnick learned of the Times hack through
local radio broadcast reports, some of which described it as an "act of
Internet terrorism" led by Mitnick. But Mitnick said in an interview that
he was upset both by the incident and the subsequent coverage of it. 
 
The message that the hackers left Sunday came in two parts: the page that
was displayed on the Times' Web site and the comments left in the HTML
code, which were far more articulate than the hacker-speak that
appeared on the surface. The hackers themselves indicate this in their P.S.
"0UR C0MMENTS ARE M0RE 'LEET THAN 0UR TEXT. DOWNLOAD THE SOURCE T0 TH1S
PAGE AND P0NDER 0UR W1ZD0M." It is in the comments embedded in the source
code that the hackers describe "the real meaning" of the page, including
supporting quotations from Tennyson, Voltaire and Milton. 
 
The hackers' central grievance stems from what they see as Markoff's
involvement in the pursuit and capture of Mitnick. The Web page's message
targets Markoff, specifically asking: "D0 YOU HAV3 N1GHTMAR3S ABOUT H3LP1NG
1MPRIS0N K3VIN? KN0WING THAT Y0UR LI3S AND D3C3IT H3LP3D BR1NG D0WN TH1S
INJUST1C3?" 
 
What lies beneath the code in the comments spells out the hackers'
complaint more directly: "The injustice Markoff has committed is criminal.
He belongs in a jail rotting instead of Kevin Mitnick. Kevin is no dark
side hacker. He is not malicious. He is not a demon. He did not abuse
credit cards, distribute the software he found or deny service to a single
machine. Is that so hard to comprehend?" 
 
Markoff, in an interview Tuesday, said his coverage of Mitnick's case was
totally objective. After years of covering Mitnick and because of his close
connections with Shimomura, Markoff said he found himself with
"access to remarkable events" and wrote about them "as accurately and
clearly as I could." 
 
"There were no dilemmas," he said. "I told my Times editors what I was
doing every step of the way." 
 
Regarding the decision to make a Page One story of the FBI pursuit of
Mitnick, he said: "I didn't place the
story." 
 
"If hackers are upset and believe the story was hyped, they are targeting
the wrong person," Markoff said. "Their quarrel is with the Times' editors,
not me." 
 
Although the term given to Mitnick - "darkside hacker" - did figure
prominently in Markoff's book, "Cyberpunk," which he co-authored with Katie
Hafner, Markoff said that the "darkside" moniker was "created by the
Southern California press." He said the term appeared in stories by both
the Los Angeles Times and the Daily News in the San Fernando Valley well
before he ever used it. 
 
Markoff thinks the hack against the Times has the potential to do
"tremendous damage" to Mitnick. If Mitnick's defenders want to make the
claim that Mitnick and people like him are "harmlessly wandering through
cyberspace," Markoff said, an event like this is the "clearest example to
contradict that." 
 
Emmanuel Goldstein, editor of the hacker publication 2600, sees things
differently. "It's not what I would have done," Goldstein said. "But it got
the story out. It is a story that has been suppressed for so long." 
 
The popular sentiment among hackers is that the coverage of the Mitnick
case hyped his arrest and capture - by referring to him as the "Internet's
Most Wanted," as a "cyberthief" and in some cases as a "terrorist" - but
the press has paid little or no attention to issues of Mitnick's long
incarceration without a hearing, the denial of his right to a bail hearing,
or to the fact that the government has failed to provide Mitnick with
access to the evidence to be presented against him. 
 
Even Markoff, who insists that he played no part in putting Mitnick in
jail, indicated that he has "a lot of sympathy for Kevin," acknowledging
that Mitnick is in a "difficult situation" and is faced with a "grim set of
alternatives." But Markoff rejects the notion that anyone but Mitnick
himself is responsible for his current situation. "Kevin made himself what
he is," Markoff said. 

 A statement from Mitnick's attorney,  released on Monday, addressed the
hack of the Times: "Kevin Mitnick
 appreciates the support and good wishes of those who speak out against his
continued state of incarceration for years without bail. However, he does
not encourage any individuals to engage in hacking pranks on his behalf.
Kevin believes other avenues exist that can be more beneficial to his
circumstances." Supporters were directed to the Mitnick Web site at
www.kevinmitnick.com. 

 In the aftermath of the hack, several issues remain. The New York Times
will undoubtedly claim that the damage done to their site has cost them
substantial lost revenue and a decrease in traffic and e-commerce.
Goldstein, however, quarrels with the claim that any real damage was done.
"They didn't trash the Times' Web site and they could have," he said,
indicating that the hack was intended to send a message, rather than to do
any serious damage. 
 
This is not the first time a Web site has been hacked in support of
Mitnick. In fact, in December of 1997, hackers posted a threatening message
at Yahoo!, demanding the release of Mitnick. While that incident can be
dismissed as a prank, the Times attack is something altogether different.
Even the message the hackers left on the Times' page criticizes other
hackers for not having "a real purpose" and for not leaving a "meaningful
statement" in their hacks. 

� Copyright 1998 Online Journalism Review
 
Doug Thomas is a professor at the Annenberg School for Communication. His
column, Hacker Alert, appears monthly in the Online Journalism Review. 
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo at majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email at address
**********************************************
www.telepath.com/believer
**********************************************





From vznuri at netcom.com  Fri Sep 25 08:33:54 1998
From: vznuri at netcom.com (Vladimir Z. Nuri)
Date: Fri, 25 Sep 1998 23:33:54 +0800
Subject: IP: Why is This Important? Read: The Politics of Hacking
Message-ID: <199809260435.VAA11835@netcom13.netcom.com>




From: believer at telepath.com
Subject: IP: Why is This Important? Read: The Politics of Hacking
Date: Fri, 25 Sep 1998 04:19:59 -0500
To: believer at telepath.com

----------------------------
NOTE:  Here is why the issue is important:  "Mitnick has been incarcerated
for three and a half years without a hearing and has had the evidence to be
brought against him withheld from discovery."  No habeas corpus.  No
hearing.  No evidence.  This man is a political prisoner to whom justice
has been denied.  Is he guilty?  No one will ever know if there is never a
trial.  Presumption of innocence is obviously a thing of the past.  
----------------------------

Source:  Online Journalism Review
http://olj.usc.edu/indexf.htm?/sections/

September 16, 1998

The Politics of Hacking
By Doug Thomas, Online Journalism Review Staff Columnist 
 
Over the past few years there has been a decided shift in the way hackers
think about the world. Born from an idealistic model of personal,
individual achievement, the very idea of hacking has always been a singular
and isolated phenomenon. In the early days, hackers rarely worked in groups
or teams, preferring to hand programming solutions off to one another in
the process of what they called "bumming code." Each time a
program was handed off, it would be improved slightly and then passed along
to the next hacker, and so on. 
 
Hackers of the 1980s and 1990s, who began to form loosely knit groups such
as the Legion of Doom and Masters of Deception, practiced a similar ethic,
whereby hackers would learn from one another, but generally the
understanding was everyone for themselves (especially whenever someone got
arrested!). 
 
That ethic, which began with the hackers of the 1960s and 1970s, is
beginning to dissolve in the face of politics. 
 
Old school hackers are oftentimes disgusted by the antics of their progeny
(and make no mistake they are their offspring). Indeed, many old-timers
insist that today's hackers are unworthy of the moniker "hacker" and prefer
to terminologically reduce them, calling them "crackers" instead. That
distinction has never held much truck with me. It denies too much history,
too many connections, and is often nothing more than a nostalgic, and very
convenient, recollection of their own histories. 
 
The earliest hackers did most of what they criticize today's hackers for.
Let's face it, they stole (the Homebrew Computer Club was famous for
pirating code), they regularly engaged in telephone fraud (even Jobs and
Wozniak built and sold blue boxes), they used all sorts of hacks to avoid
paying for things (remember TAP? TAP stands for Technological Assistance
Program; it was a newsletter put out by the Yippies that taught people how
to use technology to avoid paying for things.), and they had no problem
with breaking and entering or hacking a system if it meant they could spend
more time on the mainframe. 
 
They also tended to forget a lot of things. Who paid for all those
computers at Harvard, Cornell and MIT? Who funded ARPAnet? Could it be the
same folks who were busily napalming indigenous persons halfway around the
globe? And why were those computer labs shielded by 1" thick bullet-proof
plexiglass during the 1960s? The old school history is not as simple as it
sometimes appears. Yes, they were the geniuses who gave us the first PCs,
but along the way, they tended to be implicated in a lot of nasty business,
to most of which they were all too willing to turn a blind eye. 
 
I don't mean to suggest that old school hackers were not hackers, only that
they weren't all that different from the new schoolers that they like to
brands as criminals, crackers and the like. 
 
Where the old school seems to come off as (at best) forgetful, the new
school has shown a new kind of commitment, something that is virtually
unthinkable to hackers of yesteryear. 
 
The hackers of the late 1990s are becoming political. There is a new move
to group action, political involvement and intervention. 
 
Recently, seven members of the Boston hacker collective, the L0pht,
testified on Capitol Hill before the Senate Governmental Affairs Committee.
As Peter the Great described in his write-up of the testimony: "Mudge gave
a short, elegant statement which set the tone for the rest of the day's
talks. He expressed his hope for an end to the mutual animosity that has
long existed between the hacker community and the government and his
sincere desire that the ensuing dialogue would pave the way towards
civility and further collaboration between
the two sides. This was a beautiful moment. It was as if a firm hand of
friendship was being extended from the hacker community to the senate. I
was moved, truly." 
 
This is a gesture that would have been virtually unthinkable only a few
years ago. 
 
Even more dramatic is the fact that the Cult of the Dead Cow has a policy
on China. In part, that policy was used in their justification for the
release of Back Orifice, a computer security program that exploits
vulnerabilities in Windows 95 and 98 operating systems. According to the
cDc, Microsoft's decision to choose profit over human rights in supporting
trade with China implicates them in the politics of oppression. The cDc has
been working to support a group of Chinese dissidents, the Hong Kong
Blondes, who are learning to use encryption and hacking techniques to stage
interventions in Chinese governmental affairs to protest Chinese human
rights violations. 
 
 Most recently,  at home,  hackers have begun to band together in an effort
to raise public awareness about the imprisonment of Kevin Mitnick, a hacker
facing a 25-count federal indictment. Mitnick has been incarcerated for
three and a half years without a hearing and has had the evidence to be
brought against him withheld from discovery. In response to Miramax's
decision to film Mitnick's story, hackers have banded together, launching a
full-scale protest (among other things) in front of Miramax's offices in
New York. Their campaign also includes letter writing initiatives, the
distribution of "FREE KEVIN" bumper stickers, Web sites, T-shirts and even
an online ribbon campaign. Another group recently hacked the New York Times
Web site. 
 
The late 1990s marks a point in time when computers have begun to affect us
in undeniably political ways. The globalization of technology, coupled with
the power that the computer industry wields, makes hacking, in this day and
age, essentially a political act. Some of the effects can be seen in the
highly politicized trial of Kevin Mitnick and in the efforts to pass the
WIPO treaty, legislation that makes hacking (even legal experimentation) a
criminal act. 
 
The differences between old school and new school hackers are not as great
as they might appear or as they are often made out to be. If there are
differences, they reside in the fact that hackers today are stepping up 
and taking a kind of political responsibility that was altogether alien to
their predecessors. 
 
The future of hacking goes hand in hand with the future of technology. In
today's society we have passed the point where we can deny the import of
such action based on some nostalgic vision of our relationship to computers
and the world. It is high time that the hackers of yesterday take a long,
hard and sober look at their own history and begin to recognize the ways in
which the hackers of today are picking up and championing an agenda which
the old school hackers can no longer hide from. 

� Copyright 1998 Online Journalism Review

Doug Thomas is an Online Journalism Review staff columnist and a professor
at the Annenberg School for Communication. 
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo at majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email at address
**********************************************
www.telepath.com/believer
**********************************************





From vznuri at netcom.com  Fri Sep 25 08:34:06 1998
From: vznuri at netcom.com (Vladimir Z. Nuri)
Date: Fri, 25 Sep 1998 23:34:06 +0800
Subject: IP: Oh, I feel sooooo much better now.....
Message-ID: <199809260435.VAA11846@netcom13.netcom.com>




From: believer at telepath.com
Subject: IP: Oh, I feel sooooo much better now.....
Date: Fri, 25 Sep 1998 07:38:34 -0500
To: believer at telepath.com

Source:  Nando Net
http://www.nando.net/newsroom/ntn/politics/092498/politics4_13127_noframes.h
tml

IRS embarks on new era with taxpayer-friendly mission statement
Copyright � 1998 The Associated Press 

WASHINGTON (September 24, 1998 4:13 p.m. EDT http://www.nandotimes.com) --
The Internal Revenue Service adopted a new official mission statement
emphasizing that "service" is its primary job.

In another step toward becoming more taxpayer-friendly, the IRS announced
Thursday a new statement that will be featured on its 1998 tax
publications, displayed at IRS offices and put on its Internet Web site.

The statement says that the IRS mission is to "provide America's taxpayers
top quality service by helping them understand and meet their tax
responsibilities and by applying the tax law with integrity and fairness to
all."

This replaces a 1980s statement in which the first line stated that the
IRS's main job was to "collect the proper amount of tax revenue at the
least cost."

"Words alone aren't going to change the IRS, but this serves an important
purpose," said IRS Commissioner Charles O. Rossotti. "The mission statement
will be a reminder that we must be dedicated on a day-in, day-out basis to
serving taxpayers."

The change is one of many that have followed passage in Congress of an IRS
reform law aimed at moving the agency away from its heavy-handed past.

Copyright � 1998 Nando.net
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo at majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email at address
**********************************************
www.telepath.com/believer
**********************************************





From vznuri at netcom.com  Fri Sep 25 08:34:17 1998
From: vznuri at netcom.com (Vladimir Z. Nuri)
Date: Fri, 25 Sep 1998 23:34:17 +0800
Subject: IP: Here it Comes! E-Privacy Dispute Could Go to WTO
Message-ID: <199809260435.VAA11857@netcom13.netcom.com>




From: believer at telepath.com
Subject: IP: Here it Comes! E-Privacy Dispute Could Go to WTO
Date: Fri, 25 Sep 1998 15:12:58 -0500
To: believer at telepath.com

Source:  USIA
http://www.usia.gov/current/news/latest/98092502.clt.html?/products/washfile
/newsitem.shtml

25 September 1998 

ELECTRONIC PRIVACY DISPUTE COULD GO TO WTO, EXPERT SAYS 

(U.S., EU still working for resolution)  (510)
By Bruce Odessey
USIA Staff Writer

Washington -- The U.S. complaint against European Union (EU) policy on
electronic privacy could eventually wind up in the World Trade
Organization (WTO), a Brookings Institution scholar says.

Robert Litan, director of Brookings' economic studies program, said he
could not predict what action the EU will take when its directive on
data protection -- opposed by the United States -- enters into force
in October.

At a September 24 meeting of the Coalition of Service Industries (CSI)
he speculated on some of the potential outcomes, however.

At issue is the EU directive restricting the collection and use of
personal information on the Internet. Most contentious is a provision
prohibiting electronic transmission of personal information about EU
citizens to countries that lack "adequate" privacy protection.

Enforcement of that provision might mean, for example, that EU
authorities might block U.S. companies in Europe from communicating
electronically with their offices in the United States.

Co-author of a forthcoming book on the electronic privacy issue, Litan
guessed that, if the two sides cannot resolve the dispute, the EU
might test its directive by imposing data embargoes on specific U.S.
business sectors or on certain business practices.

He noted that EU authorities have requested staff reports on four
sensitive related issues: medical information, electronic commerce,
airline reservations and personnel records.

Litan also identified four service sectors he considered especially
vulnerable to the directive: banking, insurance (especially health
insurance), investment banking (especially merger and acquisition
financing) and accounting.

If the dispute ends up before a WTO panel, he said, the two sides
could pick their arguments from different parts of the General
Agreement on Trade in Services (GATS). He said the EU could base its
argument on Article XXIV, which allows governments to protect the
privacy of their nationals.

The United States could base its argument on Article XXII, which
prohibits discrimination against foreign providers, he said.

In contrast with the EU, the Clinton administration has been pressing
in the WTO and other multilateral and regional groups for minimal
government regulation of electronic commerce. The administration has
encouraged the emerging U.S. industry to engage in self-regulation
instead.

Litan said EU authorities have choices on whether to enforce the EU
directive in a more or less intrusive way. For one example, they could
distinguish between business and other personal information, he said.

For another, he said, they could offer "safe harbor" exemptions for
corporate communications, or for certain industries, or for certain
equipment like laptop computers.

He said big multinational companies will somehow cope with the EU
directive, however it is enforced, possibly by entering into contracts
with the EU.

But Litan could not guess how small and medium-sized U.S. companies
could afford the expense of working out special arrangements with EU
authorities or how those authorities could enforce the directive
against small companies doing business in cyberspace.

"It's hopeless," he said.
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo at majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email at address
**********************************************
www.telepath.com/believer
**********************************************





From vznuri at netcom.com  Fri Sep 25 08:34:24 1998
From: vznuri at netcom.com (Vladimir Z. Nuri)
Date: Fri, 25 Sep 1998 23:34:24 +0800
Subject: IP: ISPI Clips 4.70:Canadian Internet Providers Draft Privacy Code
Message-ID: <199809260435.VAA11796@netcom13.netcom.com>




From: "ama-gi ISPI" 
Subject: IP: ISPI Clips 4.70:Canadian Internet Providers Draft Privacy Code
Date: Fri, 25 Sep 1998 01:11:35 -0700
To: 

ISPI Clips 4.70:Canadian Internet Providers Draft Privacy Code
News & Info from the Institute for the Study of Privacy Issues (ISPI)
Friday September 25, 1998
ISPI4Privacy at ama-gi.com
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
This From: The Canadian Press (CP), September 17, 1998
http://www.cp.org

Net Privacy Code Drafted

OTTAWA (CP) -- Internet providers have released their own draft privacy
code just as the government prepares to introduce legislation this fall on
the matter.

The Canadian Association of Internet Providers, which represents more than
120 providers, hopes industry efforts to regulate itself will stave off
government action it says could lead to onerous and potentially harmful
national regulations enshrined in law.

"If it's extremely onerous for an international company to do business in
Canada, they will not do business in Canada," Julie Garcia, senior counsel
at America Online Inc. who helped develop the draft code, said.

The code, intended to be voluntary, addresses concerns such as control and
disclosure of users' personal information.

It was drafted to ensure it complies with the Canadian Standards
Association Model Code for the Protection of Personal Information.

The Internet providers code sets out 10 privacy principles for the
industry, including:

*      Internet providers are responsible for personal information
under their control.

*      Providers must disclose reasons for collecting personal
information.

*      Consent of users is mandatory for collection, use or disclosure
of information.

*      Personal information can be disclosed without consent only as
required by law.

"The majority of CAIP members already have some kind of a privacy
policy," said Margo Langford, chairwoman of the Internet association.

"What we're really trying for here is uniformity. I don't think you'll
find anybody that objects to the notion. Privacy is good for business."

The Internet providers association says U.S. experience has shown that
voluntary regulation works better than government law because it fosters
competition among providers to meet user demands.

Surveys have shown consumers are wary about using the Internet because
of concerns about the privacy of their personal information.

The federal government wants to introduce legislation early this fall to
protect Internet privacy, especially for electronic commerce purposes,
before
Canada is host of an Organization for Economic Co-operation and
Development conference in October.

Ottawa established a group to study electronic commerce and it produced a
paper on privacy that recommends legislation to address the very issues
the Internet association's draft code covers.

In addition, the Canadian Radio-television and Telecommunications
Commission announced in July it would hold public hearings in November
on whether it should get involved in regulating new media, including the
Internet.

Story Copyright � 1998 The Canadian Press (CP)

--------------------------------NOTICE:------------------------------
ISPI Clips are news & opinion articles on privacy issues from
all points of view; they are clipped from local, national and international
newspapers, journals and magazines, etc. Inclusion as an ISPI Clip
does not necessarily reflect an endorsement of the content or opinion
by ISPI. In compliance with Title 17 U.S.C. section 107, this material is
distributed free without profit or payment for non-profit research
and educational purposes only.
---------------------------------------------------------------------------

ISPI Clips is a FREE e-mail service from the "Institute for the Study
of Privacy Issues" (ISPI). To receive "ISPI Clips" on a regular bases
(up to 3 - 8 clips per day) send the following message  "Please
enter [Your Name] into the ISPI Clips list: [Your e-mail address]" to:
ISPIClips at ama-gi.com  .

The Institute for the Study of Privacy Issues (ISPI) is a small
contributor-funded organization based in Victoria, British Columbia
(Canada). ISPI operates on a not-for-profit basis, accepts no
government funding and takes a global perspective.

ISPI's mandate is to conduct & promote interdisciplinary research
into electronic, personal and  financial privacy with a view toward
helping ordinary people understand the degree of privacy they have
with respect to government, industry and each other and to likewise
inform them about techniques to enhance their privacy.

But, none of this can be accomplished without your kind and
generous financial support. If you value in the ISPI Clips service or if
you are concerned about the erosion of your privacy in general, won't
you please help us continue this important work by becoming an "ISPI
Clips Supporter" or by taking out an institute Membership?

We gratefully accept all contributions:

  Less than $60    ISPI Clips Supporter
          $60 - $99    Primary ISPI Membership (1 year)
      $100 - $300    Senior ISPI Membership (2 years)
More than $300    Executive Council Membership (life)

Your ISPI "membership" contribution entitles you to receive "The ISPI
Privacy Reporter" (our bi-monthly 12 page hard-copy newsletter in
multi-contributor format) for the duration of your membership.

For a contribution form with postal instructions please send the following
message "ISPI Contribution Form" to ISPI4Privacy at ama-gi.com .

We maintain a strict privacy policy. Any information you divulge to ISPI
is kept in strict confidence. It will not be sold, lent or given away to
any third party.









**********************************************
To subscribe or unsubscribe, email:
     majordomo at majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email at address
**********************************************
www.telepath.com/believer
**********************************************





From kdss at proxy.businessnet.dk  Sat Sep 26 00:20:10 1998
From: kdss at proxy.businessnet.dk (kdss at proxy.businessnet.dk)
Date: Sat, 26 Sep 1998 00:20:10 -0700 (PDT)
Subject: Hello
Message-ID: <199809260925.KAA11731@proxy.businessnet.dk>


AN OFFER YOU CAN'T REFUSE!

Hi.  Ever thought about bulk E-mailing? I have done 
some extensive research into the bulk email business.
I have found that people charge outrageous prices to
send you these names.  I have a database of over10  million 
email addresses. Many companies claim they have 20, 30, even up to 50 million email 
addresses for sale.  It has been our experience that these companies are selling you 4 or 5
million addresses duplicated many times.  We sort all of our addresses and remove all 
duplicates.  We also include a full working demo of Stealth Mass Mailer, the most powerful
email program on the market, capable of sending up to 400,000 email addreses per hour.   


1 MILLION EMAIL NAMES - $49
2 MILLION EMAIL NAMES - $74
15 MILLION EMAIL NAMES - $199


All orders are sent on CD.

Bulk E-mailing is a great way to make money.  I have sold many 
things on the web and have always been successful.  


If you have any questions you can email us at jmelle at bellatlantic.net or call us at
(702) 294-7769 between the hours of 11 am - 3 pm Pacific.

TO BE REMOVED EMAIL US AT jmelle at bellatlantic.net AND YOU WILL BE REMOVED
IMMEDIATELY.


To order print this form: 

--------------------------------------------------------------
__1 million email names - $49

__2 million email names - $74

__15 million email names - $99

__10 million email names - $199


Please add $6 for shipping.

I understand that all orders include a full 
working demo bulk email program.

Please fill out the following:

Name_______________________________

Company name_______________________

Address____________________________

City, State, Zip___________________

Telephone #(___)___-____

E-mail address_______________________

Send your check or money order to:

IMC Marketing
PO Box 61798
Boulder City, NV 89006

Or to pay by "Check by phone" call us at (702) 294-7769 between the hours of 
11 am - 3 pm Pacific.








From tcmay at got.net  Fri Sep 25 10:46:16 1998
From: tcmay at got.net (Tim May)
Date: Sat, 26 Sep 1998 01:46:16 +0800
Subject: arms collectors...
In-Reply-To: <19980925195613.A3801@die.com>
Message-ID: 



At 4:56 PM -0700 9/25/98, David Emery wrote:

>Washington Times, 25 Sep 98
>Operable missile seized in customs
>By Bill Gertz THE WASHINGTON TIMES
>
>U.S.  and British authorities are investigating how a Russian-design
>Scud missile was imported illegally by a weapons collector in
>California, The Washington Times has learned.
....
>British customs officials are investigating the seller, a small firm
>outside London, and U.S.  investigators are questioning an arms
>collector from Portola Valley, Calif., near Palo Alto, who bought the
>system, Mr.  Hensley said.
.....
>The officials identified the buyer only as a wealthy man who is a U.S.
>citizen.  He is a legitimate arms collector -- apparently not linked to
>terrorists or illicit arms dealers.  But the false paperwork has raised
>questions about the deal and prompted the U.S. investigation.

I know someone who is good friends with this guy. My friend is a
commodities broker who is active in gun shows and in weapons dealing. The
guy mentioned above has a couple of working tanks at this ranch up in
Portola Valley, tanks which he drives around. And lots of other weapons. I
was supposed to go on a shoot with this bunch a while back, but I couldn't
make it.

His Scud missile is unlikely to have been planned for any real use. Maybe
they think that with the First Criminal's spawn enrolled in the school down
Alpine Road that he's some kind of threat.

I could say more, but then I'd have to kill everyone who reads the list.

--Tim May

(This space left blank pending determ. of acceptability to the gov't.)
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.







From nobody at replay.com  Fri Sep 25 11:53:35 1998
From: nobody at replay.com (Anonymous)
Date: Sat, 26 Sep 1998 02:53:35 +0800
Subject: Test - Ignore
Message-ID: <199809260756.JAA03532@replay.com>



ping





From stuffed at stuffed.net  Sat Sep 26 03:10:10 1998
From: stuffed at stuffed.net (STUFFED NEWS DAILY)
Date: Sat, 26 Sep 1998 03:10:10 -0700 (PDT)
Subject: TODAY'S NEWS AND PICS PACKED STUFFED! - READ IT NOW!
Message-ID: <19980926071000.22742.qmail@eureka.abc-web.com>


+ 30 FREE HOT JPEG PHOTOS
+ 5 SUPER SEXY STORIES
+ HOT AND SPICY FISH TACOS
+ SCENTUAL SCROTUMS
+ PORNO AIDE JOB AT HUSTLER FOR STARR
+ THE BEST OF EUREKA
+ PERVY GETS SKIRTY
+ 3-D PORN - SEEING IS BELIEVING
+ IT MIGHT BE A BOY
+ TINKERBELL PRIEST
+ COMMANDER IN QUEEF

       ---->   http://stuffed.net/98/9/26/   <----

Welcome to  today's  issue of Stuffed. To read it you should
click on the URL above.  If it is not made clickable by your
email program  you will need to  use your mouse to highlight
the URL,  copy it and then paste it into your browser  (then
press Return).

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!

       ---->   http://stuffed.net/98/9/26/   <----





From sorens at workmail.com  Fri Sep 25 14:59:44 1998
From: sorens at workmail.com (Soren)
Date: Sat, 26 Sep 1998 05:59:44 +0800
Subject: IP: Oh, I feel sooooo much better now.....
In-Reply-To: <199809260435.VAA11846@netcom13.netcom.com>
Message-ID: <360CCAAC.AA4D6B9@workmail.com>



Vladimir Z. Nuri wrote:

> ... The statement says that the IRS mission is to "provide America's taxpayers
>
> top quality service by helping them understand and meet their tax
> responsibilities and by applying the tax law with integrity and fairness to
> all." ...

While the IRS may be a law unto themselves, congress has not passed any "tax
law".  The IRS Code arises from the Federal Register, which does not make it a
law, merely a presidential dictate. Something like the divine right of kings.

-------------- next part --------------
A non-text attachment was scrubbed...
Name: bin00007.bin
Type: application/octet-stream
Size: 3031 bytes
Desc: "S/MIME Cryptographic Signature"
URL: 

From jya at pipeline.com  Fri Sep 25 19:04:44 1998
From: jya at pipeline.com (John Young)
Date: Sat, 26 Sep 1998 10:04:44 +0800
Subject: EuroParl Hits ECHELON
Message-ID: <199809261455.KAA17434@camel7.mindspring.com>



Duncan Campbell has provided the September 14
European Parliament multi-lingual discussion on ECHELON 
and the related minutes:

   http://jya.com/ep091498-1.htm  (minutes in English; 11K)

   http://jya.com/ep091498-2.htm  (discussion in several languages, not
English; 82K)

English translations of the latter are welcomed by Duncan and JYA.
EP official translations may be some time acoming.

Duncan Campbell 





From apocalipsisx at yahoo.com  Sat Sep 26 10:11:00 1998
From: apocalipsisx at yahoo.com (Han Solo)
Date: Sat, 26 Sep 1998 10:11:00 -0700 (PDT)
Subject: Virus for UNIX
Message-ID: <19980926171206.958.rocketmail@send103.yahoomail.com>


Hello!!!

Somebody can tell me about a site where I can find virus for UNIX
systems.

I need them please!!!!!!!!!





_________________________________________________________
DO YOU YAHOO!?
Get your free @yahoo.com address at http://mail.yahoo.com






From kamikaze23 at juno.com  Fri Sep 25 19:32:03 1998
From: kamikaze23 at juno.com (Fallen I Angel)
Date: Sat, 26 Sep 1998 10:32:03 +0800
Subject: 
In-Reply-To: <199809252131.XAA24463@replay.com>
Message-ID: <19980926.111946.12502.1.kamikaze23@juno.com>




oh yeah,

try somethin like 
-- I'm an alcoholic
-- I'd like all minorities to die

it seems that anything w/ an apostrophe will get the phrase "I'd drink to
that"

it was on the UPN 9 News at 10 p.m. Just a simple mistake.  microsoft
released a patch, i think.

On Fri, 25 Sep 1998 23:31:14 +0200 Anonymous  writes:
>How about:
>
>I'd like humping your mom with a prosthetic limb.
>I'd like Hillary to get down on both knees and eat out Monica's ass.
>I'd like nothing more than for anyone who even thinks about mentioning
>Bill Clinton to spontaneously combust, preferably right in front of a 
>gas
>pump where his whole family is sitting in some sort of catatonic 
>stupor,
>unable to digest any information beyond that which The Machine feeds
>them every day.

>Who the fuck wouldn't drink to that?  For Christ's sake, I'd be 
>buying!
>
>
>At 10:34 PM 9/25/98 +0200, Anonymous wrote:
>>On Thu, 24 Sep 1998 21:43:34 -0400 "Edwin E. Smith" 
>
>>writes:
>>>
>>>
>>>
>>>If you have Microsoft Word (6.0 or later), and have a thesaurus
>>>installed, do the following:
>>>
>>>1) Open a new, blank document.
>>>2) Type in the words: I'd like to see Bill Clinton resign.
>>>3) Highlight the entire sentence.
>>>4) Click on the tools menu and select thesaurus (tools, language,
>>>   thesaurus)
>>>
>>>Look what is immediately highlighted in the selection box. 
>>>
>>
>>This was almost funny. Too bad the following sentences also work:
>>I'd like to drink frog urine
>>I'd like to hug large, purple dinosaurs
>>I'd like to cook onions with garlic and tomatoes
>>I'd like to strangle you with a mouse cable


___________________________________________________________________
You don't need to buy Internet access to use free Internet e-mail.
Get completely free e-mail from Juno at http://www.juno.com
Or call Juno at (800) 654-JUNO [654-5866]





From ravage at einstein.ssz.com  Fri Sep 25 19:51:29 1998
From: ravage at einstein.ssz.com (Jim Choate)
Date: Sat, 26 Sep 1998 10:51:29 +0800
Subject: Test [No Reply]
Message-ID: <199809261553.KAA00228@einstein.ssz.com>



Test [No Reply]


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage at ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------





From edsmith at IntNet.net  Fri Sep 25 20:14:27 1998
From: edsmith at IntNet.net (Edwin E. Smith)
Date: Sat, 26 Sep 1998 11:14:27 +0800
Subject: arms collectors...
In-Reply-To: <19980925195613.A3801@die.com>
Message-ID: <3.0.2.32.19980926113818.007e45a0@mailhost.IntNet.net>



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

At 07:46 PM 9/25/98 -0600, you wrote:
>On Fri, 25 Sep 1998, David Emery wrote:
>
>> ----- Forwarded message from "Thomas B. Roach" 
 -----
>> 
>> 
>> Washington Times, 25 Sep 98
>> Operable missile seized in customs
>> By Bill Gertz THE WASHINGTON TIMES
>> 
>> U.S.  and British authorities are investigating how a Russian-
design
>> Scud missile was imported illegally by a weapons collector in
>> California, The Washington Times has learned.
>> 
>> "This is a full-blown missile," said John Hensley, a senior agent 
of the
>> U.S.  Customs Service in Los Angeles.  "The only thing missing is 
the
>> warhead."
>> 
>> A Scud B missile and its mobile transporter-erector launcher --
minus the
>> warhead -- were seized Sept.  2 by customs agents in Port Hueneme,
>> Calif., about 35 miles north of Los Angeles, said officials 
familiar
>> with the case.
>> 
>
>Scuze me for picking nits, but if the missile doesn't have a
>warhead then its just a rocket (plus some guidance systems).
>
>When does a rocket become a "weapon of mass destruction"?
>
>Maybe what American officials should be investigating is how US 
defense
>contractors got an export license to sell ICBM components to the 
ChiCom's. 
>I heard it was OK'd by the pres himself -- theorectically for big
>campaign donations.
>
>If those missiles are targeted at US, then that would constitute
>blatant treason, would it not?
>
>Inquiring minds want to know.
>
>jim
>
>
>
>

I wouldn't be afraid to bet that some Republicans were in on this and 
worse. I am not a fan of either Dems or Reps but I wonder if the 
reason the sex angle is being persued first is to get Clinton and the 
Dems out without any mud splashback.

I have heard that Starr is far from finished so time will tell.

In the end though I doubt if much will change for the beltway 
bandits.

Edwin
-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv

iQA/AwUBNg0KaUmNf6b56PAtEQLwcACeNZQNCyEWpDagJdXuY/OJdBE0xcIAoJBy
yRaxR2UpW7Of5LryelWZdqRz
=odq+
-----END PGP SIGNATURE-----


When freedom is outlawed.......Only outlaws will be free!

If cryptography is outlawed, pomz pvumbxt xjmm ibwf dszquphsbqiz.

Fun! Fast! Revealing! Try "The World's Smallest Political Quiz" at:
   http://www.self-gov.org/quiz.html

IS AIDS A GOVERNMENT/DRUG COMPANY HOAX?
   http://www.virusmyth.com/aids/index.htm

When you blame others, you give up your power to change.
Dr. Robert Anthony

Libertarian Party of Hillsborough County, FL
   http://home.tampabay.rr.com/lphc

When a place gets crowded enough to require ID's, social collapse is not far
away. It is time to go elsewhere. The best thing about space travel is that
it made it possible to go elsewhere.

Lazarus Long





From nobody at replay.com  Fri Sep 25 21:40:56 1998
From: nobody at replay.com (Anonymous)
Date: Sat, 26 Sep 1998 12:40:56 +0800
Subject: test - ignore
Message-ID: <199809261743.TAA06323@replay.com>



ping





From wombat at mcfeely.bsfs.org  Fri Sep 25 22:38:06 1998
From: wombat at mcfeely.bsfs.org (Rabid Wombat)
Date: Sat, 26 Sep 1998 13:38:06 +0800
Subject: Is Toto in Kansas, or in MO
In-Reply-To: <000401bde8e0$2dd516e0$388195cf@blanc>
Message-ID: 





On Fri, 25 Sep 1998, Blanc wrote:

> 
> Who said this, "Toto":
> 
>    	"A long time ago, being crazy meant something.
>   	"Now, everybody's crazy."
> 
>     ?

Charles Manson.





From nobody at replay.com  Fri Sep 25 22:55:59 1998
From: nobody at replay.com (Anonymous)
Date: Sat, 26 Sep 1998 13:55:59 +0800
Subject: Test [No Reply]
In-Reply-To: <199809250323.WAA17403@einstein.ssz.com>
Message-ID: <199809261850.UAA11213@replay.com>



On Thu, 24 Sep 1998 22:23:38 -0500 (CDT)  Jim Choate  wrote:

>Test [No Reply]

And we have a winner for this weeks free AOL account!!  Well done Jim! ;-)










From CSapronett at aol.com  Fri Sep 25 23:54:22 1998
From: CSapronett at aol.com (CSapronett at aol.com)
Date: Sat, 26 Sep 1998 14:54:22 +0800
Subject: faggots
Message-ID: 



My only regret is that I wont get to watch you all burn in hell !!!





From nnburk at cobain.hdc.net  Sat Sep 26 00:14:32 1998
From: nnburk at cobain.hdc.net (nnburk)
Date: Sat, 26 Sep 1998 15:14:32 +0800
Subject: The Year 2000 Problem: The Good News and the Bad
Message-ID: <360D5DD0.1F2D@yankton.com>



>From THE FUTURIST (May 1998) 

                              The Year 2000 Problem:
                              The Good News and the Bad

                              The Year 2000 computer glitch has proved surprisingly 
troublesome.
                              Opportunities as well as dangers lie ahead.


             By Cynthia G. Wagner

             Four years ago, an author named Peter de Jager submitted to THE
             FUTURIST a reprint of an article he had published in a computer magazine.
             Entitled "Doomsday," the article warned of what will happen to the 
world's
             computers when 2000 rolls around.

             We editors rejected the article because it had already been published in
             another magazine and because it had already found its proper
             audience_computer programmers. We also felt that the "Year 2000
             Problem" was a minor technical glitch that would probably be fixed long
             before the year 2000.

             We were wrong: The Year 2000 Problem (or Y2K) was more serious than
             we thought. Very soon, what seemed like a minor technical problem to
             us_and to most other people at the time_had set off a furor and even
             created a new industry for consultants and programmers.

             Peter de Jager went on to co-write (with Richard Bergeon) a very useful
             book called Managing 00: Surviving the Year 2000 Computing Crisis [see
             box on page 19]. And as the year 2000 approaches, this book has been
             joined by multitudes of books, articles, reports, and Web sites 
addressing
             the problem.

             For our part, the editors of THE FUTURIST are doing penance by
             presenting this overview of the problem and its possible consequences. We
             also will summarize some ideas on how to prepare to cope with it.

             The Problem and What It Will Cost to Fix

             In the early days of computer programming, dates were entered as a
             six-digit configuration: two digits for the month, two digits for the 
day, and
             two digits for the year, or MMDDYY.

             Now, every date-relevant program in every computer needs to be Y2K
             compliant_that is, able to recognize eight-digit dates with four-digit 
years as
             opposed to two. Otherwise, the computer will not understand that life 
goes
             forward after the year "99" rather than magically skipping back in time 
to
             "00."

             Experts say that it's not exactly clear what problems non-compliant
             computers will create over the next few years. They may make lots of
             mistakes, such as paroling prisoners years early or sending Gen X'ers
             pension checks many decades too soon. Humans may catch many of the
             computers' mistakes, but most humans are too busy. That's why we have
             computers keeping track of things and telling us what to do, like taking
             expired foods and medicines off the shelf.

             Most sources say it is costing businesses between 50� and $2 a line to 
fix the
             codes. It may not sound like much, but all told, it will add up to many
             billions of dollars. Chase Manhattan Bank estimates that it will spend 
$200
             million to $250 million to fix its Y2K problems, and commercial banking 
as
             an industry may spend $9 billion or more, according to the Wall Street
             Journal. The U.S. government will need to spend about $30 billion, says 
the
             Gartner Group, a market-research firm in Stamford, Connecticut.

             Some organizations will decide to replace the millennium-unready systems
             altogether, perhaps spending more at the outset but avoiding costly 
problems
             later. The University of Chicago Hospital System, for example, figured it
             would cost $1.5 million to fix the Y2K problem on a patient-accounting
             system that needed to be replaced anyhow, so it decided to buy a new
             software system for $3 million to $7 million.

             Bottom line: We're looking at a repair/replacement bill of up to $600 
billion
             worldwide by the end of 1999, according to the Gartner Group. That's more
             than the gross national product of Canada.

             Interconnectivity: Passing the Bug

             The Year 2000 Problem affects not only computers (mainframes, minis,
             and micros), but the myriad of microchips embedded in many of our
             products, including airplanes, cars, microwave ovens, etc., points out 
Y2K
             authority John Whitehouse, president of ChangeWise, Inc., in 
Jacksonville,
             Florida. Furthermore, as he notes in his recent audiobook The Year 2000 
Is
             Coming: What Do I Do?, the year 2000 is a leap year, a circumstance that
             also will have at least some consequences: Banks, for example, would fail 
to
             calculate one day's worth of interest (February 29), which is significant
             when you are dealing with billions of dollars.

             Y2K problems are sometimes deeply embedded in "legacy" programs,
             which are the products of the old programming days. Some such programs
             will begin automatically deleting data that is more than two years old, 
warns
             Whitehouse. The work you do on programs such as Excel may be at risk
             unless you get upgraded software.

             Even if you don't think you have a big problem with your own computers,
             or if you solve your own Y2K problems, you will still have to deal with
             countless other individuals, businesses, agencies, and governments who 
may
             not have solved the problem in their systems. Computers, businesses, and
             governments are highly interconnected today: A problem anywhere has the
             potential for global consequences, and there may be many, many problems
             emerging as 2000 arrives.

             Still, there is a potential bright side:

             "For those who come to understand and accept the issues, for those who
             take decisive action, this can be the opportunity of a lifetime," says
             Whitehouse. "As we approach the most catastrophic event the modern
             world has yet faced, proactive companies can gain a significant strategic
             advantage while others fail. And knowledgeable investors can post
             monumental gains while others lose."

             Getting Rich from the Glitch

             A disaster almost always presents profitable opportunities. The hundreds 
of
             billions of dollars spent on fixing the Y2K Problem will wind up in
             somebody's pocket. One pocket could be yours. Expected Y2K winners
             include:

                  Programmers and consultants. Anyone with the technical skills to
                  solve the problem is now in high demand. Y2K guru Peter de Jager
                  identifies a wide variety of consultants ready to provide services,
                  including planning consultants for tools assessment, testing 
consultants,
                  contract service consultants to estimate the costs and plan and
                  implement the code redesign, legal consultants, and recovery
                  consultants. 
                  Information providers, including publishers and Web site
                  developers. The Wall Street Journal, for example, recently sold 
eight
                  pages of advertising in a special section devoted to companies 
offering
                  "Year 2000 Solutions" (February 19, 1998). A variety of consultants
                  and subscription-based Y2K assistance can be found on de Jager's
                  Year 2000 Web site (www.year2000.com). 
                  Investors. Wherever new businesses bloom, investors are sure to see
                  prospects for fast growth. Unfortunately, it's already late in the 
game
                  to invest in Y2K companies: You'd be "buying high," and it's always
                  risky to chase headlines for ideas on short-term speculation. As 
Wall
                  Street Journal writer John R. Dorfman warns about these so-called
                  story stocks, "That's an investment method that has often led 
investors
                  to grief in the past." 
                  Lawyers and litigators. Individuals and businesses stand to lose a 
lot
                  of money and time because of the Y2K Problem; therefore, they will
                  want to sue anybody they consider responsible for creating the
                  problem. If, for example, your life insurance policy is canceled
                  because a computer thinks you're too old, you'll probably want to 
sue
                  someone. 

             Worst-Case Scenarios: Chaos and Crashes

             Pundits have warned of potential disasters IF the Year 2000 Problem is 
not
             fixed in time. It's not clear how seriously to take them, but these 
possibilities
             have been mentioned:

             Food shortages may occur because stores will discard all products that 
have
             passed their freshness expiration dates.

             Some patients may die because medicines and lifesaving devices are
             unavailable. Drugs, like foods, have expiration dates and may be 
discarded
             upon the command of non-Y2K-compliant computers. Medical devices
             such as heart defibrillators are programmed to cease functioning if the 
date
             for maintenance checks has passed.

             Borrowers could default on loans and mortgages as computers add on a
             century's worth of interest rates. Consumers may find they can't make
             purchases because credit-card verification systems misinterpret 
expiration
             dates. Similarly, there may be a cash crisis as automatic teller machines
             freeze up.

             Stock markets could crash because investors fearing Y2K fiscal chaos may
             take their money out of the markets_perhaps in November or December
             1999_as Y2K impends. On the other hand, the crash might create a golden
             opportunity for investors ready to jump into the market when others run 
for
             the hills.

             Crime waves may occur as a general financial crisis creates economic
             hardship and jailed criminals are mistakenly released. One prison has
             already reportedly released criminals prematurely because parole dates 
were
             misinterpreted by computers.

             Other problems and inconveniences could include elevators getting stuck
             and airplanes being grounded, as the dates for maintenance checks appear 
to
             be missed and computers shut the systems down entirely. Date-sensitive
             computer-controlled security systems may fail, causing factories to shut 
and
             bank vaults to lock up. Drivers' licenses could seem to have expired, 
making
             it hard for people to rent cars. Voter registration records may be 
disrupted,
             creating havoc for the 2000 U.S. presidential and congressional 
elections.

             What Should We Do?

             To get started in solving your Y2K problems, John Whitehouse of
             ChangeWise recommends building a "systems inventory." Analyze your
             computer dependency_what do you use to get through the day, what
             outside systems do you depend on? What alternative sources of goods and
             services are there?

             Similar procedures need to be done at home and at work; specifically,
             Whitehouse suggests:

             Individuals and family heads should check out personal items that contain
             computer chips. Examples include heating and air conditioning systems,
             home-security systems, telephone-answering machines, TVs, VCRs, cell
             phones, cars. And of course, your home PC: The operating system itself
             may not work.

             Now test the devices. Enter 2000 in your VCR, or change the system date
             on your PC (after backing up the data). Send letters to manufacturers to 
see
             if their systems are Y2K compliant. Record on inventories where you still
             have risks, and develop a course of action, such as identifying 
alternative
             providers.

             You should also check software such as Access 95, Excel, personal
             schedulers, financial programs like Quicken or Money, communications
             software, etc. And remember that you could experience problems with
             outside services you use: the phone company, utilities, supermarkets, 
banks,
             gas stations, airports.

             "Forget flying to see Grandma on January 1, 2000," warns Whitehouse.
             "Two major airlines have already said they won't be flying." And the
             Federal Aviation Administration has admitted it will be late in meeting 
Y2K
             compliance.

             If you are an investor, your money is in places you can't control, so you
             should inventory all your assets (equity, debt, and fixed tangible). 
Check
             with the companies to find out their Y2K status and record the results.
             Perhaps less than half of U.S. companies have begun addressing the
             problem, and movement is lagging even farther in other countries,
             particularly Third World companies.

             One worry is that there may be runs on banks when people fear the Y2K
             impacts. Whitehouse goes so far as to suggest that investors begin 
hedging
             with fixed tangible assets: "Buy some gold and silver." Businesses should 
set
             up an organizational task force to address the issue, including managers
             from each area of the enterprise. "Problem ownership" should lie with the
             chief financial officer because of the many financial and legal 
implications.
             The task force should consider questions like cost, impacts on daily
             activities, competitors' actions, opportunities, effects on stock prices, 
etc.

             The CFO might ask how the company will be affected, where the money
             will come from to fix it, how cash flow will be impacted, and how
             customers will be impacted. Sales managers might ask what new products
             can be offered. Human-resources directors might ask whether new skills 
will
             be needed and whether the firm's best people will leave. The U.S.
             government, for example, is already concerned about a "brain drain" of
             technology experts leaving the Internal Revenue Service and the Pentagon.
             Each division must then do a systems inventory, find alternatives to 
systems
             and programs that are not compliant, test those alternatives, and affirm 
that
             all trading partners are compliant. "This will enable you to succeed 
where
             your competitors will fail," reassures Whitehouse. De Jager and Bergeon,
             authors of Managing 00, emphasize the need to test applications for their
             ability to handle the year 2000, but recognize that time is running short 
and
             that workloads for the reprogrammers are already overwhelming. They
             recommend giving priority to the applications that are most required for
             your survival, followed by those that give you a competitive edge.

             "Only you can determine whether you will allow yourself to be 'forced' 
not
             to test," write de Jager and Bergeon. "Forgoing testing is never 
acceptable,
             but in the real world, it happens."

             Learning from Y2K

             The lesson of the Year 2000 Problem is obvious: Most of the problems we
             face in the present are the result of someone (or everyone) in the past 
failing
             to think about the future. Y2K is a problem basically because mainframe
             computer programmers paid little attention to the long-term future. While
             saving money by using two-digit codes to enter years instead of four
             (computer memory was expensive in those days), either they never thought
             their programs would still be in use by the year 2000 or they never 
realized
             that computers, unlike fuzzy-thinking humans, would literally interpret 
years
             as having only two digits.

             We can smugly congratulate ourselves for being smarter than our
             technologies, but meanwhile, technology is biting us back.


             About the Author

             Cynthia G. Wagner is managing editor of THE FUTURIST.

             � 1998 World Future Society 








From nnburk at cobain.HDC.NET  Sat Sep 26 00:15:02 1998
From: nnburk at cobain.HDC.NET (nnburk)
Date: Sat, 26 Sep 1998 15:15:02 +0800
Subject: The Year 2000: Social Chaos or Social Transformation?
Message-ID: <360D63AA.744B@yankton.com>



The Year 2000: Social Chaos or Social
                                 Transformation? 

                    by John L. Petersen, Margaret Wheatley, Myron 
Kellner-Rogers 

                    version in PDF (Adobe Acrobat)       Download Acrobat 
      

Editor's Note:  This is a draft of an article scheduled for publication 
in the October 1998 issue of THE FUTURIST.  Due to the
time-sensitive nature of the material, it was posted here to create 
greater awareness of the issue as well as elicit comments and questions
before final publication. Please send your comments and questions to the 
authors at johnp at arlinst.org and the editors at
cwagner at wfs.org .

     The Millenial sun will first rise over human civilization in the 
independent republic of Kiribati, a group of some thirty low
     lying coral islands in the Pacific Ocean that straddle the equator 
and the International Date Line, halfway between Hawaii and
     Australia. This long awaited sunrise marks the dawn of the year 
2000, and quite possibly, the onset of unheralded disruptions
     in life as we know it in many parts of the globe. Kiribati's 81,000 
Micronesians may observe nothing different about this
     dawn; they only received TV in 1989. However, for those who live in 
a world that relies on satellites, air, rail and ground
     transportation, manufacturing plants, electricity, heat, telephones, 
or TV, when the calendar clicks from '99 to '00, we will
     experience a true millennial shift. As the sun moves westward on 
January 1, 2000, as the date shifts silently within millions
     of computerized systems, we will begin to experience our 
computer-dependent world in an entirely new way. We will finally
     see the extent of the networked and interdependent processes we have 
created. At the stroke of midnight, the new millenium
     heralds the greatest challenge to modern society we have yet to face 
as a planetary community. Whether we experience this as
     chaos or social transformation will be influenced by what we do 
immediately. 

     We are describing the year 2000 problem, known as Y2K (K signifying 
1000.) Nicknamed at first "The Millennial Bug,"
     increasing sensitivity to the magnitude of the impending crisis has 
escalated it to "The Millennial Bomb." The problem
     begins as a simple technical error. Large mainframe computers more 
than ten years old were not programmed to handle a
     four digit year. Sitting here now, on the threshold of the year 
2000, it seems incomprehensible that computer programmers
     and microchip designers didn't plan for it. But when these billions 
of lines of computer code were being written, computer
     memory was very expensive. Remember when a computer only had 16 
kilobytes of RAM? To save storage space, most
     programmers allocated only two digits to a year. 1993 is '93' in 
data files, 1917 is '17.' These two-digit dates exist on millions
     of files used as input to millions of applications. (The era in 
which this code was written was described by one programming
     veteran as "the Wild West." Programmers did whatever was required to 
get a product up and working; no one even thought
     about standards.) 

     The same thing happened in the production of microchips as recently 
as three years ago. Microprocessors and other
     integrated circuits are often just sophisticated calculators that 
count and do math. They count many things: fractions of
     seconds, days, inches, pounds, degrees, lumens, etc. Many chips that 
had a time function designed into them were only
     structured for this century. And when the date goes from '99 to '00 
both they and the legacy software that has not been fixed
     will think it is still the 20th century -- not 2000, but 1900. 

     Peter de Jager, who has been actively studying the problem and its 
implications since 1991, explains the computer math
     calculation: "I was born in 1955. If I ask the computer to calculate 
how old I am today, it subtracts 55 from 98 and announces
     that I'm 43. . . But what happens in the year 2000? The computer 
will subtract 55 from 00 and will state that I am minus 55
     years old. This error will affect any calculation that produces or 
uses time spans. . . If you want to sort by date (e.g., 1965,
     1905, 1966), the resulting sequence would be 1905, 1965, 1966. 
However, if you add in a date record such as 2015, the
     computer, which reads only the last two digits of the date, sees 05, 
15, 65, 66 and sorts them incorrectly. These are just two
     types of calculations that are going to produce garbage."1

     The calculation problem explains why the computer system at Marks & 
Spencer department store in London recently
     destroyed tons of food during the process of doing a long term 
forecast. The computer read 2002 as 1902. Instead of four more
     years of shelf life, the computer calculated that this food was 
ninety-six years old. It ordered it thrown out.2

     A similar problem happened recently in the U.S. at the warehouse of 
a freeze dried food manufacturer. But Y2K is not about
     wasting good food. Date calculations affect millions more systems 
than those that deal with inventories, interest rates, or
     insurance policies. Every major aspect of our modern infrastructure 
has systems and equipment that rely on such
     calculations to perform their functions. We are dependent on 
computerized systems that contain date functions to effectively
     manage defense, transportation, power generation, manufacturing, 
telecommunications, finance, government, education,
     healthcare. The list is longer, but the picture is clear. We have 
created a world whose efficient functioning in all but the
     poorest and remotest areas is dependent on computers. It doesn't 
matter whether you personally use a computer, or that most
     people around the world don't even have telephones. The world's 
economic and political infrastructures rely on computers.
     And not isolated computers. We have created dense networks of 
reliance around the globe. We are networked together for
     economic and political purposes. Whatever happens in one part of the 
network has an impact on other parts of the network.
     We have created not only a computer-dependent society, but an 
interdependent planet. 

     We already have frequent experiences with how fragile these systems 
are, and how failure cascades through a networked
     system. While each of these systems relies on millions of lines of 
code that detail the required processing, they handle their
     routines in serial fashion. Any next step depends on the preceding 
step. This serial nature makes systems, no matter their
     size, vulnerable to even the slightest problem anywhere in the 
system. In 1990, ATT's long distance system experienced
     repeated failures. At that time, it took two million lines of 
computer code to keep the system operational. But these millions of
     lines of code were brought down by just three lines of faulty code.

     And these systems are lean; redundancies are eliminated in the name 
of efficiency. This leanness also makes the system
     highly vulnerable. In May of this year, 90% of all pagers in the 
U.S. crashed for a day or longer because of the failure of one
     satellite. Late in 1997, the Internet could not deliver email to the 
appropriate addresses because bad information from their
     one and only central source corrupted their servers. 

     Compounding the fragility of these systems is the fact that we can't 
see the extent of our interconnectedness. The networks
     that make modern life possible are masked by the technology. We only 
see the interdependencies when the relationships are
     disrupted -- when a problem develops elsewhere and we notice that we 
too are having problems. When Asian markets failed
     last year, most U.S. businesses denied it would have much of an 
impact on our economy. Only recently have we felt the extent
     to which Asian economic woes affect us directly. Failure in one part 
of a system always exposes the levels of
     interconnectedness that otherwise go unnoticed�we suddenly see how 
our fates are linked together. We see how much we
     are participating with one another, sustaining one another. 

     Modern business is completely reliant on networks. Companies have 
vendors, suppliers, customers, outsourcers (all, of
     course, managed by computerized data bases.) For Y2K, these highly 
networked ways of doing business create a terrifying
     scenario. The networks mean that no one system can protect itself 
from Y2K failures by just attending to its own internal
     systems. General Motors, which has been working with extraordinary 
focus and diligence to bring their manufacturing plants
     up to Year 2000 compliance, (based on their assessment that they 
were facing catastrophe,) has 100,000 suppliers worldwide.
     Bringing their internal systems into compliance seems nearly 
impossible, but what then do they do with all those vendors who
     supply parts? GM experiences production stoppages whenever one key 
supplier goes on strike. What is the potential number
     of delays and shutdowns possible among 100,000 suppliers? 

     The nature of systems and our history with them paints a chilling 
picture of the Year 2000. We do not know the extent of the
     failures, or how we will be affected by them. But we do know with 
great certainty that as computers around the globe respond
     or fail when their calendars record 2000, we will see clearly the 
extent of our interdependence. We will see the ways in which
     we have woven the modern world together through our technology. 

What, me worry? 

     Until quite recently, it's been difficult to interest most people in 
the Year 2000 problem. Those who are publicizing the
     problem (the Worldwide Web is the source of the most extensive 
information on Y2K,) exclaim about the general lack of
     awareness, or even the deliberate blindness that greets them. In our 
own investigation among many varieties of organizations
     and citizens, we've noted two general categories of response. In the 
first category, people acknowledge the problem but view it
     as restricted to a small number of businesses, or a limited number 
of consequences. People believe that Y2K affects only a few
     industries�primarily finance and insurance�seemingly because they 
deal with dates on policies and accounts. Others note
     that their organization is affected by Y2K, but still view it as a 
well-circumscribed issue that is being addressed by their
     information technology department. What's common to these comments 
is that people hold Y2K as a narrowly-focused,
     bounded problem. They seem oblivious to the networks in which they 
participate, or to the systems and interconnections of
     modern life. 

     The second category of reactions reveals the great collective faith 
in technology and science. People describe Y2K as a
     technical problem, and then enthusiastically state that human 
ingenuity and genius always finds a way to solve these type of
     problems. Ecologist David Orr has noted that one of the fundamental 
beliefs of our time is that technology can be trusted to
     solve any problem it creates.3 If a software engineer goes on TV 
claiming to have created a program that can correct all
     systems, he is believed. After all, he's just what we've been 
expecting. 

     And then there is the uniqueness of the Year 2000 problem. At no 
other time in history have we been forced to deal with a
     deadline that is absolutely non-negotiable. In the past, we could 
always hope for a last minute deal, or rely on round-the-clock
     bargaining, or pray for an eleventh hour savior. We have never had 
to stare into the future knowing the precise date when the
     crisis would materialize. In a bizarre fashion, the inevitability of 
this confrontation seems to add to people's denial of it. They
     know the date when the extent of the problem will surface, and 
choose not to worry about it until then. 

     However, this denial is quickly dissipating. Information on Y2K is 
expanding exponentially, matched by an escalation in
     adjectives used to describe it. More public figures are speaking 
out. This is critically important. With each calendar tick of
     this time, alternatives diminish and potential problems grow. We 
must develop strategies for preparing ourselves at all levels
     to deal with whatever Y2K presents to us with the millennium dawn. 

     What we know about Y2K 

          a technological problem that cannot be solved by technology 
          the first-ever, non-negotiable deadline 
          a systemic crisis that no one can solve alone 
          a crisis that transcends boundaries and hierarchies 
          an opportunity to evoke greater capacity from individuals and 
organizations 
          an opportunity to simplify and redesign major systems 


                          Figure 1 

The Y2K problem, really 

     We'd like to describe in greater detail the extent of Y2K. As a 
global network of interrelated consequences, it begins at the
     center with the technical problem, legacy computer codes and 
embedded microchips. (see Figure One) For the last thirty
     years thousands of programmers have been writing billions of lines 
of software code for the computers on which the world's
     economy and society now depend. Y2K reporter Ed Meagher describes 
"old, undocumented code written in over 2500 different
     computer languages and executed on thousands of different hardware 
platforms being controlled by hundreds of different
     operating systems . . . [that generate] further complexity in the 
form of billions of six character date fields stored in millions
     of databases that are used in calculations."4 The Gartner Group, a 
computer-industry research group, estimates that
     globally, 180 billion lines of software code will have to be 
screened.5 Peter de Jager notes that it is not unusual for a company
     to have more than 100,000,000 lines of code--the IRS, for instance, 
has at least eighty million lines. The Social Security
     Administration began working on its thirty million lines of code in 
1991. After five years of work, in June, 1996, four
     hundred programmers had fixed only six million lines. The IRS has 
88,000 programs on 80 mainframe computers to debug.
     By the end of last year they had cleaned up 2,000 programs.6 Capers 
Jones, head of Software Productivity Research, a firm
     that tracks programmer productivity, estimates that finding, fixing 
and testing all Y2K-affected software would require over
     700,000 person-years.7 Programmers have been brought out of 
retirement and are receiving extraordinary wages and
     benefits to stick with this problem, but we are out of time. There 
aren't nearly enough programmers nor hours remaining
     before January 1, 2000. 

     Also at the center of this technical time bomb are the embedded 
microprocessors. There are somewhat over a billion of these
     hardware chips located in systems worldwide. They sustain the 
world's manufacturing and engineering base. They exist in
     traffic lights, elevators, water, gas, and electricity control 
systems. They're in medical equipment and military and navigation
     systems. America's air traffic control system is dependent upon 
them. They're located in the track beds of railroad systems
     and in the satellites that circle the earth. Global 
telecommunications are heavily dependent on them. Modern cars contain
     about two dozen microprocessors. The average American comes in 
contact with seventy microprocessors before noon every
     day. Many of these chips aren't date sensitive, but a great number 
are, and engineers looking at long ago installed systems
     don't know for sure which is which. To complicate things further, 
not all chips behave the same. Recent tests have shown that
     two chips of the same model installed in two different computers but 
performing the same function are not equally sensitive to
     the year-end problem. One shuts down and the other doesn't. 

     It is impossible to locate all of these chips in the remaining 
months, nor can we replace all those that are identified. Those
     more than three years old are obsolete and are probably not 
available in the marketplace. The solution in those cases is to
     redesign and remanufacture that part of the system -- which often 
makes starting over with new equipment the best option.
     That is why some companies are junking their computer systems and 
spending millions, even hundreds of millions, to replace
     everything. It at least ensures that their internal systems work. 

     At issue is time, people, money, and the nature of systems. These 
technical problems are exacerbated by government and
     business leaders who haven't yet fully understood the potential 
significance of this issue for their own companies, to say
     nothing of the greater economic implications. The U.S. leads all 
other developed nations in addressing this issue, minimally
     by six to nine months. Yet in a recent survey of American corporate 
chief information officers, 70% of them expressed the
     belief that even their companies would not be completely prepared 
for Y2K. Additionally, 50% of them acknowledged that they
     would not fly during January 2000. If America is the global leader 
in Y2K efforts, these CIO comments are indeed sobering. 

     The economic impacts for the global economy are enormous and 
unknown. The Gartner Group projects that the total cost of
     dealing with Y2K worldwide will be somewhere between $300 billion to 
$600 billion -- and these are only direct costs
     associated with trying to remedy the problem. (These estimates keep 
rising every quarter now.) The Office of Management
     and Budget (OMB), in a recently released Quarterly Report, estimated 
total government Y2K expense at $3.9 billion. This
     figure was based only on federal agency estimates; the OMB warned 
that this estimate might be as much as 90% too low
     considering the increasing labor shortage and expected growing 
remediation costs as January 1, 2000 looms nearer. And in
     June of this year, it was announced that federal agencies had 
already spent five billion dollars. Of twenty-four agencies,
     fifteen reported being behind schedule. 

     These numbers don't consider the loss of output caused by diverting 
resources to forestall this crisis. In more and more
     businesses, expenditures for R&D and modernization are being 
diverted to Y2K budgets. Business Week in March of 1998
     estimated that the Year 2000 economic damage alone would be $119 
billion. When potential lawsuits and secondary effects
     are added to this -- people suing over everything from stalled 
elevators to malfunctioning nuclear power plants -- the cost
     easily could be over $1 trillion. 

     But these problems and estimates don't begin to account for the 
potential impact of Y2K. The larger significance of this bomb
     becomes apparent when we consider the next circle of the global 
network-- the organizational relationships that technology
     makes possible. 

Who works with whom? 

     The global economy is dependent upon computers both directly and 
indirectly. Whether it's your PC at home, the workstation
     on a local area network, or the GPS or mobile telephone that you 
carry, all are integral parts of larger networks where
     computers are directly connected together. As we've learned, failure 
in a single component can crash the whole system; that
     system could be an automobile, a train, an aircraft, an electric 
power plant, a bank, a government agency, a stock exchange, an
     international telephone system, the air traffic control system. If 
every possible date-sensitive hardware and software bug
     hasn't been fixed in a larger system, just one programming glitch or 
one isolated chip potentially can bring down the whole
     thing. 

     While there isn't enough time or technical people to solve the Y2K 
problem before the end of next year, we might hope that
     critical aspects of our infrastructure are tackling this problem 
with extreme diligence. But this isn't true. America's electric
     power industry is in danger of massive failures, as described in 
Business Week's February '98 cover story on Y2K. They
     report that "electric utilities are only now becoming aware that 
programmable controllers -- which have replaced mechanical
     relays in virtually all electricity-generating plants and control 
rooms -- may behave badly or even freeze up when 2000
     arrives. Many utilities are just getting a handle on the problem." 
It's not only nuclear power plants that are the source of
     concern, although problems there are scary enough. In one Year 2000 
test, notes Jared S.Wermiel, leader of the Y2K effort
     at the Nuclear Regulatory Commission, the security computer at a 
nuclear power plant failed by opening vital areas that are
     normally locked. Given the complexity and the need to test, "it 
wouldn't surprise me if certain plants find that they are not
     Year 2000-ready and have to shut down."8 

     Other electric utility analysts paint a bleaker picture. Rick 
Cowles, who reports on the electric utility industry, said at the
     end of February: "Not one electric company [that he had talked to] 
has started a serious remediation effort on its embedded
     controls. Not one. Yes, there's been some testing going on, and a 
few pilot projects here and there, but for the most part it is
     still business-as-usual, as if there were 97 months to go, not 97 
weeks.9 After attending one industry trade show, Cowle
     stated that, "Based on what I learned at DistribuTECH '98, I am 
convinced there is a 100% chance that a major portion of the
     domestic electrical infrastructure will be lost as a result of the 
Year 2000 computer and embedded systems problem. The
     industry is fiddling whilst the infrastructure burns." 10

     The Federal Aviation Administration is also very vulnerable but 
quite optimistic. "We're on one hand working to get those
     computers Year 2000 compliant, but at the same time we're working on 
replacing those computers," said Paul Takemoto, a
     spokesman for the FAA in early '98. At the twenty Air Route Traffic 
Control Centers, there is a host computer and a backup
     system. All forty of these machines --mid-'80s vintage IBM 3083 
mainframes--are affected. And then there are the satellites
     with embedded chips, individual systems in each airplane, and air 
traffic control systems around the globe. Lufthansa already
     has announced it will not fly its aircraft during the first days of 
2000. 

Who else is affected? 

     But the interdependency problem extends far beyond single 
businesses, or even entire industries. Indirect relationships
     extend like tentacles into many other networks, creating the 
potential for massive disruptions of service. 

     Let's hope that your work organization spends a great deal of money 
and time to get its entire information system compliant.
     You know yours is going to function. But on the second of January 
2000 the phone calls start. It's your banker. "There's
     been a problem," he says. They've lost access to your account 
information and until they solve the problem and get the backup
     loaded on the new system, they are unable to process your payroll. 
"We don't have any idea how long it will take," the
     president says. 

     Then someone tells you that on the news there's a story that that 
the whole IRS is down and that they can neither accept nor
     process tax information. Social Security, Federal Housing, 
Welfare�none of these agencies are capable of issuing checks
     for the foreseeable future. Major airlines aren't flying, waiting to 
see if there is still integrity in the air traffic control
     system. And manufacturing across the country is screeching to a halt 
because of failures in their supply chain. (After years
     of developing just in time (JIT) systems, there is no inventory on 
hand�suppliers have been required to deliver parts as
     needed. There is no slack in these systems to tolerate even minor 
delivery problems.) Ground and rail transport have been
     disrupted, and food shortages appear within three to six days in 
major metropolises. Hospitals, dealing with the failure of
     medical equipment, and the loss of shipments of medicine, are forced 
to deny non-essential treatment, and in some cases are
     providing essential care in pre-technical ways. 

     It's a rolling wave of interdependent failures. And it reaches 
across the country and the world to touch people who, in most
     cases, didn't know they were linked to others. Depending on what 
systems fail, very few but strategically placed failures would
     initiate a major economic cascade. Just problems with power 
companies and phone systems alone would cause real havoc.
     (This spring, a problem in ATT rendered all credit card machines 
useless for a day. How much revenue was lost by
     businesses?) If only twenty percent of businesses and government 
agencies crash at the same time, major failures would
     ensue. 

     In an interdependent system, solving most of the problem is no 
solution. As Y2K reporter Ed Meagher describes: 

          It is not enough to solve simply "most of these problems." The 
integration of these systems requires that we
          solve virtually all of them. Our ability as an economy and as a 
society to deal with disruptions and breakdowns
          in our critical systems is minuscule. Our worst case scenarios 
have never envisioned multiple, parallel
          systemic failures. Just in time inventory has led to just in 
time provisioning. Costs have been squeezed out of
          all of our critical infrastructure systems repeatedly over time 
based on the ubiquity and reliability of these
          integrated systems. The human factor, found costly, slow, and 
less reliable has been purged over time from our
          systems. Single, simple failures can be dealt with; complex, 
multiple failures have been considered too remote
          a possibility and therefore too expensive to plan for. 11 

     The city of New York began to understand this last September. The 
governor of New York State banned all nonessential IT
     projects to minimize the disruption caused by the year 2000 bomb 
after reading a detailed report that forecasts the
     millennium will throw New York City into chaos, with power supplies, 
schools, hospitals, transport, and the finance sector
     likely to suffer severe disruption. Compounding the city's Y2K risks 
is the recent departure of the head of its year 2000
     project to a job in the private sector.12 

     But of course the anticipated problems extend far beyond U.S. 
shores. In February, the Bangkok Post reported that Phillip
     Dodd, a Unysis Y2K expert, expects that upward of 70% of the 
businesses in Asia will fail outright or experience severe
     hardship because of Y2K. The Central Intelligence Agency supports 
this with their own analysis: "We're concerned about
     the potential disruption of power grids, telecommunications and 
banking services, among other possible fallout, especially in
     countries already torn by political tensions."13 

     A growing number of assessments of this kind have led Dr. Edward 
Yardeni, the chief economist of Deutsche Morgan
     Grenfell, to keep raising the probability of a deep global recession 
in 2000-2001 as the result of Y2K. His present estimate of
     the potential for such a recession now hovers at about 70%, up from 
40% at the end of 1997.14 

How might we respond? 

(To be continued...)








From nnburk at cobain.HDC.NET  Sat Sep 26 00:15:31 1998
From: nnburk at cobain.HDC.NET (nnburk)
Date: Sat, 26 Sep 1998 15:15:31 +0800
Subject: The Year 2000: Social Chaos or Social Transformation? (Part 2)
Message-ID: <360D6406.45F0@yankton.com>



How might we respond? 

     As individuals, nations, and as a global society, do we have a 
choice as to how we might respond to Y2K, however problems
     materialize? The question of alternative social responses lies at 
the outer edges of the interlocking circles of technology and
     system relationships. At present, potential societal reactions 
receive almost no attention. But we firmly believe that it is the
     central most important place to focus public attention and 
individual ingenuity. Y2K is a technology-induced problem, but it
     will not and cannot be solved by technology. It creates societal 
problems that can only be solved by humans. We must begin
     to address potential social responses. We need to be engaged in this 
discourse within our organizations, our communities,
     and across the traditional boundaries of competition and national 
borders. Without such planning, we will slide into the Year
     2000 as hapless victims of our technology. 

     Even where there is some recognition of the potential disruptions or 
chaos that Y2K might create, there's a powerful dynamic
     of secrecy preventing us from engaging in these conversations. 
Leaders don't want to panic their citizens. Employees don't
     want to panic their bosses. Corporations don't want to panic 
investors. Lawyers don't want their clients to confess to anything.
     But as psychotherapist and information systems consultant Dr. 
Douglass Carmichael has written: 

          Those who want to hush the problem ("Don't talk about it, 
people will panic", and "We don't know for sure.")
          are having three effects. First, they are preventing a more 
rigorous investigation of the extent of the problem.
          Second, they are slowing down the awareness of the intensity of 
the problem as currently understood and the
          urgency of the need for solutions, given the current assessment 
of the risks. Third, they are making almost
          certain a higher degree of ultimate panic, in anger, under 
conditions of shock.15 

     Haven't we yet learned the consequences of secrecy? When people are 
kept in the dark, or fed misleading information, their
     confidence in leaders quickly erodes. In the absence of real 
information, people fill the information vacuum with rumors and
     fear. And whenever we feel excluded, we have no choice but to 
withdraw and focus on self-protective measures. As the veil of
     secrecy thickens, the capacity for public discourse and shared 
participation in solution-finding disappears. People no longer
     believe anything or anybody�we become unavailable, distrusting and 
focused only on self-preservation. Our history with the
     problems created by secrecy has led CEO Norman Augustine to advise 
leaders in crisis to: "Tell the truth and tell it fast."16 

     Behaviors induced by secrecy are not the only human responses 
available. Time and again we observe a much more positive
     human response during times of crisis. When an earthquake strikes, 
or a bomb goes off, or a flood or fire destroys a
     community, people respond with astonishing capacity and 
effectiveness. They use any available materials to save and rescue,
     they perform acts of pure altruism, they open their homes to one 
another, they finally learn who their neighbors are. We've
     interviewed many people who participated in the aftermath of a 
disaster, and as they report on their experiences, it is clear
     that their participation changed their lives. They discovered new 
capacities in themselves and in their communities. They
     exceeded all expectations. They were surrounded by feats of caring 
and courage. They contributed to getting systems restored
     with a speed that defied all estimates. 

     When chaos strikes, there's simply no time for secrecy; leaders have 
no choice but to engage every willing soul. And the field
     for improvisation is wide open�no emergency preparedness drill ever 
prepares people for what they actually end up doing.
     Individual initiative and involvement are essential. Yet 
surprisingly, in the midst of conditions of devastation and fear, people
     report how good they feel about themselves and their colleagues. 
These crisis experiences are memorable because the best of
     us becomes visible and available. We've observed this in America, 
and in Bangladesh, where the poorest of the poor
     responded to the needs of their most destitute neighbors rather than 
accepting relief for themselves. 

     What we know about people in crisis 

          shared purpose and meaning brings people together 
          people display unparalleled levels of creativity and 
resourcefulness 
          people want to help others - individual agendas fade 
immediately 
          people learn instantly and respond at lightning speed 
          the more information people get, the smarter their responses 
          leadership behaviors (not roles) appear everywhere, as needed 
          people experiment constantly to find what works 

Who might we become? 

     As we sit staring into the unknown dimensions of a global crisis 
whose timing is non-negotiable, what responses are available
     to us as a human community? An effective way to explore this 
question is to develop potential scenarios of possible social
     behaviors. Scenario planning is an increasingly accepted technique 
for identifying the spectrum of possible futures that are
     most important to an organization or society. In selecting among 
many possible futures, it is most useful to look at those that
     account for the greatest uncertainty and the greatest impact. For 
Y2K, David Isenberg, (a former AT&T telecommunications
     expert, now at Isen.Com) has identified the two variables which seem 
obvious � the range of technical failures from isolated to
     multiple, and the potential social responses, from chaos to 
coherence. Both variables are critical and uncertain and are
     arrayed as a pair of crossing axes, as shown in Figure 2. When 
displayed in this way, four different general futures emerge.
     In the upper left quadrant, if technical failures are isolated and 
society doesn't respond to those, nothing of significance will
     happen. Isenberg labels this the "Official Future" because it 
reflects present behavior on the part of leaders and
     organizations. 

                               Figure 2.

     The upper right quadrant describes a time where technical failures 
are still isolated, but the public responds to these with
     panic, perhaps fanned by the media or by stonewalling leaders. 
Termed "A Whiff of Smoke," the situation is analogous to the
     panic caused in a theater by someone who smells smoke and spreads an 
alarm, even though it is discovered that there is no
     fire. This world could evolve from a press report that fans the 
flames of panic over what starts as a minor credit card glitch
     (for example), and, fueled by rumors turns nothing into a major 
social problem with runs on banks, etc. 

     The lower quadrants describe far more negative scenarios. 
"Millennial Apocalypse" presumes large-scale technical failure
     coupled with social breakdown as the organizational, political and 
economic systems come apart. The lower left quadrant,
     "Human Spirit" posits a society that, in the face of clear 
adversity, calls on each of us to collaborate in solving the problems of
     breakdown.

     Since essentially we are out of time and resources for preventing 
widespread Y2K failures, a growing number of observers
     believe that the only plausible future scenarios worth contemplating 
are those in the lower half of the matrix. The major
     question before us is how will society respond to what is almost 
certain to be widespread and cascading technological
     failures? 

                               Figure 3.

     Figure 3 above shows a possible natural evolution of the problem. 
Early, perhaps even in '98, the press could start something
     bad long before it was clear how serious the problem was and how 
society would react to it. There could be an interim scenario
     where a serious technical problem turned into a major social problem 
from lack of adaquate positive social response. This
     "Small Theatre Fire" future could be the kind of situation where 
people overreact and trample themselves trying to get to the
     exits from a small fire that is routinely extinguished. 

     If the technical situation is bad, a somewhat more ominous situation 
could evolve where government, exerting no clear positive
     leadership and seeing no alternative to chaos, cracks down so as not 
to lose control (A common historical response to social
     chaos has been for the government to intervene in non-democratic, 
sometimes brutal fashion. "Techno-fascism" is a plausible
     scenario -- governments and large corporations would intervene to 
try to contain the damage -- rather than build for the
     future. This dictatorial approach would be accompanied by secrecy 
about the real extent of the problem and ultimately fueled
     by the cries of distress, prior to 2000, from a society that has 
realized its major systems are about to fail and that it is too late
     to do anything about it. 

Collaboration is our only choice 

     Obviously, the scenario worth working towards is "Human Spirit," a 
world where the best of human creativity is enabled and
     the highest common good becomes the objective. In this world we all 
work together, developing a very broad, powerful,
     synergistic, self-organizing force focused on determining what 
humanity should be doing in the next 18 months to plan for
     the aftermath of the down stroke of Y2K. This requires that we 
understand Y2K not as a technical problem, but as a systemic,
     worldwide event that can only be resolved by new social 
relationships. All of us need to become very wise and very engaged
     very fast and develop entirely new processes for working together. 
Systems issues cannot be resolved by hiding behind
     traditional boundaries or by clinging to competitive strategies. 
Systems require collaboration and the dissolution of existing
     boundaries. Our only hope for healthy responses to Y2K-induced 
failures is to participate together in new collaborative
     relationships. 

     At present, individuals and organizations are being encouraged to 
protect themselves, to focus on solving "their" problem. In
     a system's world, this is insane. The problems are not isolated, 
therefore no isolated responses will work. The longer we
     pursue strategies for individual survival, the less time we have to 
create any viable, systemic solutions. None of the
     boundaries we've created across industries, organizations, 
communities, or nation states give us any protection in the face of
     Y2K. We must stop the messages of fragmentation now and focus 
resources and leadership on figuring out how to engage
     everyone, at all levels, in all systems. 

     As threatening as Y2K is, it also gives us the unparalleled 
opportunity to figure out new and simplified ways of working
     together. GM's chief information officer, Ralph Szygenda, has said 
that Y2K is the cruelest trick ever played on us by
     technology, but that it also represents a great opportunity for 
change.17   It demands that we let go of traditional boundaries
     and roles in the pursuit of new, streamlined systems, ones that are 
less complex than the entangled ones that have evolved over
     the past thirty years. 

     There's an interesting lesson here about involvement that comes from 
the Oklahoma City bombing in 1995. Just a few weeks
     prior the bombing, agencies from all over the city conducted an 
emergency preparedness drill as part of normal civil defense
     practice. They did not prepare themselves for a bomb blast, but they 
did work together on other disaster scenarios. The most
     significant accomplishment of the drill was to create an invisible 
infrastructure of trusting relationships. When the bomb
     went off, that infrastructure displayed itself as an essential 
resource--people could work together easily, even in the face of
     horror. Many lives were saved and systems were restored at an 
unprecedented rate because people from all over the
     community worked together so well. 

     But there's more to this story. One significant player had been 
excluded from the preparedness drill, and that was the FBI. No
     one thought they'd ever be involved in a Federal matter. To this 
day, people in Oklahoma City speak resentfully of the manner
     in which the FBI came in, pushed them aside, and offered no 
explanations for their behavior. In the absence of trusting
     relationships, some form of techno-fascism is the only recourse. 
Elizabeth Dole, as president of the American Red Cross
     commented: "The midst of a disaster is the poorest possible time to 
establish new relationships and to introduce ourselves to
     new organizations . . . . When you have taken the time to build 
rapport, then you can make a call at 2 a.m., when the river's
     rising and expect to launch a well-planned, smoothly conducted 
response."18 

     The scenario of communities and organizations working together in 
new ways demands a very different and immediate
     response not only from leaders but from each of us. We'd like to 
describe a number of actions that need to begin immediately. 

What leaders must do 

     We urge leaders to give up trying to carry this burden alone, or 
trying to reestablish a world that is irretrievably broken. We
     need leaders to be catalysts for the emergence of a new world. They 
cannot lead us through this in traditional ways. No leader
     or senior team can determine what needs to be done. No single group 
can assess the complexity of these systems and where
     the consequences of failure might be felt. The unknown but complex 
implications of Y2K demand that leaders support
     unparalleled levels of participation�more broad-based and inclusive 
than ever imagined. If we are to go through this crisis
     together rather than bunkered down and focused only on individual 
security, leaders must begin right now to convene us.
     The first work of leaders then, is to create the resources for 
groups to come together in conversations that will reveal the
     interconnections. Boundaries need to dissolve. Hierarchies are 
irrelevant. Courageous leaders will understand that they
     must surrender the illusion of control and seek solutions from the 
great networks and communities within their domain.
     They must move past the dynamics of competition and support us in 
developing society-wide solutions. 

     Leaders can encourage us to seek out those we have excluded and 
insist that they be invited in to all deliberations. Leaders
     can provide the time and resources for people to assess what is 
critical for the organization or community to sustain�its
     mission, its functions, its relationships, its unique qualities. 
>From these conversations and plans, we will learn to know one
     another and to know what we value. In sudden crises, people 
instantly share a sense of meaning and purpose. For Y2K, we have
     at least a little lead time to develop a cohesive sense of what 
might happen and how we hope to respond.

     Secrecy must be replaced by full and frequent disclosure of 
information. The only way to prevent driving people into isolated
     and self-preserving behaviors is to entrust us with difficult, even 
fearsome information, and then to insist that we work
     together. 

     No leader anywhere can ignore these needs or delay their 
implementation. 

What communities must do 

     Communities need to assess where they are most vulnerable and 
develop contingency plans. Such assessment and planning
     needs to occur not just within individual locales, but also in 
geographic regions. These activities can be initiated by existing
     community networks, for example, civic organizations such as Lions 
or Rotary, Council of Churches, Chamber of Commerce,
     the United Way. But new and expansive alliances are required, so 
planning activities need quickly to extend beyond traditional
     borders. We envision residents of all ages and experience coming 
together to do these audits and planning. Within each
     community and region, assessments and contingency plans need to be 
in place for disruptions or loss of service for:

          all utilities 
          electricity, water, gas, phones 
          food supplies 
          public safety 
          healthcare 
          government payments to individuals and organizations 
          residents most at risk, e.g. the elderly, those requiring 
medications 

What organizations must do 

     Organizations need to move Y2K from the domain of technology experts 
into the entire organization. Everyone in the
     organization has something important to contribute to this work. 
Assessment and contingency plans need to focus on: 

          how the organization will perform essential tasks in the 
absence of present systems 
          how the organization will respond to failures or slowdowns in 
information and supplies 
          what simplified systems can be developed now to replace 
existing ones 
          relationships with suppliers, customers, clients, 
communities�how we will work together 
          developing systems to ensure open and full access to 
information 

     The trust and loyalty developed through these strategic 
conversations and joint planning will pay enormous dividends later on,
     even if projected breakdowns don't materialize. Corporate and 
community experience with scenario planning has taught a
     important principle: We don't need to be able to predict the future 
in order to be well-prepared for it. In developing scenarios,
     information is sought from all over. People think together about its 
implications and thus become smarter as individuals and
     as teams. Whatever future then materializes is dealt with by people 
who are more intelligent and who know how to work well
     together. 

     And such planning needs to occur at the level of entire industries. 
Strained relationships engendered by competitive
     pressures need to be put aside so that people can collaboratively 
search for ways to sustain the very fabric of their industry.
     How will power grids be maintained nationally? Or national systems 
of food transport? How will supply chains for
     manufacturing in any industry be sustained?

What you can do 

     We urge you to get involved in Y2K, wherever you are, and in 
whatever organizations you participate. We can't leave this
     issue to others to solve for us, nor can we wait for anyone else to 
assert leadership. You can begin to ask questions; you can
     begin to convene groups of interested friends and colleagues; you 
can engage local and business leaders; you can educate
     yourself and others (start with www.Year2000.com and www.Y2K.com for 
up-to-date information and resources.) This is our
     problem. And as an African proverb reminds us, if you think you're 
too small to make a difference, try going to bed with a
     mosquito in the room. 

The crisis is now 

     There is no time left to waste. Every week decreases our options. At 
the mid-May meeting of leaders from the G8, a
     communiqu� was issued that expressed their shared sensitivity to the 
"vast implications" of Y2K, particularly in "defense,
     transport, telecommunications, financial services, energy, and 
environmental sectors," and the interdependencies among
     these sectors. (Strangely, their list excludes from concern 
government systems, manufacturing and distribution systems.)
     They vowed to "take further urgent action" and to work with one 
another, and relevant organizations and agencies. But no
     budget was established, and no specific activities were announced. 
Such behavior�the issuing of a communiqu�, the promises
     of collaboration and further investigation�are all too common in our 
late 20th century political landscape. 

     But the earth continues to circle the sun, and the calendar 
relentlessly progresses toward the Year 2000. If we cannot
     immediately change from rhetoric to action, from politics to 
participation, if we do not immediately turn to one another and
     work together for the common good, we will stand fearfully in that 
new dawn and suffer consequences that might well have
     been avoided if we had learned to stand together now. 

Copyright 1998 John L. Petersen, Margaret Wheatley, Myron Kellner-Rogers 
(posted with permission)



     John L. Petersen is president of The Arlington Institute, a 
Washington DC area research institute. He is a futurist who
     specializes in thinking about the long range security implications 
of global change. He is author of the award winning book,
     The Road to 2015: Profiles of the Future and his latest book is Out 
of the Blue - Wild Cards and Other Big Future Surprises,
     which deals with potential events such as Y2K. He can be reached at 
703-243-7070 or johnp at arlinst.org 

     Margaret Wheatley and Myron Kellner-Rogers are authors and 
consultants to business. A Simpler Way, their book on
     organizational design was published in 1997. Dr. Wheatley's previous 
book, Leadership & the New Science, was recently
     named one of the 10 best management books ever, and it also was 
voted best management book in 1992 in Industry Week, and
     again in 1995 by a syndicated management columnist. Their consulting 
work takes them these days to Brazil, Mexico, South
     Africa, Australasia and Europe. In the States, they've worked with a 
very wide array of organizations. 



1 See Peter de Jager, www.year2000.com 

2 United Airlines, Flight Talk Network, February 1998 

3 "Slow Knowledge," _______1997. 

4 See "The Complexity Factor" by Ed Meagher at 
www.year2000.com/archive/NFcomplexity.html

5 "Industry Wakes Up to the Year 2000 Menace," Fortune, April 27, 1998 

6 The Washington Post, "If Computer Geeks Desert, IRS Codes Will Be 
ciphers," December 24, 1997 

7 Business Week, March 2, 1998 

8 www.igs.net/~tonyc/y2kbusweek.html 

9 "Industry Gridlock," Rick Cowles, February 27, 1998, 
www.y2ktimebomb.com/PP/RC/rc9808.htm 

10 Cowles, January 23, 1998, ibid www site 

11 The Complexity Factor, Ed Meagher 

12 www.computerweekly.co.uk/news/ll_9_97 

13 REUTER "CIA:Year 2000 to hit basic services: Agency warns that many 
nations aren't ready for disruption," Jim Wolf, May 7, 1998 

14 see http://www.Yardeni.com 

15  www.tmn.com/~doug

16 "Managing the Crisis You Tried to Prevent," Harvard Business Review, 
Nov-Dec. 1995, 158. 

17 In Fortune, April 27, 1998 

18 quoted in "Managing the Crisis You Tried to Prevent," Norman 
Augustine, Harvard Business Review, Nov-Dec 1995, 151. 



To WFS Home







From honig at sprynet.com  Sat Sep 26 00:20:21 1998
From: honig at sprynet.com (David Honig)
Date: Sat, 26 Sep 1998 15:20:21 +0800
Subject: IP: Funny Money: New $20 FRNs are here
In-Reply-To: 
Message-ID: <3.0.5.32.19980926125123.0084e2b0@m7.sprynet.com>




At 03:20 PM 9/25/98 -0700, pnet at proliberty.com wrote:

>It has been reported that these 'security threads' enable detection
>equipment at airports to measure, or estimate, the amount of cash a person
>is carrying. 

1. Diamonds fluoresce under x rays.  Don't know about alumina.
2. Anyone tried to get an RF reflection off the chaff-strips in the bills?








  








From paulmerrill at acm.org  Sat Sep 26 00:23:27 1998
From: paulmerrill at acm.org (Paul H. Merrill)
Date: Sat, 26 Sep 1998 15:23:27 +0800
Subject: faggots
In-Reply-To: 
Message-ID: <360D7655.7B88B561@acm.org>



Now there is one that isn't clueless.  Not particularly nice, but not
clueless.

PHM

CSapronett at aol.com wrote:
> 
> My only regret is that I wont get to watch you all burn in hell !!!





From nobody at replay.com  Sat Sep 26 00:40:10 1998
From: nobody at replay.com (Anonymous)
Date: Sat, 26 Sep 1998 15:40:10 +0800
Subject: No Subject
Message-ID: <199809262036.WAA18977@replay.com>



Navy fights new hack method

http://www.abcnews.com/sections/tech/CNET/cnet_navyhack980925.html

Tim Clark
CNET NEWS.COM
Hackers are banding together across the globe to mount low-visibility
attacks in an effort to sneak under the radar of security specialists and
intrusion detection software, a U.S. Navy network security team said today. 

Coordinated attacks from up to 15 different locations on several continents
have been detected, and Navy experts believe that the attackers garner
information by probing Navy Web sites and then share it among themselves. 

"These new patterns are really hard to decipher--you need expert forensics
to get the smoking gun," said Stephen Northcutt, head of the Shadow
intrusion detection team at the Naval Surface Warfare Center. "To know
what's really happening will require law enforcement to get hold of the
hackers' code so we can disassemble it." 

The new method involves sending as few as two suspicious probes per hour to
a host computer, a level of interest that usually won't be detected by
standard countermeasures. But by pooling information learned from those
probes, hackers can garner considerable knowledge about a site. 

Northcutt said the new technique for attacks was discovered only this month
and has been detected at Defense Department facilities as well as in
private sector sites, including some outside the United States. 

The Shadow group has posted descriptions of the attacks and
countermeasures, and the information has been forwarded to CERT, which
investigates security attacks. 

"Most intrusion detection systems have a threshold, a radar. These attacks
are intentionally sliding under that threshold so normal intrusion
detection tools will not detect them," said Tim Aldrich, principal analyst
at the Navy facility. 

The Shadow team said that although the new method is harder to detect, it
should not affect sites that are well-secured. But the technique puts sites
with weak security at greater risk. 

The attacks do not involve a new hacker tool or new kind of attack, but
rather represent a low-visibility technique for perpetrating attacks. For
example, one coordinated attack that involved at least 14 locations simply
probed a Web site for security weaknesses without mounting a break-in. 

The Shadow Intrusion Detection team said it cannot determine how many
people might be involved in the attacks--hackers frequently use many
different machines to launch their attacks. But the number of individuals
involved is less important than the technique itself, Northcutt said. 

The technique could be used to scan or mount attacks from more than 100
Internet addresses. The security experts also suggested that makers of
commercial intrusion detection software need to counter the new method. 

"This stealthy probing enables large amounts of parallel firepower, which
means many attack attempts [from many sites] over a short time frame," said
a note distributed by the System Administration Networking and Security
(SANS) Institute. 

Going public with a news of new hacker techniques is somewhat unusual in
the secretive network security community, which often fears that
publicizing attacks before countermeasures are known will tip off attackers
to vulnerabilities. 

"We went public in hopes of raising awareness," Northcutt said. "You're
only going to be able to find stealthy stuff by looking for stealthy stuff." 

But before publicizing the new hacker technique, he added, the Shadow team
had checked to be certain it would not jeopardize any official actions
against the attackers. He also thinks that users of the attack may be caught. 

"If they're working together, it ought to be easier to track them down
because they leave more of a trail," he said. 








  








From nobody at base.xs4all.nl  Sat Sep 26 02:20:10 1998
From: nobody at base.xs4all.nl (Anonymous)
Date: Sat, 26 Sep 1998 17:20:10 +0800
Subject: No Subject
Message-ID: 



CSapronett at aol.com (note: AOL.COM -- LOL!) wrote:
>My only regret is that I wont get to watch you all burn in hell !!!

I see.  Would you mind elaborating?  We are going to burn in hell
because...? We don't use AOL? We like our privacy? We use cryptosystems
that you'll never understand in your life time?  Because we know how
to use (and create) remailers?



**

~*--*~

___________________________________________________________________
You don't need to buy Internet access to use free Internet e-mail.
Get completely free e-mail from Juno at http://www.juno.com
Or call Juno at (800) 654-JUNO [654-5866]





From honig at sprynet.com  Sat Sep 26 03:33:04 1998
From: honig at sprynet.com (David Honig)
Date: Sat, 26 Sep 1998 18:33:04 +0800
Subject: Ueli Maurer's Univ. Stat. Test for Rand No -in C
Message-ID: <3.0.5.32.19980926162749.0082e990@m7.sprynet.com>





/*
UELI.c

This implements Ueli M Maurer's
"Universal Statistical Test for Random Bit Generators"
using L=16

Accepts a filename on the command line;
writes its results, with other info, to stdout.

Handles input file exhaustion gracefully.

Ref: J. Cryptology v 5 no 2, 1992 pp 89-105
also on the web somewhere.

-David Honig
honig at sprynet.com


Built with Wedit 2.3, lcc-win32
http://www.cs.virginia.edu/~lcc-win32


26 Sept CP Release
Version Notes:

	This version does L=16.  It evolved from an L=8 prototype
	which I ported from the Pascal in the above reference.

	I made the memory usage reasonable
	by replacing Maurer's "block" array
	with the 'streaming' fgetc() call.


Usage:
	UELI filename
	outputs to stdout

*/

#define L 16		// bits per block
#define V (1<
#include 


int main( int argc, char **argv )
{
FILE *fptr;
int i;
int b, c;
int table[V];
float sum=0.0;
int run;

// Human Interface
printf("UELI 26 Sep 98\nL=%d %d %d \n", L, V, MAXSAMP);
if (argc <2)
	{printf("Usage: UELI filename\n"); exit(-1); }
else
	printf("Measuring file %s\n", argv[1]);

// FILE IO
fptr=fopen(argv[1],"rb");
if (fptr == NULL) {printf("Can't find %s\n", argv[1]); exit(-1); }

// INIT
for (i=0; i
Message-ID: <360DA54D.92364366@acm.org>



Anonymous wrote:
> 
> CSapronett at aol.com (note: AOL.COM -- LOL!) wrote:
> >My only regret is that I wont get to watch you all burn in hell !!!
> 
> I see.  Would you mind elaborating?  We are going to burn in hell
> because...? We don't use AOL? We like our privacy? We use cryptosystems
> that you'll never understand in your life time?  Because we know how
> to use (and create) remailers?
> 
<>
Hear!! Hear!!

And so what if we offer to kill people for answering their email, and
whose business is it but ours if we feel that soliciting baby porn is an
appropriate reaction to the insidious act of replying to a message even
if you aren't certain who it is from?

PHM





From howree at cable.navy.mil  Sat Sep 26 03:54:17 1998
From: howree at cable.navy.mil (Reeza!)
Date: Sat, 26 Sep 1998 18:54:17 +0800
Subject: 
In-Reply-To: 
Message-ID: <3.0.5.32.19980927094943.00832610@205.83.192.13>



At 12:14 AM 9/27/98 +0200, Anonymous wrote:
>CSapronett at aol.com (note: AOL.COM -- LOL!) wrote:
>>My only regret is that I wont get to watch you all burn in hell !!!
>
>I see.  Would you mind elaborating?  We are going to burn in hell
>because...? We don't use AOL? We like our privacy? We use cryptosystems
>that you'll never understand in your life time?  Because we know how
>to use (and create) remailers?

Don't bother, it is a troll.

Not a very original, or even interesting one either.

Reeza!

"...The world was on fire, but no one could save me but you...
	Strange what desire will make foolish people do...
		(and the background vocalists sang)
			This world is only gonna break your heart...."

					==C.I.==





From tcmay at got.net  Sat Sep 26 04:34:15 1998
From: tcmay at got.net (Tim May)
Date: Sat, 26 Sep 1998 19:34:15 +0800
Subject: faggots
In-Reply-To: 
Message-ID: 



At 12:48 PM -0700 9/26/98, CSapronett at aol.com wrote:
>My only regret is that I wont get to watch you all burn in hell !!!


Oh, but you will.


--Tim May


(This space left blank pending determ. of acceptability to the gov't.)
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.







From nobody at replay.com  Sat Sep 26 05:12:33 1998
From: nobody at replay.com (Anonymous)
Date: Sat, 26 Sep 1998 20:12:33 +0800
Subject: 
Message-ID: <199809270108.DAA19081@replay.com>



On Sun, 27 Sep 1998, Reeza! wrote:

>
> At 12:14 AM 9/27/98 +0200, Anonymous wrote:
> >CSapronett at aol.com (note: AOL.COM -- LOL!) wrote:
> >>My only regret is that I wont get to watch you all burn in hell !!!
> >
> >I see.  Would you mind elaborating?  We are going to burn in hell
> >because...? We don't use AOL? We like our privacy? We use cryptosystems
> >that you'll never understand in your life time?  Because we know how
> >to use (and create) remailers?
>
> Don't bother, it is a troll.
>
> Not a very original, or even interesting one either.

Whenever these people troll for flames here they get them one way or
another. Then it seems Merrill always tries to take the moral high ground 
and show us all his bleeding heart and tell us how we should embrace the 
AOL idiots and cherish them. The AOLers get triple effect that way. I don't 
think Merrill ever misses a chance to defend AOL and attack anybody who 
attacks them. About a week ago somebody posted a copy or parts of most AOL 
postings which were sent here in the last months. Merrill ignores the part 
about how the posts were classified and sends back some vague flame accusing 
the author of classing posts he disagreed with as "clueless" then he quotes 
the entire thing back to the list.

I don't know which is worse. At least the people flaming the AOL wimps are
funny.





From nobody at sind.hyperreal.art.pl  Sat Sep 26 06:05:29 1998
From: nobody at sind.hyperreal.art.pl (HyperReal-Anon)
Date: Sat, 26 Sep 1998 21:05:29 +0800
Subject: ArcotSign (was Re: Does security depend on hardware?)
Message-ID: 



Julian,

1. Minor nit-picks should be off-line, not spammed to 3 lists.
2. Tupographical errors should not be nit-picked.
3. Spell check your grammar flames.

and
4. Do what I say, not what I do.

proff at iq.org wrote:
> 
> > >the legitimate user has, excepting the 'remembered secret'. Or is
> > >there anything wrong with my logic?
> >
> > Yes.  There is something wrong with you logic.
> >
> > Bruce
> > **********************************************************************
> > Bruce Schneier, President, Counterpane Systems     Phone: 612-823-1098
> 
> There's something wrong with you grammer.
                                   ^^^^^^^
"grammer" indeed!

> 
> Cheers,
> Julian.





From updates at olsen.ch  Sat Sep 26 07:20:58 1998
From: updates at olsen.ch (OANDA Member Service)
Date: Sat, 26 Sep 1998 22:20:58 +0800
Subject: The Currency Site Member Update
Message-ID: <199809270321.FAA29582@clam.money>



Dear OANDA member,

Updates in this edition:

- Enhancement of Historical and Daily Table
- Improved Personalization of the converters
- Multilanguage Support for Historical and
  Interactive Table
- OANDA co-brands Express by Infoseek

***********************************************************
* This is our second edition of the Member Update. In     *
* the past we have received many suggestions for new      *
* products and services. We hope this newsletter helps    *
* keep you updated on the developments and new releases.  *
* If you do not wish to learn about additional services   *
* and news, please click on the following link            *
* mailto:updates at oanda.com?subject=nofurthernews and send *
* the message without adding any text. Our goal is to     *
* fullfil your wishes and deliver the services you need.  *
***********************************************************

---------------------------------------------------------
Fast Enhanced Historical Currency Table
   - http://www.oanda.com/converter/cc_table
Fast Enhanced Interactive Daily Table
   - http://www.oanda.com/converter/cc_quotes

Due to the quickly increasing access to our two new products,
we have adopted the fast cgi approach for both products.
Furthermore the choice of output as HTML, ASCII and CSV 
facilitates the importing of data into spreadsheet solutions.
If you do calculations with multiple currencies, you can
now easily get the necessary rates into your spreadsheet.

---------------------------------------------------------
Improved Personalization of converter services
   Description of manual editing for all converters:
   - http://www.oanda.com/site/personalize.shtml
   Interactive Interface:
   - http://www.oanda.com/converter/classic?do=pref

Taken into consideration all the suggestions we have
received, we now offer many personalization possibilities
for all our converters including the customized versions.
You can now select a personal list of currencies or, if
you prefer, you keep the whole list, but your most needed
currencies always appear on top of the menu. Therefore
you can generate converters personalized to your needs
of currency information.

---------------------------------------------------------
Multilanguage support for the Historical Currency Table
and the Interactive Daily Table:
   German
   - http://www.oanda.com/converter/cc_table?lang=de
   - http://www.oanda.com/converter/cc_quotes?lang=de
   French:
   - http://www.oanda.com/converter/cc_table?lang=fr
   - http://www.oanda.com/converter/cc_quotes?lang=fr
   Italian:
   - http://www.oanda.com/converter/cc_table?lang=it
   - http://www.oanda.com/converter/cc_quotes?lang=it

To serve the needs of our international customers better,
we are constantly expanding our language choices. We have
just recently extended the support of French, Italian
and German to our new products - the Historical Currency
Table and the Interactive Daily Table.

---------------------------------------------------------
OANDA co-brands Express by Infoseek
http://express.infoseek.com/dve/download_express.phtml?dve_id=143

Announced on September 22,Express by Infoseek is a
next-generation desktop search product which brings
multiple search and information sources together in one 
place. With Express you can find, explore, and do anything 
on the Internet faster and easier.  OANDA is among the 
first round co-distributors of this new product, along
with USA Today, DejaNews, PC World, and others.  To 
download the free co-branded Express by Infoseek, just
click on the link above, or click on the Express 
logo at the top left of the OANDA home page.

---------------------------------------------------------

OANDA Statistics Spotlight:

Over 3000 sites are now using a customized version of our
Classic Currency Converter or Cheat Sheet for Travelers. 

----------------------------------------------------------

Thank you for using the OANDA services.


Best regards,

The OANDA team
updates at oanda.com
http://www.oanda.com





From paulmerrill at acm.org  Sat Sep 26 08:04:01 1998
From: paulmerrill at acm.org (Paul H. Merrill)
Date: Sat, 26 Sep 1998 23:04:01 +0800
Subject: 
In-Reply-To: <199809270108.DAA19081@replay.com>
Message-ID: <360DE0BD.7BC844AD@acm.org>



<>
> 
> Whenever these people troll for flames here they get them one way or
> another. Then it seems Merrill always tries to take the moral high ground
> and show us all his bleeding heart and tell us how we should embrace the
> AOL idiots and cherish them. 

1.  As a matter of fact, I do try to take the moral high ground -- in
all things.  Sorry, it was how I was raised and I do not intend to swith
to seeking the immoral low ground.
2.  I have Never said to embrace and cherish the idiots from AOL.  Just
that some of the actions I have seen are much closer to the immoral low
ground.

> I don't think Merrill ever misses a chance to defend AOL and attack anybody who
> attacks them. 

I do not mean to Defend AOL except from misinformation -- BTW some of
the characteristics attributed to AOL and its software show a great deal
of clueneediness on the part of the "authors" or a need for
reaquaintance with the truth if the folk actually have a clue and
deciuded to spread "other stuff" instead.  OTOH I do try to defend the
innocents be they from AOL or elsewhere from the repercussions of the
spamming scum that (among other things) started the whole sixdegres
episode.

> About a week ago somebody posted a copy or parts of most AOL
> postings which were sent here in the last months. Merrill ignores the part
> about how the posts were classified

I read his classification criteria closely, and read the results of the
classification process.
> and sends back some vague flame accusing
> the author of classing posts he disagreed with as "clueless" then he quotes
> the entire thing back to the list.
> 
Then commented that he had not followed his own criteria.  

> I don't know which is worse. At least the people flaming the AOL wimps are
> funny.

If funny is all you want, may I recommend rec.humor.funny and, in case
you are up on no current events but Clinton, rec.humor.funny.reruns.

And to the brilliant person seeking muff diving pics, gee send a real
address and we'll see what we can do.  (At least he didn't want it for
pre-muff variety.)

PHM





From bill.stewart at pobox.com  Sat Sep 26 08:56:49 1998
From: bill.stewart at pobox.com (Bill Stewart)
Date: Sat, 26 Sep 1998 23:56:49 +0800
Subject: [salman rushdie]
In-Reply-To: <19980925192238.27047.qmail@www0n.netaddress.usa.net>
Message-ID: <3.0.5.32.19980926215457.00ad1510@idiom.com>



At 08:22 PM 9/25/98 BST, NMIR wrote:
>Does anyone have any idea what this guy is on about?.
If you mean "Why does Bill P rant like that", not my problem.

But if you mean "Is the Fatwa against Salman Rushdie over?",
the news has been that the Iranian government has decided
to drop their ~$2M reward for killing him.  That doesn't mean
all of the mullahs have stopped calling for Muslims to
kill him for blasphemy.  But at least the government has
decided good relationships with the Brits are more important
than keeping their more fanatical fanatics happy.
Rushdie was quoted in the press as being very relieved.

If there's cypherpunks relevance to this, it's that cryptographic
privacy and digital cash payments make it easier to publish
controversial material without the threat of violence against you.

		Bill Stewart


>---
>ABQ J 9/24/98 
>Iran May Withdraw
>Writer's Death Threat
>
>LONDON - Author Salman
>Rushdie met with British Foreign
>Office officials Wednesday amid
>reports Iran is preparing to
>withdraw the threat on his life.
>The late Ayatollah Ruhollah
>Khomeini pronounced a "fatwa," death sentence, 
>against Rushdie in
>1989 after the publication of his
>book "Satanic Verses," which many
>Muslims deemed blasphemous.
>Islamic militants then put a $2
>million bounty on Rushdie's head,
>forcing the author to live largely in
>under British police protection.
>---
>
>I THINK that I heard tonight and saw 
>Rushie's picture on TV that the above
>was called off.





From nobody at remailer.ch  Sat Sep 26 09:14:46 1998
From: nobody at remailer.ch (Anonymous)
Date: Sun, 27 Sep 1998 00:14:46 +0800
Subject: Clinton's fake apologies (fwd)
Message-ID: <19980927052400.21818.qmail@hades.rpini.com>



At 23 Sep 1998 04:27:46 Reeza! wrote:
> Well, it seems I have an admirer. A follower, anyway. Quoting things I said
> from two separate posts.

I read all the posts to cypherpunks. Some several times to try to
understand what some blowhard is trying to say.

[Re; Clinton]
> I believe the other issues are relevant. ... clear evidence of malfeasance
> in many, and every area should not be ignored ...

My argument was:
1. You can't seriously be this fired up over perjury (post OJ), can you?
2. there have been several topics discussed on cypherpunks that were more odious.
3. Charge him with his big crimes. Don't "Al Capone" him.

Your belief that Starr is leading up to the real issues is compatible with my
(now belaboured) point. I still don't understand what you're trying to add.

> I'm not building up the bogey man, I'm discussing what I see. What I see,
> on every major and minor newstation, is a disgrace. A documented, public
> record disgrace.

Well, this *is* a pathetic reason. You want Clinton impeached because the
media tells you so.

At 23 Sep 1998 04:31:48 Reeza! wrote:
> > -- an anonymous aol32 user.
>
> You must be proud of that sig.

It's a shit magnet. Works, too!

> I'll bet you weren't on the list when the list of deceased CIC bodyguards,
> friends and associates was posted either.
> 
> flush out your head, you aol user. there is more going on here than just
> 'fibbing'.

Fine. charge him with the other things!

As far as the "newby" flame, I've seen that corpse lists here twice recently.
Maybe you've dated yourself? I remember a time without Reeza! posts... 

And there's a sig flame in there, trying to get out. A new low for you, Reeza?

> 
> Reeza!

-- an anonymous aol32 user.





From nobody at replay.com  Sat Sep 26 09:41:52 1998
From: nobody at replay.com (Anonymous)
Date: Sun, 27 Sep 1998 00:41:52 +0800
Subject: 
Message-ID: <199809270531.HAA09168@replay.com>



Paul H. Merrill wrote:

> <>

Yeah, if you quote back over a hundred lines after adding 6, 8, or
whatever it happened to be.

> > About a week ago somebody posted a copy or parts of most AOL
> > postings which were sent here in the last months. Merrill ignores the part
> > about how the posts were classified
>
> I read his classification criteria closely, and read the results of the
> classification process.
> > and sends back some vague flame accusing
> > the author of classing posts he disagreed with as "clueless" then he quotes
> > the entire thing back to the list.
> >
> Then commented that he had not followed his own criteria.

And where did he not? A few could be debated. The rest were either written
so badly that they were incomprehensible, were off-topic, or didn't
include quoted material in a reply/followup. He also stated that he was
counting postings which used that '<< >>' scheme as automatically bad,
which is understandable. Either way, he seemed to be trying to show the
statistics. Pull one or two postings off of one side and put them on the
other and the statistics are still pretty bad for AOL.

> > I don't know which is worse. At least the people flaming the AOL wimps are
> > funny.
>
> If funny is all you want, may I recommend rec.humor.funny and, in case
> you are up on no current events but Clinton, rec.humor.funny.reruns.

No, I want a Cypherpunks list which discusses political issues,
cryptography, and things related to that. Since this is the Cypherpunks
list, we aren't going to censor on the basis of content or origin point.

If all you want to do is defend AOL and their ilk, may I recommend
comp.os.ms-windows.advocacy and alt.aol-sucks.

> And to the brilliant person seeking muff diving pics, gee send a real
> address and we'll see what we can do.  (At least he didn't want it for
> pre-muff variety.)

Muff diving pics? Do we want to know? Serious questions.





From alan at clueserver.org  Sat Sep 26 10:17:05 1998
From: alan at clueserver.org (Alan Olsen)
Date: Sun, 27 Sep 1998 01:17:05 +0800
Subject: faggots
In-Reply-To: 
Message-ID: <3.0.5.32.19980926231001.03ae8a90@clueserver.org>



At 03:48 PM 9/26/98 EDT, CSapronett at aol.com wrote:
>
>My only regret is that I wont get to watch you all burn in hell !!!

"The good Christian should beware of mathematicians and all those who 
make empty prophecies. The danger already exists that mathematicians 
have made a covenant with the devil to darken the spirit and confine 
man in the bonds of Hell." 
St. Augustine
---
|      Bill Clinton - Bringing back the Sixties one Nixon at a time!     |
|"The moral PGP Diffie taught Zimmermann unites all| Disclaimer:         |
| mankind free in one-key-steganography-privacy!"  | Ignore the man      |
|                                                  | behind the keyboard.|
|         http://www.ctrl-alt-del.com/~alan/       |alan at ctrl-alt-del.com|





From stuffed at stuffed.net  Sun Sep 27 01:54:04 1998
From: stuffed at stuffed.net (STUFFED NEWS DAILY)
Date: Sun, 27 Sep 1998 01:54:04 -0700 (PDT)
Subject: TODAY'S NEWS AND PICS PACKED STUFFED! - READ IT NOW!
Message-ID: <19980927071000.5189.qmail@eureka.abc-web.com>


+ 30 FREE HOT JPEG PHOTOS
+ 5 SUPER SEXY STORIES
+ OH MY GOD, YOU'RE MARRIED
+ TROY BEYER TALKS ABOUT SEX
+ THE BOTTOM LINE IN SURFING FOR SEX
+ THE BEST OF EUREKA
+ SEX COURT
+ MENO-PLAY
+ MAROONED IN THE BIG EASY
+ SEX STILL SELLS

       ---->   http://stuffed.net/98/9/27/   <----

Welcome to  today's  issue of Stuffed. To read it you should
click on the URL above.  If it is not made clickable by your
email program  you will need to  use your mouse to highlight
the URL,  copy it and then paste it into your browser  (then
press Return).

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!

       ---->   http://stuffed.net/98/9/27/   <----





From oppykm at usa.net  Sun Sep 27 04:04:03 1998
From: oppykm at usa.net (oppykm at usa.net)
Date: Sun, 27 Sep 1998 04:04:03 -0700 (PDT)
Subject: This stock up 250%
Message-ID: <199809271103.FAA07168@Rt66.com>



Omicron Technologies, Inc. 


The stock is up 250% in less than 45 days. 


 

During this same time period the DOW has gone down over 1,700 points!


This obscure, but soon to be famous company can make you a fortune
with patented technology originally developed for NASA


Don't Miss This One


For more information: http://www.network-2001.com/orcron


The stock symbol is: OGPS


_______________________

 

 






From nobody at anon.olymp.org  Sat Sep 26 13:22:06 1998
From: nobody at anon.olymp.org (Anonymous)
Date: Sun, 27 Sep 1998 04:22:06 +0800
Subject: Why do we need remailers, anyway?
Message-ID: <20463d5af58cdf2759d132cedbdcfa02@anonymous>




At 23 Sep 1998 04:27:46 Reeza! wrote:
> anonymouse, 32 bit aohell to boot. you must feel very safe. Yours is hardly
> the type of post that might necessitate the use of a remailer, so it should
> be safe to assume you haven't the courage to stand behind your words, even
> as mild as they are.
> 
> Fuck you too. I suggest you discuss your lack of a spine with the maker.
> See the above for instructions to meet the maker.
> 
> Reeza!

Hello? This is an old topic, but what the heck...

There is a concept cypherpunks have called "Blacknet", which is an
organisation that sells profiles of prospective employees based on
their public comments on the Internet.

This allows employers to filter out undesirables who might or might
not have outgrown their rebellious youth. (You can never be too safe!) 

Now, there are laws making discrimination illegal. But it's hard to *prove*
that an employer based its decision on BlackNet files, isn't it....

The cypherpunk philosophy is to rely on technology to solve the problem, rather
than rely on the government (or anyone else). Cypherpunks write code.

-- an anonymous aol32 user.





From howree at cable.navy.mil  Sat Sep 26 13:36:41 1998
From: howree at cable.navy.mil (Reeza!)
Date: Sun, 27 Sep 1998 04:36:41 +0800
Subject: Clinton's fake apologies (fwd)
In-Reply-To: <19980927052400.21818.qmail@hades.rpini.com>
Message-ID: <3.0.5.32.19980927194009.0083aca0@205.83.192.13>



At 05:24 AM 9/27/98 -0000, Anonymous wrote:
>
>Well, this *is* a pathetic reason. You want Clinton impeached because the
>media tells you so.

Have you ever been in the military, Anonymouse? I've noticed that military,
and those with past military service or experience tend to identify with
different aspects of an issue than those without any sort of military
experience. As a serviceman myself, I am compelled to say that to me, you
sound like a 60s era war protester, or perhaps something far worse.
Objecting for reasons of princible, seemingly to spite the real world
considerations, and ignoring the reasons of princible that are in
contradiction to your own viewpoint. The real world is not a princibled
place, but some people do get bonus points for maintaining appearances.
Clinton just suffered an "Aw Shit!", he's lost his turn to play, he needs
to get his shit together and get out of the game. I trust you've also seen
the quote attributed to Clinton, on Nixon? Nixon must be turning over in
his grave, even if it isn't Clintons Quote.

I do not consider 'the presidency' to be a 'man'. I see it as an
institution, a figurehead, a place of honor. The President is a man who,
for four years, (or eight) places his own life in standby, for the greater
good of the nation. What good was served by all the affairs Clinton may
have and did have? What good was served by the apparent use of positional
authority to suppress evidence? What good would be served by allowing a
person with the quality set Clinton has demonstrated to remain in THAT Office?
It, more than many other things in american society, function on
'appearances'. That appearance is now tarnished. The sitting president has
lowered himself, and that office, irreparably. He, we and it are laughing
stocks around the world right now. Did you know that the sitting president
in the philippines used Clintons sex scandals in his own election campaign?
Something to do with Clinton getting all the sex scandals, him getting all
the sex. That was long BEFORE Clinton admitted to misrepresenting events. I
shudder to think how this will affect international negotiations, and
Status Of Forces Agreements around the world. Think the Chinese won't look
to use it in the ongoing human rights negotiations?

Yeah, I'm young enough to still feel patriotic, but old enough that I make
my own definition of that term, instead of blindly accepting someone elses.

I don't think a change is in order because I heard some horses ass for an
alphabet news agency say so, I think a change is in order because I
personally can't stand hypocrites, among other things. Especially
hypocrites who commit felonies, say "sorry" and I am expected to forgive,
and stand idly by while he gets away with it. As I've said before, I
personally could care less if he has an affair. But he had one with a
subordinate in his direct employ, then lied about it, repeatedly, even
while under oath in a court of law. He tried to use his positional
authority to suppress evidence, to intimidate, to get the case(s) dismissed. 
Yeah, I'm REAL PROUD(tm) of my Commander In Chief, he and
CSapronett at aol.com will both have a lot to talk about. Or was that you?

Perhaps you are one of the Klintonistas, with your "what is the big deal"
attitude, deliberately obfuscating the issue, sidelining the real topics
with irrelevant byline chatter. 

If that was me, I'd be doing jail time. If this is allowed to stand, it
will represent the opening salvo, and mark the beginning of the End of
America as a Great Nation(tm).

>As far as the "newby" flame, I've seen that corpse lists here twice recently.
>Maybe you've dated yourself? I remember a time without Reeza! posts... 

Yeah, I can imagine a time when crypto and anonymous accounts don't exist
anymore either. That doesn't mean that it would be a Good Thing(tm). You,
I, anyone is free to browse the archives, then represent self as an
'old-timer' on this list. From an anonymous account, who can challenge?

So what. you don't even have the courage to put your name, or an e-mail
account that can be replied to, when you send your "I'm better than you,
'cuz I've been on the list longer' drivel. Perhaps you have, but it doesn't
change anything.

I am still outspoken,
you are still loath to reveal your identity, even when discussing something
as innocuous as this. Spineless is the term normally used.
And Clinton is still an adulterous purjurer who needs conviction.

If you can't handle that, I suggest you discuss it with your family
physician. I'm sure a wee bit of prozac will help you deal with lifes
disappointments, you must be feeling especially lowly right now,,,, if you
are not, you should.

Reeza!



"...The world was on fire, but no one could save me but you...
	Strange what desire will make foolish people do...
		(and the background vocalists sang)
			This world is only gonna break your heart...."

					==C.I.==





From paulmerrill at acm.org  Sat Sep 26 14:03:48 1998
From: paulmerrill at acm.org (Paul H. Merrill)
Date: Sun, 27 Sep 1998 05:03:48 +0800
Subject: 
In-Reply-To: <199809270531.HAA09168@replay.com>
Message-ID: <360E36C5.33C7DFDC@acm.org>



Anonymous wrote:
> 
> Paul H. Merrill wrote:
> 
> > <>
> 
> Yeah, if you quote back over a hundred lines after adding 6, 8, or
> whatever it happened to be.
> 
Comment on this comes later.

> > > About a week ago somebody posted a copy or parts of most AOL
> > > postings which were sent here in the last months. Merrill ignores the part
> > > about how the posts were classified
> >
> > I read his classification criteria closely, and read the results of the
> > classification process.
> > > and sends back some vague flame accusing
> > > the author of classing posts he disagreed with as "clueless" then he quotes
> > > the entire thing back to the list.
> > >
> > Then commented that he had not followed his own criteria.
> 
> And where did he not? A few could be debated. The rest were either written
> so badly that they were incomprehensible, were off-topic, or didn't
> include quoted material in a reply/followup. He also stated that he was
> counting postings which used that '<< >>' scheme as automatically bad,
> which is understandable. Either way, he seemed to be trying to show the
> statistics. Pull one or two postings off of one side and put them on the
> other and the statistics are still pretty bad for AOL.
>
1.  There are lies, damn lies, and statistics. 
2.  So if the quoted material is included it's bad and if it is not
included it's bad. I think I see the general idea.  Use the rules
appropriate for complaining about whoever you want to complain about.
3.  And what I said was along the lines of most were justified, but some
showed his lack of clues.  Merely being incomprehensible to a person
means little if the person is a little clue-shy.  Badly written is a bad
thing.

> > > I don't know which is worse. At least the people flaming the AOL wimps are
> > > funny.
> >
> > If funny is all you want, may I recommend rec.humor.funny and, in case
> > you are up on no current events but Clinton, rec.humor.funny.reruns.
> 
> No, I want a Cypherpunks list which discusses political issues,
> cryptography, and things related to that. Since this is the Cypherpunks
> list, we aren't going to censor on the basis of content or origin point.
>
And the general degradation of our society to the level that taking the
moral ground is something to be ridiculed is not a political issue?
 
> If all you want to do is defend AOL and their ilk, may I recommend
> comp.os.ms-windows.advocacy and alt.aol-sucks.
> 
I'll pass, thanks anyway.

> > And to the brilliant person seeking muff diving pics, gee send a real
> > address and we'll see what we can do.  (At least he didn't want it for
> > pre-muff variety.)
> 
> Muff diving pics? Do we want to know? Serious questions.

That comment was in reference to two private (and anonymous)posts
purporting to be AOL weenies seeking such things.





From jim at acm.org  Sat Sep 26 19:08:34 1998
From: jim at acm.org (Jim Gillogly)
Date: Sun, 27 Sep 1998 10:08:34 +0800
Subject: Boxer and Fong on encryption
Message-ID: <360E557D.E8C49F00@acm.org>



For California types: Barbara Boxer and Matt Fong responding to questions
in today's SJMC news:

  HI-TECH ISSUES

  1. Did the administration's July 7 decision to let software
  companies export encryption software to financial institutions in
  certain counties go far enough toward relaxing the rules on
  encryption exports? Why/why not?

  BOXER: I am a cosponsor of Senator Burns' Pro-CODE legislation,
  which prohibits the Secretary of Commerce from putting any restrictions
  on the export of encrypted items -- regardless of bit or key length. The
  administration's proposal did not go far enough at all.

  FONG: The administration's new policy simply does not go far enough.
  The administration is rightfully worried about national security, but the
  Genie is out of the bottle. While Clinton has stuck to his restrictive
export
  policy on encryption software, foreign encryption products have become
  more sophisticated and more price competitive. US companies should be
  allowed to export encryption software if similar products are already
  available by foreign competitors.

We'd see more contrast with Feinstein's answer.  Too bad  not
running in this race.

-- 
	Jim Gillogly
	Mersday, 6 Winterfilth S.R. 1998, 15:05
	12.19.5.9.19, 3 Cauac 12 Chen, First Lord of Night





From edsmith at IntNet.net  Sun Sep 27 10:24:52 1998
From: edsmith at IntNet.net (Edwin E. Smith)
Date: Sun, 27 Sep 1998 10:24:52 -0700 (PDT)
Subject: Body Count
Message-ID: <3.0.2.32.19980927132357.00811e40@mailhost.IntNet.net>


 THURSDAY SEPTEMBER 24, 1998

------------------------------------------
[WorldNetDaily Exclusive]
------------------------------------------

The Clinton 'body count'
New alarm over growing list of dead close to president

By Michael Rivero
Copyright 1998, WorldNetDaily.com

"Dear Sir," began Monica Lewinsky's somewhat peevish letter of July 3rd,
1997.  In it, according to the recently released report by Kenneth Starr,
the former intern chided the president for failing to secure for her a
new White House job, and hinted that continued stalling would result in
word of their affair leaking out.

The next day, Monica confronted Bill Clinton in an Oval Office meeting
she described as "very emotional;" a meeting which ended when the
president warned her, "It's illegal to threaten the president of the
United States."

Three days later, another former White House intern, Mary Mahoney, was
shot five times in the back of the Georgetown Starbuck's she managed. 
Two of her co-workers were also killed.  Even though cash remained in the
register, the triple murder was quickly dismissed as a botched robbery.
No suspects have ever been arrested.

Coincidence?  Maybe.

Former Democratic National Committee fundraiser and Commerce Secretary
Ron Brown was under criminal investigation.  Indictments seemed imminent.
 Ron Brown had reportedly told a confidante that he would, "not go down
alone."  Days later, his plane crashed on approach to Dubrovnik airport
during a trade mission excursion to Croatia.  Military forensics
investigators were alarmed by what appeared to be a .45-caliber bullet
hole in the top of Brown's head.

Coincidence?  Maybe.

Yet another fundraiser was Larry Lawrence, famed for his short residence
at Arlington National Cemetery.  Less well known is that he had been
under criminal investigation by the State Department for three weeks when
he died.

Coincidence?  Maybe.

But for a growing number of Americans, the sheer numbers of strange
deaths surrounding the career of Bill Clinton has begun to raise serious
questions.  In a meeting with Vernon Jordan, Monica Lewinsky reportedly
expressed fears that she might, "end up like Mary Mahoney," and began to
make sure that others knew of her affair with Bill Clinton.

Of all the strange deaths surrounding the Clintons, none has come under
more renewed scrutiny than the fate of White House Deputy Counsel Vincent
Foster, who was found dead in Fort Marcy Park on July 20, 1993.  The
official investigation concluded that Foster inserted a gun into his
mouth and pulled the trigger.  Yet according to the lab results neither
Foster's fingerprints nor blood was on the gun, nor were powder granules
or bullet fragments traceable to that gun in his wounds.  The purported
"suicide note" was found to be a forgery by three independent experts. 
The record of a second wound on Foster's neck, and an FBI memo that
contradicts the official autopsy, strongly suggests that Foster's wounds
were misrepresented in the official report.  The FBI's own records
revealed that deliberate deception was used to link Foster with the gun
found with his body.  Partly on the basis of that evidence, the FBI is
now in federal court on charges of witness harassment and evidence
tampering in the case.

In normal police procedure, homicide is assumed right from the start. 
Suicide must be proven, because homicides are often concealed behind
phony suicides.  Yet in the case of Foster, serious doubts persist
regarding the credibility of the evidence offered up in support of the
claim of suicide, and a recent Zogby Poll revealed that more than
two-thirds of all Americans no longer think the official conclusion of
suicide is believable.

The official conclusion regarding Commerce Secretary Ron Brown's death
was that his plane was brought down by, "the worst storm in a decade." 
However, the Dubrovnik airport weather office, just two miles from the
crash site, could not confirm the existence of any such storm, nor did
any other pilots in the area.  According to the April 8, 1996, Aviation
Week & Space Technology, three separate radio links to the aircraft all
quit while the aircraft was still seven miles from the crash, evidence
that the plane suffered a total electrical failure in flight which was
never investigated.  The perfectly cylindrical hole in Ron Brown's skull
never triggered an autopsy.  After Ron Brown's death, his co-worker,
Barbara Wise, was found locked in her office at the Department of
Commerce, dead, bruised, and partially nude.  Following Brown's death,
John Huang's new boss at Commerce was Charles Meissner, who shortly
thereafter died in yet another plane crash.

These and other questionable deaths have been collected together in a
document known as the "Dead Bodies List," which can now be found in many
locations on the World Wide Web.  Some of the cases are poorly documented
and have been dismissed until now as "conspiracy theory."  However,
analysis of the "Dead Bodies List" by experts on the Internet revealed
that in many cases, deaths whose circumstances demanded an investigation
had been ignored.

Some events officially declared to be accidents seem to stretch the
bounds of credulity.  In one case, Stanley Heard, member of a Clinton
advisory committee and chiropractor to Clinton family members, and his
lawyer Steve Dickson were flying to a meeting with a reporter.  Heard's
private plane caught fire, but he was able to make it back to his airport
and rent another plane to continue his journey.  The rented plane then
caught fire.  This time, Heard did not make it back to the airport. 
Gandy Baugh, attorney for Clinton friend and convicted cocaine
distributor Dan Lasater, fell out of a building.  Baugh's law partner was
dead just one month later.  Jon Parnell Walker, an RTC investigator
looking into Whitewater, interrupted his inspection of his new apartment
to throw himself off of the balcony.

Nor does the pattern of suspicious deaths discriminate by gender.  Susan
Coleman was reportedly a mistress to Clinton while he was Arkansas
attorney general; she was seven months pregnant with what she claimed was
Clinton's child when she died.  Judy Gibbs, a former Penthouse Pet and
call girl, reportedly counted Bill Clinton among her clients.  Shortly
after agreeing to help police in an investigation into Arkansas cocaine
trafficking, Judy burned to death.  Kathy Ferguson, a witness in the
Paula Jones case, was killed with a gunshot behind the ear and was
declared a suicide, even though her suitcases had all been packed for an
immediate trip.  One month later, Bill Shelton, Kathy's boyfriend and a
police officer who had vowed to get to the bottom of Kathy's murder, was
also dead of a gunshot, his body dumped on Kathy's grave.

Another alarming trend observed in these deaths is how society's
safeguards against murder appear to have been compromised.  Many of the
questionable deaths involved either negligence or the complicity of
medical examiners.

Dr. Fahmy Malek was the Arkansas medical examiner under then-Gov. Bill
Clinton.  His most famous case involved his ruling in the "Train Deaths"
case of Don Henry and Kevin Ives in which Dr. Malek ruled that the two
boys had fallen asleep on the railroad tracks and been run over by a
train.  A subsequent autopsy by another examiner found signs of foul play
on both the boys' bodies and concluded that they had been murdered. 
According to Jean Duffey, the prosecutor in the Saline County Drug Task
Force, the two boys accidentally stumbled onto a "protected" drug drop
and were killed for it.  Dan Harmon, the Arkansas investigator who
concluded there was no murder, is now in prison on drug charges.  Despite
the evidence for murder and national exposure, the Henry/Ives case has
never officially been re-opened, and Jean Duffy has since left Arkansas
out of fear for her life.  Several witnesses in the Henry/Ives case later
died and were ruled as either suicides or natural causes by Dr. Malek,
whose willingness to provide an innocuous explanation for these deaths is
illustrated in one case where he claimed that a headless victim had died
of natural causes.  Malek claimed that the victim's small dog had eaten
the head, which was later recovered from a trash bin.  When pressed to
fire Dr. Malek, Gov. Clinton excused the medical examiner's performance
as the result of overwork and gave him a raise.

Dr. Malek's Washington D.C. counterpart was Fairfax, Virginia, Medical
Examiner James C. Beyer.  Long before his autopsy on Vincent Foster,
Beyer's work was disputed.  In the case of Tim Easely, Beyer ignored
obvious defensive wounds, and eyewitness reports of an argument between
Easely and his girlfriend, to conclude that Easely had committed suicide
by stabbing himself in the chest.  When an outside expert called
attention to the fact that Easely had been stabbed clear through one of
his palms, the girlfriend confessed to the murder.  In the case of Tommy
Burkett, Beyer ignored signs of violence done to Burkett to rule it was a
simple suicide.  A subsequent autopsy showed that Beyer had not even done
the work he claimed in his original autopsy.  Even though Beyer showed
X-rays to Burkett's father, Beyer later claimed they did not exist.  When
Beyer performed the Foster autopsy, he wrote in his report that X-rays
had been taken, then again claimed they never existed when asked to
produce them.

In some cases, the deaths simply have no innocuous explanation.  One
witness, Jeff Rhodes (who had information on the Henry/Ives murders) was
found with his hands and feet partly sawn off, shot in the head, then
burned and thrown in a trash bin.  Another obvious murder was Jerry
Parks, Clinton's head of security in Little Rock.  Immediately following
news of Foster's death, Parks reportedly told his family, "Bill Clinton
is cleaning house."  Just weeks after the Parks' home had been broken
into and his files on Clinton stolen, Parks was shot four times in his
car.

Ron Miller, on whose evidence Nora and Gene Lum were convicted of
laundering Clinton campaign donations, went from perfect heath to death
in just one week in a manner so strange that his doctors ordered special
postmortem tests.  The results of those tests have never been released,
but toxicologists familiar with the case suggest that Miller's symptoms
are consistent with Ricin, a cold war assassin's poison.

For a fortunate few the murder attempts have failed.  In the case of
Arkansas drug investigator Russell Welch, his doctors were able to
identify that he had been infected with military anthrax in time to save
his life.  Gary Johnson, Gennifer Flowers' neighbor whose video
surveillance camera had accidentally caught Bill Clinton entering
Flowers' apartment, was left for dead by the men who took the video tape.
 Gary survived, although he is crippled for life.  L.J. Davis, a reporter
looking into the Clinton scandals, was attacked in his hotel room but
survived (his notes on Clinton were stolen).  Dennis Patrick, whose bond
trading account at Dan Lasater's company was used to launder millions of
dollars of drug money, has had four attempts on his life.

But the real importance of the "Dead Bodies List" isn't what it tells us
of modern political intrigues, but what it tells us of ourselves, in how
we respond to it.  The list has been around for quite some time, largely
ignored by the general public, completely ignored by the mainstream
media.  The common reaction has been that such a list is unbelievable,
not for its contents, but for its implications.  For that reason, most
Americans have, until recently, accepted at face value the official
assurances that all these deaths are isolated incidents with no real
meaning; that all the indications of foul play and cover-up are just an
accumulation of clerical error and "overwork;" that it's all just
"coincidence."

On Aug. 17, as Bill Clinton admitted his "inappropriate relationship"
with Monica Lewinsky on nationwide television, Americans began to
confront the unavoidable fact that this president and his administration
had lied to the public about a rather trivial matter.  Americans came to
realize that this president and his administration could no longer safely
be assumed to have told the truth on more serious matters.

In this new climate of doubt, the "Dead Bodies List" has enjoyed a new
vogue, albeit a dark one.  Talk radio discusses it.  Total strangers
e-mail it to each other.  What was unthinkable a few months ago has
become all too plausible.  Political murder has come to America.  Those
cases on the "Dead Bodies List" where hard evidence directly contradicts
the official conclusion have come under renewed scrutiny.

It takes courage for the average citizen to accept that the government
has lied to them, for by doing so, the citizen also accepts the
obligation to do something about it.  Americans know beyond a doubt that
they have been lied to.  Americans are discovering that they cannot
ignore the fact of being lied to without sacrificing that part of the
American self-image that holds honor and justice as ideals.  But as the
above poll would suggest, such a sacrifice is no longer acceptable.

---------------------------------------------------------
[WorldNetDaily.com]
---------------------------------------------------------
(C) 1998 Western Journalism Center
---------------------------------------------------------
This page was last built 9/24/98; 11:51:28
Site: matlanta at mindspring.com

REFERENCES:

A List of Strange Deaths of Individuals Who All Had Verifiable Ties with
Bill Clinton
http://www.devvy.com/death_list.html

VINCE FOSTER FIVE YEARS AFTER
Unsolved Mystery Hampers All Starr's Probes By Carl Limbacher
http://www.esotericworldnews.com/vince.htm

VINCE FOSTER INVESTIGATIONCHRIS RUDDY, (PITTSBURGH TRIBUNE)
http://www.ruddynews.com

Christopher Ruddy's New Web Site 
http://www.newsmax.com/insidecover.shtml

Vince Foster - Patrick Knowlton v. FBI Agent Bransford
http://www.monumental.com/lawofcjc/pk/

*** Foster "J'Accuse!"
http://www.angelfire.com/fl/pjcomix/zola1.html

EENIE MENA MINIE MOE...
http://www.esotericworldnews.com/eenie.htm

The Mena Coverup
http://www.esotericworldnews.com/mena.htm

THE "SECRET" CHEMICAL FACTORY THAT NO ONE TRIED TO HIDE
http://www.esotericworldnews.com/london.htm
---------------------------






From ravage at EINSTEIN.ssz.com  Sat Sep 26 20:47:16 1998
From: ravage at EINSTEIN.ssz.com (Jim Choate)
Date: Sun, 27 Sep 1998 11:47:16 +0800
Subject: Test [no reply] (should be last one)
Message-ID: <199809271649.LAA04020@einstein.ssz.com>



Test [no reply]


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage at ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------





From sales at galaxyhp.com  Sun Sep 27 12:03:19 1998
From: sales at galaxyhp.com (sales at galaxyhp.com)
Date: Sun, 27 Sep 1998 12:03:19 -0700 (PDT)
Subject: Medical Equipment
Message-ID: <199809271902.MAA21566@toad.com>



==================================================
You're receiving this email because you are an Apple Macintosh
user. If you wish to be excluded from any future mailings please
return this message with "remove" (without quotes) as the subject.
==================================================

GALAXY specializes in the repair and upgrade of Apple
Macintosh, PowerMacintosh and PowerBook computers.

We provide component level repair, with 6 month warranty,
for Motherboards, Power Supplies and Floppy Drives 
for all Macintosh and PowerComputing Systems.  

We sell new and used Macintosh, PowerMacintosh 
and PowerBook computers, and wide range of  parts:

Motherboards, Floppy Drives, RAM, Hard Drives, 
CD-ROM Drives, Zip Drives, Video Cards,  Monitors, 
Printers, Accelerators, G3 Cards, Cache Cards,  
FPU's,  Cables,  Modems,  Power Supplies & Adapters,  
Keyboards,  Mice, Ethernet Cards, Batteries, 
Pentium Cards, Case Parts.  .  and a whole lot more!

Our prices are very competitive, for example:
-    PowerMac 7200/75MHz 8/500/CD - $599  (Ref :90day) 
-    Apple 200MHz PPC604e Card  $199    (New: 2yr)
-    1.44MB auto-insert floppy drive    $65  (Ref: 6mths)
-    Power Computing power supply repair   $115  (Ref: 6mths)
-    Global Village 33.6Kbps fax/modem     $45  (Ref: 90day)
-    24x External CD-ROM Drive  $135   (New: 1yr)
-    Apple 166MHz Pentium PC Card     $349   (New: 1yr)
-    Apple MultiScan 15" AV Display     $339    (New: 1yr)
-    PMac 6100 256K L2 Cache Card     $15    (New: 1yr)

To find out more about GALAXY please visit our web site at:  
                        

Or, if you have a particular, or immediate interest please
send your email request to 

We accept Mastercard, Visa, American Express, edu. .& gov't
PO's, and welcome international orders.

GALAXY Hardware - 5075 Nectar Way - Eugene OR 97405

541-345-1817  (voice)     541-345-3094  (fax)
+++++++++++


 
 
 
 
 
 
 
 
 
 
 





From nobody at remailer.ch  Sat Sep 26 21:23:04 1998
From: nobody at remailer.ch (Anonymous)
Date: Sun, 27 Sep 1998 12:23:04 +0800
Subject: 
Message-ID: <19980927173408.26863.qmail@hades.rpini.com>



Paul is coming from AOL using Netscape as a mailer and using the 
open relay at cesvxa.ces.edu.

Received: (from majordom at localhost) by toad.com (8.7.5/8.7.3) id CAA16186 for cypherpunks-unedited-outgoing; Sun, 27 Sep 1998 02:59:59 -0700 (PDT)
Received: from cesvxa (cesvxa.ces.edu [144.50.1.2]) by toad.com (8.7.5/8.7.3) with ESMTP id CAA16181 for ; Sun, 27 Sep 1998 02:59:56
-0700 (PDT)
Received: from 200-148-112.ipt.aol.com (200-148-112.ipt.aol.com)
 by cesvxa.ces.edu (PMDF V5.0-6 #6874) id <01J2AH6J8P400003T4 at cesvxa.ces.edu>
 for cypherpunks at toad.com; Sun, 27 Sep 1998 06:01:57 -0500 (EST)
Date: Sun, 27 Sep 1998 05:59:49 -0700
From: "Paul H. Merrill" 
Subject: Re:
To: cypherpunks at toad.com
Message-id: <360E36C5.33C7DFDC at acm.org>
Organization: Twenty First Century Camelot
MIME-version: 1.0
X-Mailer: Mozilla 4.06 [en] (Win16; U)
Content-type: text/plain; charset=us-ascii
Content-transfer-encoding: 7bit
References: <199809270531.HAA09168 at replay.com>
Sender: owner-cypherpunks at Algebra.COM
Precedence: bulk
X-Mailing-List: cypherpunks at algebra.com
X-List-Admin: ichudov at algebra.com
X-Loop: cypherpunks at algebra.com
Content-Transfer-Encoding: 7bit










From rah at shipwright.com  Sat Sep 26 21:25:58 1998
From: rah at shipwright.com (Robert Hettinga)
Date: Sun, 27 Sep 1998 12:25:58 +0800
Subject: IP: US Says Bomb Suspect Had Nuclear Ambitions
Message-ID: 




--- begin forwarded text


Delivered-To: ignition-point at majordomo.pobox.com
X-Sender: believer at telepath.com
Date: Sun, 27 Sep 1998 11:03:36 -0500
To: believer at telepath.com
From: believer at telepath.com
Subject: IP: US Says Bomb Suspect Had Nuclear Ambitions
Mime-Version: 1.0
Sender: owner-ignition-point at majordomo.pobox.com
Precedence: list
Reply-To: believer at telepath.com

Source:  Chicago Tribune
http://chicagotribune.com/news/nationworld/article/0,1051,SAV-9809270407,00.
html

U.S. SAYS BOMB SUSPECT HAD NUCLEAR AMBITIONS

 From Tribune News Services
 September 27, 1998

 AFRICA -- American authorities have
 charged that a person described as a senior
 deputy to Osama bin Laden, the Saudi exile
 suspected in last month's bombings of two
 U.S. Embassies in East Africa, made
 significant efforts on behalf of the bin Laden
 group in 1993 to develop nuclear weapons.

 The authorities said that, in at least one
 case, there was evidence of documents
 relating to a proposed purchase of enriched
 uranium, but they did not say whether the
 group obtained uranium.

 The allegations, concerning Mamdouh
 Mahmud Salim, also assert that bin Laden
 had an official agreement with the Iranian
 government and with Sudan's ruling party to
 oppose the United States.

 They also suggest that the U.S. had
 penetrated the bin Laden organization and
 learned detailed information in 1996.

 The allegations were contained in newly
 unsealed court papers that charged Salim
 with conspiracy to murder and to use
 weapons of mass destruction against
 Americans overseas, including those in
 Saudi Arabia, Yemen and Somalia.

 Salim was arrested in Germany a week ago
 after flying there from Sudan. The U.S. said
 Friday it will seek his extradition to face
 charges in New York City.

 The government also asserted for the first
 time in court papers that the Iranian
 government had entered into a formal
 three-way "working agreement" with bin
 Laden and the National Islamic Front of the
 Sudan to "work together against the United
 States, Israel and the West." The front is the
 ruling party in Sudan.

 The Aug. 7 bombings of the U.S.
 Embassies in Kenya and Tanzania killed
 more than 250 people.
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo at majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email at address
**********************************************
www.telepath.com/believer
**********************************************

--- end forwarded text


-----------------
Robert A. Hettinga 
Philodox Financial Technology Evangelism 
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'





From nobody at lo14.wroc.pl  Sat Sep 26 21:59:19 1998
From: nobody at lo14.wroc.pl (Anonymous lo14)
Date: Sun, 27 Sep 1998 12:59:19 +0800
Subject: 
Message-ID: 



Paul H. Merrill wrote:

>1.  There are lies, damn lies, and statistics.

Nice cliche. Unfortunately, it doesn't say anything at all.

>2.  So if the quoted material is included it's bad and if it is not
>included it's bad. I think I see the general idea.  Use the rules
>appropriate for complaining about whoever you want to complain about.

You got it half right. If quoted material is included, it's good. If no
quoted material is included, it's bad. If quoted material is included but it
uses the '<< >>' style, it's bad. If a few hundred lines are quoted and six
added, it's bad. This was explained to you twice; once in the post you're 
responding to, and once in that posting with the AOL quotes. You're 
conveniently ignoring that and you're playing dumb with regard to network
etiquette. Maybe you aren't just pretending.

AOL users originally didn't quote at all, they claimed because of software
constraints. AOL users complained and used the fact that their ISP was lame
as an excuse for not getting another one. Other net users complained. AOL 
responded by using the '<< >>' quoting style, which was effectively giving 
the rest of the net the bird. 

If AOL didn't cater to every moron out there, and if AOL didn't keep running
stupid ads with claims like "AOL is the Internet!", and if AOL wasn't
sending things like requests for Real Player all over the net, and if AOL 
didn't do things to deliberately piss everyone else off, they'd have a much 
better reputation. Maybe the first two can be written off as simple 
marketting, and maybe the third can be written off as the results of that 
marketting, but there is no excuse for the fourth. All four of those are
what gets AOL flamed, kill filed, ignored, insulted, and shunned.

>3.  And what I said was along the lines of most were justified, but some
>showed his lack of clues.  Merely being incomprehensible to a person
>means little if the person is a little clue-shy.  Badly written is a bad
>thing.

There were one or two which may have been questionable. The rest of them
fell into his criteria quite well. That's unless you want to claim that
requests for stickers, CDs, and the rest actually express some subtle
political point other than to say "I'm a moron." I ensure you, if "We're
morons" was the point the AOL posters in question were trying to make, their
message came through quite well. Maybe "you got it?" was actually a secret
code.

>> > > I don't know which is worse. At least the people flaming the AOL wimps are
>> > > funny.
>> >
>> > If funny is all you want, may I recommend rec.humor.funny and, in case
>> > you are up on no current events but Clinton, rec.humor.funny.reruns.
>>
>> No, I want a Cypherpunks list which discusses political issues,
>> cryptography, and things related to that. Since this is the Cypherpunks
>> list, we aren't going to censor on the basis of content or origin point.
>>
>And the general degradation of our society to the level that taking the
>moral ground is something to be ridiculed is not a political issue?

I was refering to the spam from AOL, Sixdegrees, the "child molestor"
spammers, and their like. The responses to that, including your's, are 
political speech like you describe. What you're being ridiculed for is, 
almost without fail, defending every AOL weenie and spam site which comes 
onto this list. 

The child molestor spammers may be able to claim that it isn't their fault
because they're using lame software, but if they use swiss cheese they
shouldn't be surprised when the holes are exploited. I'm not saying it's
very ethical to exploit them, but it isn't surprising.

Paul, with regard to the rest of this, it's obvious that you're either
trolling or are yourself severely clue-shy, and you aren't worth a response 
anymore. Your #2 is proof enough of that. #3 is pretty good evidence too. 





From affiliates at bigstar.com  Sat Sep 26 22:19:03 1998
From: affiliates at bigstar.com (BigStar.com)
Date: Sun, 27 Sep 1998 13:19:03 +0800
Subject: Website owner/administrator
Message-ID: <199809271715.NAA21710@waterfence.bigstar.com>



Join the BigStar Network!

If you don't already have an e-commerce plan, BigStar.com can put you in
the game now!  You're probably already familiar with affiliate programs like
Amazon.com and Barnes and Noble.

BigStar is an online VIDEO superstore offering web sites like yours the
opportunity to become affiliates and earn commissions of 8% (or more) on sales
generated by your site � this is your chance to make online e-commerce work
for you!

This is a completely COST-FREE opportunity.  For more information or to
sign up, go to http://www.bigstar.com/aff/index.ff?banid=1060

Big Movies, Big Selection, Big Deals, Big Fun!

=========================================
BigStar is a responsible Direct Marketer and adheres
strictly to industry-established e-mail guidelines.
To unsubscribe from our list, just reply to this
message with the word "remove" in the subject line
to the above address
=========================================





From paulmerrill at acm.org  Sat Sep 26 22:31:55 1998
From: paulmerrill at acm.org (Paul H. Merrill)
Date: Sun, 27 Sep 1998 13:31:55 +0800
Subject: Where I mail through and from  Was "Re:"
Message-ID: <360EAF59.5BBBB6B7@acm.org>



Another method of discerning that information would have been to
actually read my posts which daid the same damn thing.  BTW, I lobbied
to have the server closed off when I worked for the school, but they
decided that was just a little too paranoid for them.

PHM





From paulmerrill at acm.org  Sat Sep 26 22:36:51 1998
From: paulmerrill at acm.org (Paul H. Merrill)
Date: Sun, 27 Sep 1998 13:36:51 +0800
Subject: 
In-Reply-To: 
Message-ID: <360EAEAA.DC9178BA@acm.org>



Anonymous lo14 wrote:
> 
> Paul H. Merrill wrote:
> 
> >1.  There are lies, damn lies, and statistics.
> 
> Nice cliche. Unfortunately, it doesn't say anything at all.
> 
More formally, numbers and subtext that sound like statistical
terminology but do not follow proper statistical procedures concerning
sampling of the population and non-biased criteria can be formulated to
say whatever one wshed to be said.  The "statistics" in this case are of
that nature.  (That is the techie translation of the quote given above.)

> >2.  So if the quoted material is included it's bad and if it is not
> >included it's bad. I think I see the general idea.  Use the rules
> >appropriate for complaining about whoever you want to complain about.
> 
> You got it half right. If quoted material is included, it's good. If no
> quoted material is included, it's bad. If quoted material is included but it
> uses the '<< >>' style, it's bad. If a few hundred lines are quoted and six
> added, it's bad. This was explained to you twice; once in the post you're
> responding to, and once in that posting with the AOL quotes. You're
> conveniently ignoring that and you're playing dumb with regard to network
> etiquette. Maybe you aren't just pretending.
> 
Precisely what part of the "statistician's" garbage Should Have Been
Included?  It held no structure to be subdivided, nor did it have
immensely valuable protions to be directly commented upon.  In point of
fact, the total quote methodology was used in "protest" of his
classifying non-quotes as clueless.  The appropriate proportion to be
quoted is a matter of taste and understandability.

> AOL users originally didn't quote at all, they claimed because of software
> constraints. AOL users complained and used the fact that their ISP was lame
> as an excuse for not getting another one. Other net users complained. AOL
> responded by using the '<< >>' quoting style, which was effectively giving
> the rest of the net the bird.
> 
In actuallity, AOL EMail allows for either quoting style to be used.

> If AOL didn't cater to every moron out there, and if AOL didn't keep running
> stupid ads with claims like "AOL is the Internet!", and if AOL wasn't
> sending things like requests for Real Player all over the net, and if AOL
> didn't do things to deliberately piss everyone else off, they'd have a much
> better reputation. Maybe the first two can be written off as simple
> marketting, and maybe the third can be written off as the results of that
> marketting, but there is no excuse for the fourth. All four of those are
> what gets AOL flamed, kill filed, ignored, insulted, and shunned.
> 
And I suppose that it would be appropriate for me to take out my feeling
for everyting that anyone running or using an anonymous remailer does on
anyone who uses, runs, or support anonymous remailers?

> >3.  And what I said was along the lines of most were justified, but some
> >showed his lack of clues.  Merely being incomprehensible to a person
> >means little if the person is a little clue-shy.  Badly written is a bad
> >thing.
> 
> There were one or two which may have been questionable. The rest of them
> fell into his criteria quite well. That's unless you want to claim that
> requests for stickers, CDs, and the rest actually express some subtle
> political point other than to say "I'm a moron." I ensure you, if "We're
> morons" was the point the AOL posters in question were trying to make, their
> message came through quite well. Maybe "you got it?" was actually a secret
> code.
> 
I repeat:And what I said was along the lines of most were justified, but
some
         showed his lack of clues.
We both said the same thing, except you said questionable and I said
showed lack of clues.

> >> > > I don't know which is worse. At least the people flaming the AOL wimps are
> >> > > funny.
> >> >
> >> > If funny is all you want, may I recommend rec.humor.funny and, in case
> >> > you are up on no current events but Clinton, rec.humor.funny.reruns.
> >>
> >> No, I want a Cypherpunks list which discusses political issues,
> >> cryptography, and things related to that. Since this is the Cypherpunks
> >> list, we aren't going to censor on the basis of content or origin point.
> >>
> >And the general degradation of our society to the level that taking the
> >moral ground is something to be ridiculed is not a political issue?
> 
> I was refering to the spam from AOL, Sixdegrees, the "child molestor"
> spammers, and their like. The responses to that, including your's, are
> political speech like you describe. What you're being ridiculed for is,
> almost without fail, defending every AOL weenie and spam site which comes
> onto this list.
> 
I have never defended a spam site to my knowledge.  sixdegrees was not
spam.  It was a requested service.  It's just that the requester was not
authorized to make the request.  My commentary amounted to attack the
offending party, not the other offended parties.

> The child molestor spammers may be able to claim that it isn't their fault
> because they're using lame software, but if they use swiss cheese they
> shouldn't be surprised when the holes are exploited. I'm not saying it's
> very ethical to exploit them, but it isn't surprising.
> 
Actually, the baby porn I referred to was purportedly posted by Timothy
C May.

> Paul, with regard to the rest of this, it's obvious that you're either
> trolling or are yourself severely clue-shy, and you aren't worth a response
> anymore. Your #2 is proof enough of that. #3 is pretty good evidence too.

Actually, neither.  I don't like lies and I don't like seeing the wrong
people get battered for wrongdoings.  I do find it mildly amusing that
noone posted anything to the jerk that signed up as Joe Cypherpunk. 
(That one definitely lives under a bridge.)

PHM





From washington at bluewin.ch  Sat Sep 26 22:36:51 1998
From: washington at bluewin.ch (Marky)
Date: Sun, 27 Sep 1998 13:36:51 +0800
Subject: Mailing-List
Message-ID: <360F45F2.5DD1@bluewin.ch>



Please email me information about your mailing-list.





From nobody at replay.com  Sat Sep 26 22:47:32 1998
From: nobody at replay.com (Anonymous)
Date: Sun, 27 Sep 1998 13:47:32 +0800
Subject: Remailers, PGP, and a Project Suggestion
Message-ID: <199809271850.UAA23726@replay.com>



On Sun, 27 Sep 1998, Anonymous wrote:

> At 23 Sep 1998 04:27:46 Reeza! wrote:
> > anonymouse, 32 bit aohell to boot. you must feel very safe. Yours is hardly
> > the type of post that might necessitate the use of a remailer, so it should
> > be safe to assume you haven't the courage to stand behind your words, even
> > as mild as they are.
> >
> > Fuck you too. I suggest you discuss your lack of a spine with the maker.
> > See the above for instructions to meet the maker.
> >
> > Reeza!
>
> Hello? This is an old topic, but what the heck...
>
> There is a concept cypherpunks have called "Blacknet", which is an
> organisation that sells profiles of prospective employees based on
> their public comments on the Internet.
>
> This allows employers to filter out undesirables who might or might
> not have outgrown their rebellious youth. (You can never be too safe!)

Even this is a secondary issue.

Many people are using remailers these days because of the advent of the
WWW. Virtually anything written, retrieved, or transfered on the Internet
is vulnerable to monitoring, logging, and future use against you. Even if
you trust the guy you're sending mail to, you can't necessarily trust his
computer security or the security of the network. Systems like Dejanews
and the web search engines illustrate just how much of a log is out there.
That isn't counting the information available solely from mail headers and
IP addresses.

When somebody wants to perform a "great purge," they just go off to a
search engine or database, type in some parameters, and get a list of
people to shoot, jail, or harass.

The natural solution to this is to disguise your identity whenever
possible. I estimate that we have several dozen people who actively post
to Cypherpunks through remailers judging by the way some things are stated
in the postings. I can't tell for sure, and that's the point.

If you want to generate reputation capital, use a nym server. Nym servers
make it obvious that you're using a nym, but it allows you to generate as
many reputations as you want and keep them separate. They're hard to use
without a tool, even for the best of us. Premail leaves a lot to be
desired in that it's slow, has some bugs, and lacks some good features,
but most of the people who want to create a new version seem to live in
the U.S..

The real advantage of the nym servers is that they allow people to see the
origin of the message at a glance. You can do the same thing with regular
anonymous remailers, but you have to verify the signature rather than
glancing at the headers. You should still verify the signature in either
case. This was less of a problem than it once was because premail was out
there, until PGP 5 came out.

PGP 5.x is incompatable with previous versions since it changed both the
protocols and the command line interface. Unfortunately, they changed the
command line interface in a rather stupid way. They also wound up
releasing the Windows version before the UNIX version (by something like
three months).

They seem to check argv[0] to determine what kind of operation you want to
do. 'pgp -seat' won't work anymore. Instead, it's a variant under 'pgpe'.
One PGP binary is created, and several links are set up. The result is
that you can't change the name of the binaries and links if you want. If
there's an advantage to this, I sure don't see it.

When they released the Windows version, Windows users understandably
snatched it up and started using it. The result was a bunch of
incompatabilities between two platforms which could have easily been
solved had PGP, Inc. exercised a little more discression.

That's a moot point now, though. The problem which still remains is the
command line interface. It breaks any script which references PGP, and
that's the main problem.

What UNIX really needs is some kind of mailer which integrates an updated
premail, PGP 2.x support, and PGP 5.x support. Unfortunately, much to the
delight of the government, the people who would code such a thing are
probably in the U.S. like I am.





From nobody at nowhere.to  Sat Sep 26 23:53:15 1998
From: nobody at nowhere.to (Anonymous)
Date: Sun, 27 Sep 1998 14:53:15 +0800
Subject: 
Message-ID: <8b290243deab0d40b2006a5aaf21f9e9@anonymous>



On 27 Sep 1998, Anonymous wrote:

>
> Paul is coming from AOL using Netscape as a mailer and using the
> open relay at cesvxa.ces.edu.

He's admitted this at least once in a sidebar on a message, as I seem to
recall, so it's nothing new. It does go to show conflict of interest, and
it could be claimed that he's trying to make himself feel better, I
suppose.

Looking back, he's used AOL for most of his postings, except for one I
came across which apparently came from an admin machine at ces.edu, so he
isn't exploiting some random open relay somewhere. Generally they all
route through ces.edu.

I can't speak for Paul, but I figure that he's probably doing what he once
said that he is, and using a modem link to AOL, using AOL for a routing
service, then routing mail through the relay at CES. I don't know why
someone would want to do that if they're sitting on a university network,
but it doesn't matter much.

I just checked: the relay does appear to be an open relay. I just hope
spammers don't wind up finding out which, of course, they probably will
after that post.

Can we have some signal somewhere, please?
 





From bill.stewart at pobox.com  Sun Sep 27 00:25:50 1998
From: bill.stewart at pobox.com (Bill Stewart)
Date: Sun, 27 Sep 1998 15:25:50 +0800
Subject: IP: Oh, I feel sooooo much better now.....
In-Reply-To: <199809260435.VAA11846@netcom13.netcom.com>
Message-ID: <3.0.5.32.19980926222349.00b3c100@idiom.com>



>Vladimir Z. Nuri wrote:
>
>> ... The statement says that the IRS mission is to 
>> "provide America's taxpayers top quality service by helping them 
>> understand and meet their tax responsibilities and by applying the 
>> tax law with integrity and fairness to all." 

Cool.  So they'll help me make sure my taxes aren't used irresponsibly, 
and make sure they aren't given to murderers or terrorists, 
or prosecutors and cops attacking people for drug use,
or bureaucrats interfering with legitimate businesses
or distributing stolen money?  
Is this mission statement enforceable, or just hype?   :-)

				Thanks! 
					Bill
Bill Stewart, bill.stewart at pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From paulmerrill at acm.org  Sun Sep 27 00:54:44 1998
From: paulmerrill at acm.org (Paul H. Merrill)
Date: Sun, 27 Sep 1998 15:54:44 +0800
Subject: 
In-Reply-To: <8b290243deab0d40b2006a5aaf21f9e9@anonymous>
Message-ID: <360ED0D0.FD404165@acm.org>



<>
> I can't speak for Paul, but I figure that he's probably doing what he once
> said that he is, and using a modem link to AOL, using AOL for a routing
> service, then routing mail through the relay at CES. I don't know why
> someone would want to do that if they're sitting on a university network,
> but it doesn't matter much.

I only sat on a university network at work.  (the admin machine was
mine.)  Alas I no longer work there.  Shoot, I no longer work in that
state.  But it took longer to plug my computer back togeteher in the
motel room here than it did to get on the air with AOL here.
> 
> Can we have some signal somewhere, please?
> 
Certainly.  I just hate to leave things uncommented when they talk about
me.  I have made that mistake in the past (ignoring what people say
about me) and have had cause to regret it.

PHM

PHM





From howree at cable.navy.mil  Sun Sep 27 02:50:17 1998
From: howree at cable.navy.mil (Reeza!)
Date: Sun, 27 Sep 1998 17:50:17 +0800
Subject: Why do we need remailers, anyway?
In-Reply-To: <20463d5af58cdf2759d132cedbdcfa02@anonymous>
Message-ID: <3.0.5.32.19980928085236.008348b0@205.83.192.13>



At 02:25 AM 9/27/98 -0700, Anonymous wrote:
>
>Hello? This is an old topic, but what the heck...
>
>There is a concept cypherpunks have called "Blacknet", which is an
>organisation that sells profiles of prospective employees based on
>their public comments on the Internet.
>
>This allows employers to filter out undesirables who might or might
>not have outgrown their rebellious youth. (You can never be too safe!) 
>
>Now, there are laws making discrimination illegal. But it's hard to *prove*
>that an employer based its decision on BlackNet files, isn't it....
>
>The cypherpunk philosophy is to rely on technology to solve the problem,
rather
>than rely on the government (or anyone else). Cypherpunks write code.
>
>-- an anonymous aol32 user.
>

You would seem to defend the First Adulterer/Purjurer, you question why I
call him this, but you don't want your employer to know that you support
the existing regime?

Yours is a curious blend of half-truths and inane justifications, with a
little in-your-face spitefulness.

As someone else pointed out, even this thread is a secondary issue.
I'm recycling the electrons you sent to me.

Reeza!

"...The world was on fire, but no one could save me but you...
	Strange what desire will make foolish people do...
		(and the background vocalists sang)
			This world is only gonna break your heart...."

					==C.I.==





From nobody at replay.com  Sun Sep 27 03:27:45 1998
From: nobody at replay.com (Anonymous)
Date: Sun, 27 Sep 1998 18:27:45 +0800
Subject: No Subject
Message-ID: <199809272330.BAA12818@replay.com>



Sunday, September 27, 1998 - 23:06:35 MET

First of all I want to say that the last posting I
did to cypherpunks at cyberpass.net did not reach
the intended recipients.

And two,  

> Subject: Remailers, PGP, and a Project Suggestion   
> Date: Sun, 27 Sep 1998 20:50:36 +0200
> From: Anonymous 
> To: cypherpunks at cyberpass.net

> Unfortunately, much to the delight of the 
> government, the people who would code such 
> a thing are probably in the U.S. like I am.

I would be more than glad to do the coding. I am
not in the US. However, the only thing that stops
me is the fact that I just don't know enough 
programming.


        





From jamesd at echeque.com  Sun Sep 27 05:03:41 1998
From: jamesd at echeque.com (James A. Donald)
Date: Sun, 27 Sep 1998 20:03:41 +0800
Subject: Cypherpunks defeat?
In-Reply-To: <199809231921.VAA12284@replay.com>
Message-ID: <4.0.2.19980927162224.00bb9d80@shell11.ba.best.com>



    --
Anonymous wrote:
> Most cypherpunks have become disillusioned about their
> dreams, and you will seldom hear them defend the notion
> that cryptography offers any kind of alternative to a
> society based on coercion.  The past few years have been
> hard ones.  The failure of digital cash, [....]
>
> Is the cypherpunks dream dead?  Is the movement over?
>
> Maybe it is time to give up. 

We are not defeated.

We have won many key victories, and only one, though the
biggest one, remains to be accomplished.

Our failures have had obvious and remediable causes.

Few people use encryption technology today, because few
people have real need of it.

Few people have real need of it, because there is no
reasonably liquid net money. People are not making, spending,
transferring, and promising, money through the net, so they
have little need to encrypt their messages or care for the
reputation of their nyms.

And that is the big remaining battle.

Net money.  Net money that is reasonably liquid, that many
people acquire, that many people spend, money that is readily
convertible to worthwhile goods and services.  Don't worry
about blinding and all that.  Once any sort of net money is
flowing in large amounts, all that stuff then becomes
possible and desirable.  If there is no liquidity, nobody
cares about blinding, and if you have blinding it does you no
good anyway without liquidity.

Once we get that, we will shortly get it all.  As long as we
do not have that, we have very little.

Digicash failed because it was proprietary.  For net money to
be a success we need a standard for transferring promises to
pay that is separate from the software issuers, and thus
separate from the issuers of promises to pay or deliver.  It
has to be a standard such that anybody can play, anyone can
write software that will interoperate with software written
by others, and anyone can issue promises to deliver anything,
so that Ann, Bob, and Carol can transfer and exchange
promises between each other subject only to the need to trust
each other, without needing permissions or licenses from
anyone else.

And it has to have software that is competitive with existing
methods of transferring value.

Credit cards are very competitive for transactions of modest
size, because of the additional services, in particular
dispute arbitration and resolution provided by the card
issuers, and because of their large installed base. Smaller
players cannot hope to compete in that area.

We have however no adequate means for small payments, five
dollars to fractions of a cent. This offers a fertile
opportunity for the development of netmoney.

We also have no entirely satisfactory means for large low
margin payments..

The large payment problem could be addressed by some system
that provided a tight connection between internet money and
US dollars in US banks, or, better, a system that provided a
tight connection between internet money and US dollars in non
US banks, or, if we had a large and liquid micropayment
system, it could be provided by a tight connection between
micro and macropayments.

If several banks in some moderately popular banking haven
allowed people to transfer funds instantly and cheaply from
one account to another within the haven, through digitally
signed messages passing through https protocol, this would
make it possible to readily solve the large payment problem
by offering the means to create a tight connection between
net dollars and offshore dollars.  If this were done then the
revolution would ensue within a few years. So far none have
been willing to do this, perhaps out of fear of reprisals,
more likely out of sheer inertia.

The offshore dollar system is probably larger and more
liquid, and is certainly considerably more free, than the
onshore dollar system, but it is inconvenient for modest 
payments. People use it primarily for transfers of many
thousands of dollars.  Also the connection between the
offshore dollar and the onshore dollar is weak, because it is 
inconvenient, slow, and costly, to transfer dollars between
the offshore and onshore banking systems.

I see no possibility that anyone will be permitted to create
a strong connection between an internet dollar and the
onshore dollar, whereas it is quite possible that someone
will get away with creating a strong connection between the
internet dollar and the offshore dollar.

Alternatively, (and perhaps more likely) a satisfactory
solution to the micropayment problem automatically brings in 
its train a solution to the large payment problem, since the
software must accumulate many small promises into a few large
promises, and provide means to transfer these large promises
through numerous intermediaries, thus a large volume of
micropayments will create the liquidity for macropayments.
We do not need the banks to win this one, though they would
be very handy.

Large promises to pay could acquire value not through a fast
and cheap connection to the banking system, whether onshore
of offshore, but through a fast and cheap connection to the 
micropayment system, resulting in an internet dollar that
derives its liquidity from the internet market, and is
coupled to the US dollar no more strongly, and no less
strongly, than the offshore dollar is coupled to the onshore
dollar.

Of course for this to work, we will need a large and liquid
market for aggregated micropayments. The existing finance
systems for self publishing, dirty pictures, and gambling,
really do not work very well, so there seems an obvious and
large market for micropayments.

Jakob Nielsen, an apparently well informed internet commerce
pundit who claims familiarity with lots of market research
and has himself done lots of market research has argued that 
there is a large and compelling market for micropayments  
"The Case for Micropayments" 
http://www.useit.com/alertbox/980125.html

Jakob Nielsen:
       Some analysts say that users don't want to be
       "nickeled and dimed" while they are online. In fact,
       the problem is being dimed; not being nickeled.
       Unfortunately, some sites that currently charge for
       content do so at a level of a dollar or more per page.
       Such pricing is obviously unpleasant and will only be
       acceptable for highly  value-added content that users
       can predict in advance that they will benefit 
       significantly from buying. Regular articles (like this
       column) cannot be that expensive. 

       Long-distance telephone calls and electricity are both 
       metered services. Many people do feel a tension while 
       they are on the phone, at least while making an 
       international or other expensive call. At the same 
       time, very few people worry about powering a 
       lightbulb, even though doing so costs a few cents per 
       hour. Electricity charges mainly serve to make people 
       turn off the lights when they go to bed. The 
       difference is clearly in the level of pricing:

       less than a cent per minute and people use as much as 
       they need (electricity) 10 cents per minute, and 
       people ration their usage a little (long distance 
       phone calls) 40 cents per minute, and people ration 
       their usage a lot (international calls)  On the Web, 
       users should not worry about a cent per page. If a 
       page is not worth a cent, then you should not download 
       it in the first place. Even as the Web grows in 
       importance in the future, most people will probably 
       access less than 100 non-free pages per day (in June 
       1998, heavy users visited an average of 46 pages per 
       day).  Most users will have $10-$30 in monthly service 
       charges for Web content. 
	   
One cent, or half a cent, is probably the sweet spot for
pages and dirty picture, with quarters being the sweet spot
for games and gambling.

Obviously pay pages cannot and should not be searched by
search engines, so the typical design would be a free,
searchable, index page containing lead in paragraphs and pay
links to the non free pages on the site, or a collection of
free summary pages each containing a pay link to the
corresponding non free page, or (better) both a free index
page and also a collection of free summary pages.

We want the payment system to introduce no additional delays
when we click on a link, so the index page should cause any
necessary negotiations between the browser and server so that 
the server is ready to accept the coins of this particular
user, so that the user can get the pay page with a single
message, a single URL containing a coin.  The server then
immediately starts downloading the page without waiting for
any further messages to complete, and simultaneously attempts
to deposit the coin.

Suppose you are browsing dirty pictures, and both you and the
server are clients of the same token issuer.  Then the token
issuer knows that you are browsing the dirty picture pages,
and knows how much money the dirty picture issuer is making.

But for the scheme to be successful, we need many token
issuers, and the means to transfer aggregated token values
between issuers, so that in general the entity that takes
your bank money and provides you with net money, and the
entity that takes the dirty pictures servers netmoney and
provides it with bank money, will be very different entities, 
probably in very different jurisdictions, separated by a
chain of intermediaries, who have an economic incentive to
aggregate transactions, thus obscuring individual spending
and getting.

If any creditworthy person can issue tokens, privacy is not
such a big problem, and if the aggregated values representing
large numbers of tokens are readily transferable in a large
liquid market intermediary market, it is not a problem at
all, since the dirty picture issuer and the guy looking at
the dirty pictures are likely to be anonymous to the token 
issuer.

The IBM token scheme provides for intermediaries.  Previous
token schemes did not.  This is an important step forward.
Until now, no one has issued a micropayment scheme that had a 
ghost of a chance. The IBM scheme seem basically workable,
though I need to examine it further.

Micropayments have not failed.  They have not yet been tried.
We still have not seen a scheme attempted that had all the
requirements that real netmoney will need.  It is simply 
quite a bit of work to design these things, and to get them
deployed in a form that ordinary mortals can use.   

    --digsig
         James A. Donald
     6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
     NPL9VZbCi5pP9i/NPYToSVmWYTnX2mbqCxE3CBmj
     4RNCFUvHIWJi/I6WQfi1zBE3fjEMJNMx41wskrUiI
-----------------------------------------------------
We have the right to defend ourselves and our property, because 
of the kind of animals that we are. True law derives from this 
right, not from the arbitrary power of the omnipotent state.


http://www.jim.com/jamesd/����� James A. Donald





From ravage at einstein.ssz.com  Sun Sep 27 05:58:08 1998
From: ravage at einstein.ssz.com (Jim Choate)
Date: Sun, 27 Sep 1998 20:58:08 +0800
Subject: GNUcash [/.]
Message-ID: <199809280200.VAA05655@einstein.ssz.com>



Forwarded message:

> X-within-URL: http://www.gnucash.org/

>    content   In the spirit of cooperation we bring you The GnuCash
>    Project. We all realized that it was senseless to have several
>    different projects working toward the same goals. So we did the most
>    logical thing, we merged! The result of this merger is the GnuCash
>    Project.
>    
>    Some of the projects that merged included X-Accountant, and GnoMoney.
>    GnuCash will be based on the lastest version of Xacc. We will use the
>    "transaction engine" from Xacc, and port the GUI from Motif to
>    Gnome/Gtk. Several other significant features will also be added. Such
>    as support for splits, and online banking via OFX. To see a list of
>    other planned features please check out the features page.
>    
>    There is unfortunately no stable version of GnuCash available yet. So
>    if you are interested in using a financial package now I suggest using
>    the lastest version of Xacc, which is a very stable, and full featured
>    piece of software! =) Check out the pages below for more info on Xacc.

>    News 09-17-98
>      * ANNOUNCE - Gnucash 1.1.18 is released. Get it at ftp.gnucash.org


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage at ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------





From nobody at replay.com  Sun Sep 27 06:28:01 1998
From: nobody at replay.com (Anonymous)
Date: Sun, 27 Sep 1998 21:28:01 +0800
Subject: please help
Message-ID: <199809280230.EAA27973@replay.com>





http://www.angelfire.com/ok/ProveIt/





From pooh at efga.org  Sun Sep 27 06:31:48 1998
From: pooh at efga.org (Robert A. Costner)
Date: Sun, 27 Sep 1998 21:31:48 +0800
Subject: Cypherpunks defeat?
In-Reply-To: <199809231921.VAA12284@replay.com>
Message-ID: <3.0.3.32.19980927223248.03463a7c@mail.atl.bellsouth.net>



At 05:10 PM 9/27/98 -0700, James A. Donald wrote:
>Few people use encryption technology today, because few
>people have real need of it.

I would tend to disagree with this.  Instead, few people use encryption
technology today because encryption technology is seldom transparent to the
user.

Few users "think" encryption when they use SSL.  It is transparent.  I
suspect that if you were to survey recent users of SSL pages, you would
find that most believe they have not used encryption in the last week.

When PGP 5.x came out, suddenly encryption became, not widely used, but
much more widely than before.  Encryption in email became somewhat
transparent in the sending process of email, but still non transparent in
the transport and receiving of the email.  The user can easily tell the
difference between an encrypted and a non encrypted message.  This non
transparent quality is still a problem.  

Compare this with forged headers (which mainly are hidden in most email
clients).  Forged headers are transparent to the receiver until a closer
look is made.  To compare the two, with encrypted email the message is not
readily apparent.  An action must be taken (with Eudora/PGP and S-Mime
about four actions) to see the text of the message.  On the other hand,
with forged headers the message is apparent, and an action must be taken to
determine that it is not a valid message.

If my email came to me encrypted, only decipherable with my private key
with no passphrase or other action by me, I would be happy.  My computer
sits next to a drawer containing a pile of cash.  I perceive the cash to be
secured.  I also perceive my computer to be secured.  I want my encryption
transparent.

>reasonably liquid net money... so they
>have little need to encrypt their messages

I personally would like all my cell phone, cordless phone, and email
communications transparently encrypted.  If it were an option, and was
seamless  transparent, and the same price, then I suspect most people would
as well.

>If several banks in some moderately popular banking haven
>allowed people to transfer funds instantly and cheaply from

Yes, this has been a big problem.  Teller machines are now at about $1 per
transaction to cross networks.  Most of the internet payment systems
require a large chunk of the money be retained by the processing system.
Secure servers often want 12% to 50% of the transaction.  PC banking has
monthly charges.

>One cent, or half a cent, is probably the sweet spot for
>pages and dirty picture, with quarters being the sweet spot
>for games and gambling.

I would suggest millicent to 1/100 of a penny for web page access.  A penny
a click would make me think twice, 1/100 of a penny would not cause me to
consider it.  But to be honest, today I would avoid a pay site and go to
the free sites.

>Obviously pay pages cannot and should not be searched by
>search engines

If my pages were for pay, I would want them to turn up in the search
engines.  This is easy enough.  When I examine my logs, I can easily see
when certain search engines come looking.  The micropayment software simply
has to be configurable to allow certain IP addresses to be allowed to pass
without paying.

>But for the scheme to be successful, we need many token
>issuers

Is there existing open software available for this?


  -- Robert Costner                  Phone: (770) 512-8746
     Electronic Frontiers Georgia    mailto:pooh at efga.org  
     http://www.efga.org/            run PGP 5.0 for my public key





From tcmay at got.net  Sun Sep 27 06:59:24 1998
From: tcmay at got.net (Tim May)
Date: Sun, 27 Sep 1998 21:59:24 +0800
Subject: Meriweather v. Gates
Message-ID: 




It's an ironic indication of where we are that Bill Gates is being hounded
by the Justice Department, Sun Microsystems, Netscape, Novell, and Ralph
Nader while no one is hounding John Meriweather. In fact, the Federal
Reserve System, nominally nongovernmental (wink wink) just helped to bailed
out his firm, Long-Term Capital Management.

Gates, you see, has a non-leveraged investment of $50 billion in Microsoft.
No borrowing, no margin debt, just plain old-fashioned ownership.

Meriweather, on the other hand, started in 1991 and took in money from
speculators. He took the $2.2 billion and borrowed with it, hitting the
$125 B in borrowed assets point. Then he and his rocket scientists
essentially borrowed still more, using this $125 B to leverage $1.25 T. (T
for "trillion.")

Not  bad, going from $2.2 B to $1.25 T, a mere 500-fold increase.

(Like taking the money one planned to spend on a new PC, a couple of
thousand or so, and instead controlling a million dollars worth of
financial instruments.)

Had the folks at LTCM made the right bet on the roulette wheel, by guessing
the direction of interest rates, the tens of billions of profits would have
been theirs to keep, with little work on their part. (Some of the
principals are now disclaiming responsibility, saying LTCM was only a
sideline interest.)

Ah, but they guessed wrong, and now they and their lenders are being
bailed out. In America, profits are private but losses are public.

Meanwhile, Gates sticks to building up his company, selling actual
products.  No margin debt, no loans for the American taxpayer to cover, no
overextended lines of credit. Oh, the horror of it!

Gates must be attacked by the U.S. government and all of his incompetent
competitors! He must be driven out of business! We need to  make the world
safer for folks like Meriweather.

(Think of what Meriweather could be doing with the $50 B that Gates has!
Instead of being worth a piddling $50 billion, Meriweather and Scholes and
that bunch could double down, double down again, and again, and turn it
into $25 trillion! All with just some computer commands. American
capitalism at its best.)

We bail out Meriweather. We try to bust Gates. I'm going to  be sick.

The reformatting of this country is overdue.

--Tim May


(This space left blank pending determ. of acceptability to the gov't.)
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.







From jf_avon at citenet.net  Sun Sep 27 07:24:27 1998
From: jf_avon at citenet.net (Jean-Francois Avon)
Date: Sun, 27 Sep 1998 22:24:27 +0800
Subject: Police would never exagerate ? Guess what...
Message-ID: <199809280318.XAA09972@cti06.citenet.net>



==================BEGIN FORWARDED MESSAGE==================
>Date: Mon, 28 Sep 1998 09:57:46 +0930
>From: SSAA 
>Subject: NEWS - Toy Pistol case dismissed
>Reply-to: Sporting.Shooters.Association at adelaide.on.net

THE SUNDAY TELEGRAPH, Sydney.    Sept 27.by Wayne Jones.
A MAGISTRATE has dismissed charges against a 165 year old boy who faced
jail for possessin a toy cap gun.
The magistrate, Hal Halenstean, made the decision after hearing what he
described as a "silly case" on Friday.
"We all have better things to do", Mr Halenstein said,
The boy, who cannot be identified bought the toy cap gun from a toy
stall at Victoria's Dandednong Market on May 12.
Minutes later, police looking for drug dealers found the cap gun in the
boy's jacket. They charged boy with several firearm offences which carry
a jail sentence.
In court, Mr Halenstein twice gave prosecutors on opportunity to
withdraw the charges against the boy, but police indicated they would
continue to contest the case.
Using special provisions of the Sentencing Act, Mr Halenstein then
dissmissed the charges.
The boy's barrister, Arend Slink, said the court case had set a
precedent under the new gun laws. Toy cap guns could no longer be
classed as prohibited weapons, he said.
"If there is any sinister intent there are a range of serious charges
that a person could be charged with. "Mr Slink" said"But in the case of
a child possessing a toy cap gun a precedent has now been clearly set".
The Sunday Telegraph reported on May 24 the boy could face jail if found
guilty of the swrioud gun charges, which included:
# Being a non-prohibited person did possess/carry a handgun which was
not registered. 
# Being a non-prohibited person did possess/ carry a handgun which ge
did not have a licecnce for under part two of the Firearms Act 1996.
# Did own a handgun whilst not authorissed by a licence under the
Firearms Act 1996 to possess a firearm.
Police had alleged the toy gun was consedered an imitation firearm inder
strict new gun laws and therefore deemed to be a prohibited weapon.
The toy gun bought by the boy is one of thousands soldacross the state. 
The boy said he had bought the toy cap gun with pocket money.
THE END.
------------------------------------------------------------------------ 
View Democrat Firearm Policy
www.ssaa.org.au/dempolicy.html
Print, copy and distribute.


===================END FORWARDED MESSAGE===================


Jean-Francois Avon, B.Sc. Physics, Montreal, Canada
  DePompadour, Soci�t� d'Importation Lt�e
     Limoges fine porcelain and french crystal
  JFA Technologies, R&D physicists & engineers
     Instrumentation & control, LabView programming
PGP keys: http://bs.mit.edu:8001/pks-toplev.html
PGP ID:C58ADD0D:529645E8205A8A5E F87CC86FAEFEF891 
PGP ID:5B51964D:152ACCBCD4A481B0 254011193237822C






From anto at commnet.it  Sun Sep 27 22:36:45 1998
From: anto at commnet.it (anto at commnet.it)
Date: Sun, 27 Sep 1998 22:36:45 -0700 (PDT)
Subject: Find  Out  Anything  About  Anyone  On  The  Net  !!!!
Message-ID: <199809271544.LAA22172@key.globalx.net>



YOU can easily learn how to investigate and learn EVERYTHING 
about your employees, neighbors, friends, enemies, and or
anyone else  !!!


It is absolutely amazing !!!
YOU Must Get This Extraordinary Package today.........


   +  YOU can track down an old friend or a lost love,
     and, just for fun, investigate your family history.

   +  YOU can screen prospective employees criminal records,
     look at their driving, or credit history.

   +  YOU can verify test results from drug testing and even
     look into your children's friends history for any type 
     of record.

   +  YOU can TRACK down and locate an old debtor who is
     hiding from you and see if he/she is hiding any assets.

   +  YOU can look up "unlisted telephone numbers."  Locate
     social security, birth, adoption or death records.
     Check Army, Navy, Marine Corps, or Air Force service
     file records.  YOU will simply be amazed to learn what
     sensitive and important information other people and
     enemies can discover about YOU !!!!!

YOU Can Find Out Anything About Anyone On The Net !!!
Do background checks on people and charge for it, as
you start your own investigative services.
Stop guessing about the LAW !!!
Look up laws and do much more, direct from famous law libraries.
Get this easy to use  KIT  right away, and then,
YOU can become a private investigator.

ORDER TODAY !!!!!


Send $18.00 cash (wrapped in two pieces of paper),
money order, or check to:

                    INFORMATION, Ltd.
                    P. O. Box  515019
                    St. Louis,  MO  63151-5019  USA

The Complete Package Will Be Immediately Shipped
Prepaid Directly to You With Everything You Will Need
In Your Kit to Get Started Right Away !!

THANK YOU for your kind attention, and have a nice day !!!!


+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++




YOUR AD IN 333 NEWSPAPERS !!!!!!!!!!
***********************************************

         Seven years ago, I learned how to place my Classified Ad in
several hundred newspapers, with just one telephone call.  And, my
cost was $0.51 per newspaper.  The total circulation was well over
1.5 Million.  I could reach just about any market, anywhere in this
country.  Since then, my small mail-order company has exploded.
And, I use this same time tested and true method week after week.

         I would like to share this powerful information and show you
how to save hundreds, even thousands of dollars on advertising that
works.  The average cost of a classified ad in a newspaper is about
$15.00 to $20.00 dollars.  Multiply that by 333 and your total cost is
well over $6,000.00 Dollars.  By using our amazing method, your
total cost is only $170.00.  Not to mention the time and money you
save by placing one call, instead of 333 long distance calls.

          You can limit your promotion to a Single State or place your
ad in Several States around the country, all with just one phone call.
You can reach One Million Readers on the East-Cost today and a
Million on the West-Coast tomorrow.  It's that simple  !!!!

            Your cost for this priceless information, is only $19.00 !!!  
You will make that back on your first promotion.  WE are so confident that
this type of advertising will boost your profits, we will guarantee your
satisfaction with our Money Back Guarantee !!  So, you have nothing
to lose.  Now, order our amazing classified ad method today !!!!!! 


                                PRINT ORDER FORM
Ship To:                    **************************
*********
NAME____________________________________________

ADDRESS________________________________________

CITY______________________________________________

STATE__________________    ZIP_____________________

E-MAIL__________________________________

Don't Delay,   ORDER YOUR COMPLETE MEDIA KIT TODAY !!!!!!!

**********************************************************************
Mail Payment  $19.00  CASH,  money order,  or check  TO:
********************
 
                                  INFORMATION, Ltd.
                                  P. O. Box  515019 
                                  St. Louis, MO 63151-5019  
                                  U.S.A.

WE will ship your complete KIT directly to you !!!!
 

**************************************************************
OPTIONAL / OVERNIGHT SHIPPING - ADD $15.00
**************************************************************
                          
Thank you for your kind attention, and have a nice day !!!


       YOU MAY ORDER BOTH PACKAGE KITS FOR ONLY $33.00



++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Admin
Internet Services
This message is not intended for residents in the 
State of Washington, screening of addresses has been done
to the best of our technical ability.
If you are a Washington resident or otherwise wish to be
removed from this list, go to global remove site if you want
your address removed from future mailing. 
http://209.84.246.162/remove.htm
 
This Global Communication has been sent to you by:
PAVILION ADVERTISING SERVICES
Offices:  London, Paris, Berlin, Hong Kong























From jamesd at echeque.com  Sun Sep 27 07:58:52 1998
From: jamesd at echeque.com (James A. Donald)
Date: Sun, 27 Sep 1998 22:58:52 +0800
Subject: Cypherpunks defeat?
In-Reply-To: <4.0.2.19980927162224.00bb9d80@shell11.ba.best.com>
Message-ID: <199809280358.UAA27338@proxy3.ba.best.com>



    --
At 05:10 PM 9/27/98 -0700, James A. Donald wrote:
> > But for the scheme to be successful, we need many token 
> > issuers

At 10:32 PM 9/27/98 -0400, Robert A. Costner wrote:
> Is there existing open software available for this?

IBM is proposing that anyone, or many people, will be free to
act as issuers of promises to pay in their proposed microcash
system.  Obviously their system is not very open, but unlike
previous amateurish proposals for microcash, it does support
a rich system of intermediaries transferring aggregated
promises to pay.

We really need an open system, which IBM is not, which goes
down to millicent values, which IBM does not, and which
supports intermediaries moving aggregated transactions, so
that customer and server to not have to be clients of the
same intermediary, which IBM does support, and previous
proposals for micropayment did not.

    --digsig
         James A. Donald
     6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
     Wew5mzbrzY0w3HicOSQ4AfZq5mUz1m+2tsx31B+Z
     4qFN1ClYcfHx6uSYTNssozZoWye7rdANKGzzp16kS
-----------------------------------------------------
We have the right to defend ourselves and our property, because 
of the kind of animals that we are. True law derives from this 
right, not from the arbitrary power of the omnipotent state.


http://www.jim.com/jamesd/����� James A. Donald





From pooh at efga.org  Sun Sep 27 08:20:13 1998
From: pooh at efga.org (Robert A. Costner)
Date: Sun, 27 Sep 1998 23:20:13 +0800
Subject: Cypherpunks defeat?
In-Reply-To: <3.0.3.32.19980927223248.03463a7c@mail.atl.bellsouth.net>
Message-ID: <3.0.3.32.19980928002239.03be06bc@mail.atl.bellsouth.net>



At 08:43 PM 9/27/98 -0700, James A. Donald wrote:

>IBM is proposing that anyone, or many people, will be free to
>act as issuers of promises to pay in their proposed microcash
>system.  

I don't think you gave a URL for the IBM system.  Since you got me
interested, I went and looked at the "MilliCent" branded product from
Digital/Compaq.

	http://www.millicent.digital.com/

Millicent is currently free in that scrip is not cash.  I have to laugh in
that MilliCent has a granularity of 1/10 of a penny.  So why call it
millicent?

It looks like millicent could be used to pay for web based sending of
anonymous messages, but only if you have an NT server (or use theirs) and
only if you browse from windows.

Maybe if I find a millicent type system that works with a Linux server,
especially a "non money" one, I might setup a web based mailer that works
with it.  It would make a nice weekend project.  I'm been thinking of
revamping the dragoncon.net mailer anyway.


  -- Robert Costner                  Phone: (770) 512-8746
     Electronic Frontiers Georgia    mailto:pooh at efga.org  
     http://www.efga.org/            run PGP 5.0 for my public key





From jamesd at echeque.com  Sun Sep 27 08:59:18 1998
From: jamesd at echeque.com (James A. Donald)
Date: Sun, 27 Sep 1998 23:59:18 +0800
Subject: Cypherpunks defeat?
In-Reply-To: <199809280358.UAA27338@proxy3.ba.best.com>
Message-ID: <199809280459.VAA16677@proxy3.ba.best.com>



    --
At 08:43 PM 9/27/98 -0700, James A. Donald wrote:
> > IBM is proposing that anyone, or many people, will be
> > free to act as issuers of promises to pay in their
> > proposed microcash system.  

At 12:22 AM 9/28/98 -0400, Robert A. Costner wrote:
> I don't think you gave a URL for the IBM system. 

http://www.hrl.il.ibm.com/mpay 

> Since you got me interested, I went and looked at the
> "MilliCent" branded product from Digital/Compaq.
>
>	http://www.millicent.digital.com/
>
> Millicent is currently free in that scrip is not cash.  I
> have to laugh in that MilliCent has a granularity of 1/10
> of a penny.  So why call it millicent?
>
> It looks like millicent could be used to pay for web based
> sending of anonymous messages, but only if you have an NT
> server (or use theirs) and only if you browse from windows.
>
> Maybe if I find a millicent type system that works with a
> Linux server, especially a "non money" one, I might setup a
> web based mailer that works with it.  It would make a nice
> weekend project.  I'm been thinking of revamping the
> dragoncon.net mailer anyway.

What we really need is an open standard with very fine
potential granularity and the intermediary capabilities of
Microsoft.

Such a project is quite large. 

    --digsig
         James A. Donald
     6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
     zRXCi1S3PQe8A82QKJfHfUZKc6zitJTY6L/I82Tu
     4VsX/hdqg717QA4khZefRZ8nu2RJD3DzKv9ZNLjdK
-----------------------------------------------------
We have the right to defend ourselves and our property, because 
of the kind of animals that we are. True law derives from this 
right, not from the arbitrary power of the omnipotent state.


http://www.jim.com/jamesd/����� James A. Donald





From jvb at ssds.com  Sun Sep 27 11:19:47 1998
From: jvb at ssds.com (Jim Burnes)
Date: Mon, 28 Sep 1998 02:19:47 +0800
Subject: Cypherpunks defeat?
In-Reply-To: <199809280358.UAA27338@proxy3.ba.best.com>
Message-ID: 




On Sun, 27 Sep 1998, James A. Donald wrote:

> We really need an open system, which IBM is not, which goes
> down to millicent values, which IBM does not, and which
> supports intermediaries moving aggregated transactions, so
> that customer and server to not have to be clients of the
> same intermediary, which IBM does support, and previous
> proposals for micropayment did not.
> 
>     --digsig
>          James A. Donald

Sound like we need something like a GPL for digital cash
protocols/algorithms.

That would keep it from being monopolized by a few power
players.

Someone has to be working on this.

jim






From stuffed at stuffed.net  Mon Sep 28 03:52:30 1998
From: stuffed at stuffed.net (STUFFED NEWS DAILY)
Date: Mon, 28 Sep 1998 03:52:30 -0700 (PDT)
Subject: TODAY'S NEWS AND PICS PACKED STUFFED! - READ IT NOW!
Message-ID: <19980928071000.25042.qmail@eureka.abc-web.com>


+ 30 FREE HOT JPEG PHOTOS
+ 5 SUPER SEXY STORIES
+ NOTES ON MARRIAGE
+ SUCKING AND FLOPPING
+ MADONNA GOES ALL GIRL
+ THE BEST OF EUREKA
+ KEEP IT COMING MONICA
+ TOP 9 SIGNS GRAMPS IS ON VIAGRA
+ NO PLACE TO HIDE AT THE NAKED LUNCH
+ I LOVE PAPAYA

       ---->   http://stuffed.net/98/9/28/   <----

Welcome to  today's  issue of Stuffed. To read it you should
click on the URL above.  If it is not made clickable by your
email program  you will need to  use your mouse to highlight
the URL,  copy it and then paste it into your browser  (then
press Return).

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!

       ---->   http://stuffed.net/98/9/28/   <----





From remailer at replay.com  Sun Sep 27 13:13:22 1998
From: remailer at replay.com (Anonymous)
Date: Mon, 28 Sep 1998 04:13:22 +0800
Subject: Information about the Anonymous
Message-ID: <199809280909.LAA17361@replay.com>



This message is being sent to you automatically in reply to the message
you sent to remailer at replay.com with the subject "remailer-help".

There is an automated mail handling program installed on this account
which will take any message with the proper headers and automatically
re-send it anonymously.

It is capable of providing a very high level of security if you use the
Mixmaster software to produce the messages.  You can get the Mixmaster
client software from  (Germany).  Please
read its manual page and README file for usage instructions.

More information about anonymous remailers is available at
.

For an up-to-date listing of anonymous remailers with statistics,
see .  You can also get the
list by fingering rlist at anon.efga.org or rlist at anon.lcs.mit.edu.

You can use the remailer by sending mail to remailer at replay.com, with the
header "Anon-To: address", the address that you want to send anonymously
to.  If you can't add headers to your mail, you can place two colons on
the first line of your message, followed by the "Anon-To:" line.  Follow
that with a blank line, and then begin your message.  For example:

================================================================
From: joe at site.com
To: remailer at replay.com
Subject: Anonymous Mail

::
Anon-To: beth at univ.edu

This is some anonymous mail.
================================================================


The above would be delivered to beth at univ.edu anonymously.  All headers in
the original message are removed.  She would not know that it came from
Joe, nor would she be able to reply to the message.  However, there are a
few ways that the true identity of the sender could be found.  First, if
many anonymous messages were sent, someone could compare the times that
the messages were sent with the times that 'joe' was logged in.  However,
this can be prevented by instructing the remailer to delay the message, by
using the "Latent-Time:" header:

================================================================
From: joe at site.com
To: remailer at replay.com
Subject: Anonymous Mail

::
Anon-To: beth at univ.edu
Latent-Time: +1:00

This is some anonymous mail.
================================================================

The message would be delayed one hour from when it is sent.  It is also
possible to create a random delay by adding an 'r' to the time (+1:00r),
which would have the message be delivered at a random time, but not more
than an hour.  You can also delay the message until a specific time.
For example, "Latent-Time: 0:00" without the '+' would delay the message
until midnight (at the remailer site).  Times must be in 24-hour format.

NOTE: This remailer automatically reorders messages in a large pool,
which produces a similar effect.


Another problem is that some mailers automatically insert a signature file.
Of course, this usually contains the sender's e-mail address, and so would
reveal their identity.  The remailer software can be instructed to remove
a signature file with the header "Cutmarks:".  Any line containing only the
cutmark characters, and any lines following it will be removed.

================================================================
From: sender at origin.com
To: remailer at replay.com

::
Anon-To: recipient at destination.com
Cutmarks: -- 

This line of text will be in the anonymous message.
-- 
This line of text will not be in the anonymous message.
================================================================

NOTE: The cutmark characters in the example are "-- ", the usual e-mail
signature separator.  If you forget the trailing blank after the "--"
in the "Cutmarks:" directive, your signature won't be cut off.


Sometimes you want a subject line or other headers in your anonymous
message.  Additional headers can be written to the output message by
preceding them with a "##" line.  Multi-line headers with indented
continuation lines are allowed.

================================================================
From: chris at nifty.org
To: remailer at replay.com

::
Anon-To: andrew at where-ever.org

##
Reply-To: chris at nifty.org
Subject: A message with user-supplied headers: the subject extends
	over two lines

Hi there!
================================================================


The remailer can also be used to make anonymous posts to Usenet.
To do this, send a message with the header "Anon-Post-To: newsgroups",
the newsgroups that you want to post anonymously to.  Please note
that the group names must be separated by commas (but NO spaces).

================================================================
From: poster at origin.com
To: remailer at replay.com

::
Anon-Post-To: alt.test,misc.test

##
Subject: Anonymous Post

This is an anonymous message.
================================================================

When posting test messages, please use the appropriate groups (alt.test,
misc.test).  The remailer support newsgroup alt.privacy.anon-server is
not a test group.  A subject is needed for Usenet postings.  The remailer
writes a "Subject: none" header to the output message if you don't add
your own subject.

In order to post an anonymous follow-up article and have it appear in a
thread, you must set the "Subject:" and "References:" headers of your
message correctly.  The explanation below has been adapted from the
nym.alias.net help file (mailto:help at nym.alias.net).

The subject of your message should be the same as the article to which you
are replying, unless you are replying to the first message in a thread, in
which case you should prepend "Re: " to the original subject.

To build a references header, copy the references header of the article to
which you are replying, and append that article's Message-ID.  If you are
replying to the first article of a thread, it won't have a references header.
In that case just use the article's Message-ID as your references header.
Be sure to leave a space between Message-IDs in your references heder.
For example, if replying to a message which includes these headers:

================================================================
Newsgroups: alt.privacy.anon-server
Subject: Re: anonymous remailers
References: <5dfqlm$m50 at basement.replay.com>
Message-ID: <5dko56$1lv$1 at news02.deltanet.com>
================================================================

your anonymous follow-up message should begin with these lines:

================================================================
::
Anon-Post-To: alt.privacy.anon-server

##
Subject: Re: anonymous remailers
References: <5dfqlm$m50 at basement.replay.com>
	<5dko56$1lv$1 at news02.deltanet.com>
================================================================

[Note that an indented line in a message header indicates a continuation
of the previous line.]  If replying to the first message in a thread,
with these headers:

================================================================
Newsgroups: alt.privacy.anon-server
Subject: Help with PGP
Message-ID: <5e96gi$opv at job.acay.com.au>
================================================================

your reply should begin with these lines:

================================================================
::
Anon-Post-To: alt.privacy.anon-server

##
Subject: Re: Help with PGP
References: <5e96gi$opv at job.acay.com.au>
================================================================

The "References:" header can be trimmed to include only IDs from messages
that you have quoted from or are replying to.


By separating messages with cutmarks, you can send more than one message
at once:

================================================================
From: me at mysite.org
To: remailer at replay.com
Subject: whatever

::
Anon-To: recipient1 at site1.org
Cutmarks: -- 

##
Subject: message 1

Message one.
-- 
::
Anon-To: recipient2 at site2.org
Cutmarks: -- 

##
Subject: message 2

Message two.
-- 
me at mysite.org
================================================================

The two messages will be delivered separately, and the signature will
be removed.  Only one cutmark is used in the example, but you may use
different cutmarks in each part of your message if necessary.


For added security, you can encrypt your messages to the remailer with
PGP. The remailer software will decrypt the message and send it on.
Here is the remailer's public key:

Type Bits/KeyID    Date       User ID
pub  1000/E7AEC1E5 1995/05/23 Replay Remailer Service 

-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: 2.6.3i

mQCKAy/Bo9QAAAED6NMBE5oNGLqUmZvUZTWBfL41B67EVtDHu5VmqrPLX6w0gk8U
lPUNlW/1wACNQAFs/hxKKd0B15d8R7Qk1X7H1KPsdF9AAp8DIBe3MN59Z8iO1dYB
GW8YhPg2EXnNAZyVQb/CGhDZhm8naq3wsQynZZu4J7DmVD0VsrLnrsHlAAURtC1S
ZXBsYXkgUmVtYWlsZXIgU2VydmljZSA8cmVtYWlsZXJAcmVwbGF5LmNvbT6JAJID
BRAvzinRPRWysueuweUBAVpyA+dmx166/op40+nr9OQjahqWHdvLYkKipanaLNM4
u0/U8RrkySEj5n/R0zaJSG4mutZ28DqUEhz7rBHrFRYleENRtiI9TxZZrJVWInE9
No7VwSW9jWlpta2rCfu97EWLdPVPLXmXpd90TONHMk8a7sf/Lz5JFWIIK5PSqI/Z
xQ==
=5+RC
-----END PGP PUBLIC KEY BLOCK-----

To utilize this feature, create a message with two colons on the first line,
then the "Anon-To:" or "Anon-Post-To:" header, then any other commands such
as "Cutmarks:" or "Latent-Time:", then a blank line, then the optional "##"
line and your additional headers, then a blank line, and then the body of
your message.  Encrypt this with the remailer's public key.  Then send it
to the remailer, adding the header "Encrypted: PGP".  If you forget this,
the remailer won't know that it needs to be decrypted.  Also be sure to use
the "-t" option with PGP, or the linefeeds might not be handled properly.

================================================================
From: me at mysite.org
To: remailer at replay.com

::
Encrypted: PGP

-----BEGIN PGP MESSAGE-----
Version: 2.6.3in

hIwCJD7BWgsRsnUBA/9kVuVlhFczhjI5cYFLGEAQiv4fUUlZ+hgPp6SQysToVLTM
d0OvWqEb4TJgMREf6pHv4022yRLV6Pb9xaE/Gb82SUZYNE6TvfpxyKbWtRSthPXx
OlsLD+IudqvBQus6DoY/9ClbbXyibP6mOCy7gwFZWOy6OMv2O2ZI3ufc/iCpgKYA
AAAoLD7rvsI+c/Bod/GKAffpHqN2fimsoXrdcEMhIfN+rSC7PnMmaX1c4w==
=afKM
-----END PGP MESSAGE-----
================================================================

To confuse possible attackers even more, you can generate some cover
traffic by sending encrypted messages with the special "Null:" header
rather than the usual "Anon-To:" or "Anon-Post-To:" headers.  The
remailer will drop these messages in the bit bucket.


Any text after your encrypted remailer message is also remailed.  This
allows sending messages to someone who is anonymous.  If you create a
PGP-encrypted message to yourself via this remailer, and then give it
to someone, they can send you a message by sending the encrypted message
to the remailer.  The remailer will then decrypt it and send it to you.
The message gets anonymized in the process, so the sender will need
to include a return address if he wants a reply.

Messages sent this way can be encrypted using the "Encrypt-Key:" feature.
Any text following a line beginning with "**" will be encrypted with this
key.  For example, if you put in the plaintext of your PGP message:

================================================================
::
Anon-To: you at yourhost.org
Encrypt-Key: your_password

**
================================================================

The appended message after the "**" will be encrypted with the key
"your_password", using PGP's conventional encryption option.
It is much simpler to manage these "reply blocks" -- both from the
sender's and recipient's perspective -- by using a nymserver.
Please read  for more information
(the homepage for nym.alias.net, the home of the nymserver software).


For greatest untraceability, your reply block can be directed to post
to alt.anonymous.messages on Usenet.  Since you must use a subject line
when posting to Usenet, messages sent using the same reply block will
have the same subject.  To avoid this, you can encrypt a message digest
of the subject using the "Encrypt-Subject:" feature.  For example, if
you put inside your reply block:

================================================================
::
Anon-Post-To: alt.anonymous.messages
Encrypt-Key: your_password
Encrypt-Subject: your_other_password

##
Subject: This subject is MD5 hashed and IDEA encrypted

**
================================================================

The subject will be converted to a 128-bit number and encrypted
with IDEA using CFB mode with the key "your_other_password", and
printed in hexadecimal format (48 characters); and the message will
be posted to alt.anonymous.messages.  The original subject cannot
be recovered, only the MD5 hash of it, and then only if you have the
password.  The resulting subject will be different each time due to
the use of CFB mode, so this helps prevent traffic analysis based on
the subject header.

Decoding the subject (to verify that the message is directed to you)
requires special software.  A small C program which can do this is
part of the remailer distribution, but a more robust application would
be appreciated.  You can get the remailer source code as ASCII-armored
Unix TGZ archive by sending mail to remailer-source at squirrel.owl.de.


Abuse Policy:
I consider the following to be inappropriate use of this anonymous remailer,
and will take steps to prevent anyone from doing any of the following:
- Sending messages intended primarily to be harassing or annoying.
- Use of the remailer for any illegal purpose.  Due to the global nature
  of the Internet, it is the sole responsibility of the orginal sender
  to determine what is legal.
- Unsolicited commercial messages (SPAM).
- Complaints to spammers.
- Posting lists of addresses to Usenet groups for purposes of soliciting
  commercial e-mail (spam-baiting).

Spammers will be exposed, publicly humiliated, and billed whenever possible.

If you don't want to receive anonymous mail, send a message to the operator,
and your address will be added to the block list.  For more information on
filtering out unwanted e-mail, see .


You can get a list of statistics on remailer usage by sending mail to
the remailer with Subject: remailer-stats


To get the remailer's public keys, send mail with Subject: remailer-key
or finger rlist-keys at anon.efga.org or remailer-keys at anon.lcs.mit.edu to
get the public PGP keys of all active Cypherpunk remailers.


For a copy of these instructions, send mail with Subject: remailer-help

To reach the operator, direct your mail to abuse at replay.com.





From anto at commnet.it  Mon Sep 28 04:28:35 1998
From: anto at commnet.it (anto at commnet.it)
Date: Mon, 28 Sep 1998 04:28:35 -0700 (PDT)
Subject: YOUR  CLASSIFIED - AD / 333  NEWSPAPERS  !!!!
Message-ID: <199809271748.NAA26235@key.globalx.net>



YOUR AD IN 333 NEWSPAPERS !!!!!!!!!!
***********************************************

         Seven years ago, I learned how to place my Classified Ad in
several hundred newspapers, with just one telephone call.  And, my
cost was $0.51 per newspaper.  The total circulation was well over
1.5 Million.  I could reach just about any market, anywhere in this
country.  Since then, my small mail-order company has exploded.
And, I use this same time tested and true method week after week.

         I would like to share this powerful information and show you
how to save hundreds, even thousands of dollars on advertising that
works.  The average cost of a classified ad in a newspaper is about
$15.00 to $20.00 dollars.  Multiply that by 333 and your total cost is
well over $6,000.00 Dollars.  By using our amazing method, your
total cost is only $170.00.  Not to mention the time and money you
save by placing one call, instead of 333 long distance calls.

          You can limit your promotion to a Single State or place your
ad in Several States around the country, all with just one phone call.
You can reach One Million Readers on the East-Cost today and a
Million on the West-Coast tomorrow.  It's that simple  !!!!

            Your cost for this priceless information, is only $19.00 !!!  
You will make that back on your first promotion.  WE are so confident that
this type of advertising will boost your profits, we will guarantee your
satisfaction with our Money Back Guarantee !!  So, you have nothing
to lose.  Now, order our amazing classified ad method today !!!!!! 


                                PRINT ORDER FORM
Ship To:                    **************************
*********
NAME____________________________________________

ADDRESS________________________________________

CITY______________________________________________

STATE__________________    ZIP_____________________

E-MAIL__________________________________

Don't Delay,   ORDER YOUR COMPLETE MEDIA KIT TODAY !!!!!!!

**********************************************************************
Mail Payment  $19.00  CASH,  money order,  or check  TO:
********************
 
                                  INFORMATION, Ltd.
                                  P. O. Box  515019 
                                  St. Louis, MO 63151-5019  
                                  U.S.A.

WE will ship your complete KIT directly to you !!!!
 

**************************************************************
OPTIONAL / OVERNIGHT SHIPPING - ADD $15.00
**************************************************************
                          
Thank you for your kind attention, and have a nice day !!!


+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++


Find Out Anything About Anyone On The Net  !!!
=========================================

YOU can easily learn how to investigate and learn EVERYTHING 
about your employees, neighbors, friends, enemies, and or
anyone else  !!!


It is absolutely amazing !!!
YOU Must Get This Extraordinary Package today.........


   +  YOU can track down an old friend or a lost love,
     and, just for fun, investigate your family history.

   +  YOU can screen prospective employees criminal records,
     look at their driving, or credit history.

   +  YOU can verify test results from drug testing and even
     look into your children's friends history for any type 
     of record.

   +  YOU can TRACK down and locate an old debtor who is
     hiding from you and see if he/she is hiding any assets.

   +  YOU can look up "unlisted telephone numbers."  Locate
     social security, birth, adoption or death records.
     Check Army, Navy, Marine Corps, or Air Force service
     file records.  YOU will simply be amazed to learn what
     sensitive and important information other people and
     enemies can discover about YOU !!!!!

YOU Can Find Out Anything About Anyone On The Net !!!
Do background checks on people and charge for it, as
you start your own investigative services.
Stop guessing about the LAW !!!
Look up laws and do much more, direct from famous law libraries.
Get this easy to use  KIT  right away, and then,
YOU can become a private investigator.

ORDER TODAY !!!!!


Send $18.00 cash (wrapped in two pieces of paper),
money order, or check to:

                    INFORMATION, Ltd.
                    P. O. Box  515019
                    St. Louis, MO  63151-5019  USA

The Complete Package Will Be Immediately Shipped
Prepaid Directly to You With Everything You Will Need
In Your Kit to Get Started Right Away !!

THANK YOU for your kind attention, and have a nice day !!!!


       YOU MAY ORDER BOTH PACKAGE KITS FOR ONLY $33.00


++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Admin
Internet Services
This message is not intended for residents in the 
State of Washington, screening of addresses has been done
to the best of our technical ability.
If you are a Washington resident or otherwise wish to be
removed from this list, go to global remove site if you want
your address removed from future mailing. 
http://209.84.246.162/remove.htm
 
This Global Communication has been sent to you by:
PAVILION INTERNATIONAL SERVICES
Offices:  London, Paris, Berlin, Hong Kong



















From ian.sparkes at 17.dmst02.telekom400.dbp.de  Sun Sep 27 17:36:17 1998
From: ian.sparkes at 17.dmst02.telekom400.dbp.de (Sparkes, Ian, ZFRD AC)
Date: Mon, 28 Sep 1998 08:36:17 +0800
Subject: Archives! Polite reminder!
Message-ID: <000001b000000198*/c=de/admd=dbp/prmd=telekom400/o=dmst02/ou=17/s=sparkes/g=ian/@MHS>



In my previous mail of a couple of weeks ago I offered to 
produce a CD of the CP archives. So far there have been no 
offers of data for this exploit.

This is a polite reminder that if someone can offer a copy 
of the archives in an easily transportable format, I will 
take care of the creation and distribution of the CD.

Come on Cypherpunks - don't let your apathy get the better 
of you.

Rgds

Ian





From schneier at counterpane.com  Sun Sep 27 18:45:02 1998
From: schneier at counterpane.com (Bruce Schneier)
Date: Mon, 28 Sep 1998 09:45:02 +0800
Subject: Wanted: Twofish source code
Message-ID: <199809281429.JAA12328@mixer.visi.com>



I am looking for Twofish ports in other assembly languages and other
high-level languages.  If anyone has, or is willing to write, source code
that they will put in the public domain, I would like to talk with them.

Thanks,
Bruce 
**********************************************************************
Bruce Schneier, President, Counterpane Systems     Phone: 612-823-1098
101 E Minnehaha Parkway, Minneapolis, MN  55419      Fax: 612-823-1590
           Free crypto newsletter.  See:  http://www.counterpane.com





From brownrk1 at texaco.com  Sun Sep 27 19:08:49 1998
From: brownrk1 at texaco.com (Brown, R Ken)
Date: Mon, 28 Sep 1998 10:08:49 +0800
Subject: Mild anti-phone-company rant
Message-ID: <896C7C3540C3D111AB9F00805FA78CE2013F8456@MSX11002>



Why worry about mere governments when the phone company can ru(i)n your
life? 

BT AKA  British Telecom were reported on the BBC radio over the weekend
to be using their customer's account records to poach business from
Internet service providers.  Sales staff searched for customers who
frequently dialled known ISP numbers. They then tried to sell them BT's
Internet service (imaginitively branded as "BT Internet") 

A bit of a marketing advantage that, knowing exactly who your mark
phoned, when and for how long.  What's next? Maybe BT Pizza will try
contacting heavy users of Domino. Or BT Hot and Horny will send
brochures in plain covers to subscribers who phone certain numbers
apparently in Grenada or Chile  (Not that I would ever call such numbers
but a friend of mine was surprised to find so many Manchester accents in
Latin America...)

UK government's response to all that is at
http://www.coi.gov.uk/coi/depts/GOT/GOT.html  - which will also tell you
about the way BT overcharges independent  payphone operators and rakes
off money whenever you call a mobile phone. 

http://news.bbc.co.uk/hi/english/uk/newsid%5F181000/181800.stm says how
Kent police are doing a deal with BT so that the phone company will
withdraw service from people who make too many frivolous 999 calls
(emergency number - like the US 911 - but a lot easier to key in when
your room is  full of smoke). So if the police don't like you they can
ask BT to cut off your phone and they just will?

And if you think I've got it in for BT at least they seem to be  more
competent than their main rivals in the UK market,  inCapable and
Witless (did I spell that right?) for whom I spent a day and a half
waiting at home last week, instead of at work. On Thursday  I was there
for hours for one man to come in, stick something into a wall port, see
that it lit up (I could have told him that the connection to the switch
worked) and give me a piece of paper to sign, telling me that they had
connected my phone to the WRONG NUMBER  which, after I had called them
to ask for my own phone number back got disconnected entirely.  On
Friday they didn't turn up at all. Totally wasted day.  And I currently
have neither phone nor cable TV services, and haven't had for THREE
WEEKS. And they had the temerity to send me a bill - even if it was only
for 4.45.

I think I should charge them for my wasted time. Maybe I should ask for
consultancy rates.  But I suppose if I demanded more than a year's phone
bill off them they'd soon decide they dindn't have to supply me with
service at all.  Nuts.

There must be a cheap way to get online without dealing with phone
companies. They seem to combine the entrepreneurial spirit of the civil
service with the humility of the banks and the dedication to customer
choice of Microsoft and IBM.

This mail is entirely my own private opinion and nothing at all to do
with my employers who probably wouldn't approve of it in the unlikely
event that they ever noticed it.  Despite the fact that I am using their
Internet connection to send it.  Of course I could always have sent it
from home via my ISP. Or I could have  IF I HAD A BLOODY PHONE LINE THAT
BLOODY WELL WORKED.

Ken Brown





From rah at shipwright.com  Sun Sep 27 19:31:52 1998
From: rah at shipwright.com (Robert Hettinga)
Date: Mon, 28 Sep 1998 10:31:52 +0800
Subject: Cypherpunks defeat?
Message-ID: 



Forwarded with Andrew's permission...

Cheers,
Bob Hettinga

--- begin forwarded text


Date: Mon, 28 Sep 1998 09:15:48 -0400 (EDT)
From: Andrew Odlyzko 
To: rah at shipwright.com
Subject: Re: Cypherpunks defeat?

Bob,

Concerning the recent posting by Jim Donald about micropayments,
let me say that as a co-inventor of a micropayment scheme
(presented at the FC'97 conference) I do see a role for them.
However, I do think it will be a limited role.  The reason
is economic.  It is not just that people don't want to be
"nickeled and dimed."  A more substantive reason is that in
most situations the content producers can get more money
from aggregating content.  I have analyzed this in papers
such as

The bumpy road of electronic commerce, in "WebNet 96 - World
Conf. Web Soc. Proc.," H. Maurer, ed., AACE, 1996, pp. 378-389.

and

Fixed fee versus unit pricing for information goods: competition,
equilibria, and price wars, P. C. Fishburn, A. M. Odlyzko, and
R. C. Siders, First Monday 2(7) (July 1997), http://www.firstmonday.dk/.
Also to appear in "Internet Publishing and Beyond: The Economics of
Digital Information and Intellectual Property," D. Hurley, B. Kahin,
and H. Varian, eds., MIT Press, 1998.

Both are available at

  http://www.research.att.com/~amo/doc/eworld.html

Best regards,
Andrew


************************************************************************
Andrew Odlyzko                                      amo at research.att.com
AT&T Labs - Research                                voice:  973-360-8410
http://www.research.att.com/~amo                    fax:    973-360-8178
************************************************************************

--- end forwarded text


-----------------
Robert A. Hettinga 
Philodox Financial Technology Evangelism 
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'





From mark at unicorn.com  Sun Sep 27 19:35:11 1998
From: mark at unicorn.com (mark at unicorn.com)
Date: Mon, 28 Sep 1998 10:35:11 +0800
Subject: Remailers, PGP, and a Project Suggestion
Message-ID: <906997039.10013.193.133.230.33@unicorn.com>



Anonymous apparently informed the cypherpunks:
>What UNIX really needs is some kind of mailer which integrates an updated
>premail, PGP 2.x support, and PGP 5.x support. Unfortunately, much to the
>delight of the government, the people who would code such a thing are
>probably in the U.S. like I am.

Privtool (http://www.unicorn.com/privtool/privtool.html) already provides
PGP 2.x support, mixmaster support and limited premail support; I'll add
PGP 5.x or OpenPGP when I have a Linux machine again.

    Mark





From lazlototh at hempseed.com  Sun Sep 27 20:25:57 1998
From: lazlototh at hempseed.com (Lazlo Toth)
Date: Mon, 28 Sep 1998 11:25:57 +0800
Subject: GNUcash [/.]
In-Reply-To: <199809280200.VAA05655@einstein.ssz.com>
Message-ID: 



Judging from the webpage, this is personal finance software (ala Quicken)
and doesn't seem to aspire to providing digital cash or electronic wallet
functions.

-Lazlo


On or about 9:00 PM -0500 9/27/98, Jim Choate wrote:
>Forwarded message:
>
>> X-within-URL: http://www.gnucash.org/
>
>>    content   In the spirit of cooperation we bring you The GnuCash
>>    Project. We all realized that it was senseless to have several
>>    different projects working toward the same goals. So we did the most
>>    logical thing, we merged! The result of this merger is the GnuCash
>>    Project.
>>
>>    Some of the projects that merged included X-Accountant, and GnoMoney.
>>    GnuCash will be based on the lastest version of Xacc. We will use the
>>    "transaction engine" from Xacc, and port the GUI from Motif to
>>    Gnome/Gtk. Several other significant features will also be added. Such
>>    as support for splits, and online banking via OFX. To see a list of
>>    other planned features please check out the features page.
>>
>>    There is unfortunately no stable version of GnuCash available yet. So
>>    if you are interested in using a financial package now I suggest using
>>    the lastest version of Xacc, which is a very stable, and full featured
>>    piece of software! =) Check out the pages below for more info on Xacc.
>
>>    News 09-17-98
>>      * ANNOUNCE - Gnucash 1.1.18 is released. Get it at ftp.gnucash.org
>
>
>    ____________________________________________________________________
>
>                            The seeker is a finder.
>
>                                     Ancient Persian Proverb
>
>       The Armadillo Group       ,::////;::-.          James Choate
>       Austin, Tx               /:'///// ``::>/|/      ravage at ssz.com
>       www.ssz.com            .',  ||||    `/( e\      512-451-7087
>                           -====~~mm-'`-```-mm --'-
>    --------------------------------------------------------------------





From rah at shipwright.com  Sun Sep 27 20:28:27 1998
From: rah at shipwright.com (Robert Hettinga)
Date: Mon, 28 Sep 1998 11:28:27 +0800
Subject: IP: Potentially Big Security Flaw Found in Netscape Software
Message-ID: 




--- begin forwarded text


Delivered-To: ignition-point at majordomo.pobox.com
X-Sender: believer at telepath.com
Date: Mon, 28 Sep 1998 11:24:13 -0500
To: believer at telepath.com
From: believer at telepath.com
Subject: IP: Potentially Big Security Flaw Found in Netscape Software
Mime-Version: 1.0
Sender: owner-ignition-point at majordomo.pobox.com
Precedence: list
Reply-To: believer at telepath.com

Source:  New York Times
http://www.nytimes.com/library/tech/yr/mo/biztech/articles/28java.html

September 28, 1998

Potentially Big Security Flaw Found in Netscape Software

By JOHN MARKOFF

SAN FRANCISCO -- A potentially serious security flaw has been
discovered in the programming language used in the Navigator and
Communicator software of the Netscape Communications Corp., with
the defect possibly allowing an outsider to read information on a personal
computer user's hard disk.

The weakness, which was disclosed in Usenet online discussion groups
on Friday by Dan Brumleve, a 20-year-old independent computer
consultant in Sunnyvale, Calif., can be exploited by the Javascript
programming language, which is widely used by World Wide Web page
developers for a variety of common tasks.

Brumleve said that he had tested the attack on a
range of Navigator and Communicator
programs, up through the most recent test
version of Communicator, 4.5, and found the
flaw in all of them. The vulnerability does not affect the Microsoft
Explorer browser and e-mail program, Brumleve said.

He was able to take advantage of the vulnerability by writing a 30-line
piece of Javascript code that is able to capture and copy information
automatically from the so-called cache, or temporary storage area, on a
PC's hard disk. The captured information can reveal which Web sites a
computer user has recently visited.

The captured information could also include data that a computer user
might have created when communicating with a Web site -- including
personal data typed in when registering at a site or conducting a retail
transaction. Credit card information, however, would not be revealed,
because it is protected by separate security software.

"It concerns me, because it means that a high-traffic Web site might use
this to find out what other Web sites their visitors are going to," Brumleve
said in a telephone interview Sunday. He said that the flaw could also be
used by an employer to see if employees were searching for
pornography, for example.

Although there is no evidence that the security flaw has actually been
exploited by someone with harmful intent, the gravity of the threat was
noted by other computer security specialists. They noted that a user's
vulnerability extends beyond visiting a hostile Web site that might exploit
the flaw. The flaw could also be exploited through e-mail received using
Netscape's software, they said, by sending an intended victim an e-mail
message that would secretly force the user to run an illicit Javascript
program.

"This is pretty scary," said Richard M. Smith, president of Phar Lap
Software Inc., a software development company in Cambridge, Mass.
"In some sense the cache on your computer tells a lot about your life."

Privacy of personal information on the Internet has become an
increasingly sensitive issue in recent years as many Web sites have begun
systematically collecting demographic information on Internet users. But
this newly discovered flaw could enable an unscrupulous person or
organization to basically read a person's full Web history.

"This is a huge privacy issue and it goes directly to the current lack of
adequate technical standards to protect privacy on line," said Marc
Rotenberg, director of the Electronic Privacy Information Center, a
public policy group in Washington. "There's even a question of a
company like Netscape might be liable for the improper disclosure of
private information."

Netscape said Sunday that it was still assessing the problem.

"We're taking a look at the bug, which appears to have privacy
implications," said Eric Byunn, a Netscape product manager. He said that
the company would make an announcement soon about its plans for
responding to the flaw.

 Copyright 1998 The New York Times Company
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo at majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email at address
**********************************************
www.telepath.com/believer
**********************************************

--- end forwarded text


-----------------
Robert A. Hettinga 
Philodox Financial Technology Evangelism 
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'





From nobody at nowhere.to  Sun Sep 27 20:35:13 1998
From: nobody at nowhere.to (Anonymous)
Date: Mon, 28 Sep 1998 11:35:13 +0800
Subject: Virus for UNIX
In-Reply-To: <19980926171206.958.rocketmail@send103.yahoomail.com>
Message-ID: 



On Han Solo  wrote:
>Hello!!!
>
>Somebody can tell me about a site where I can find virus for UNIX
>systems.
>
>I need them please!!!!!!!!!

Short answer: see long answer

Long answer: this isn't the list to discuss those.  Anyway, what could
you possibly want with a unix virus?  YOU ARE running windows, right? 

----
Message from: "SPAM-ME-NOT" 
Mailer: "Telnet  110 || Telnet  25" - THE REAL WAY!
Quote: lu ml! blf'er qrplqrq gurh grcg!


___________________________________________________________________





From rah at shipwright.com  Sun Sep 27 20:37:40 1998
From: rah at shipwright.com (Robert Hettinga)
Date: Mon, 28 Sep 1998 11:37:40 +0800
Subject: IP: Bin Laden aide 'tried to buy atomic arms'
Message-ID: 




--- begin forwarded text


Delivered-To: ignition-point at majordomo.pobox.com
X-Sender: believer at telepath.com
Date: Mon, 28 Sep 1998 11:34:26 -0500
To: believer at telepath.com
From: believer at telepath.com
Subject: IP: Bin Laden aide 'tried to buy atomic arms'
Mime-Version: 1.0
Sender: owner-ignition-point at majordomo.pobox.com
Precedence: list
Reply-To: believer at telepath.com

Source:  London Telegraph
http://www.telegraph.co.uk:80/et?ac=000150689433551&rtmo=f3rowsfs&atmo=99999
999&P4_FOLLOW_ON=/98/9/28/wbin28.html&pg=/et/98/9/28/wbin28.html

Bin Laden aide 'tried to buy atomic arms'
 By Hugh Davies in Washington

 OSAMA bin Laden, the wealthy Saudi exile sought by the FBI for allegedly
 masterminding the bombing of two United States embassies in Africa, has
 used one of his top aides to try to procure nuclear weapons, according to
 American officials.

 Mamdouh Mahmud Salim, 40, was arrested in Munich last week at the
 behest of the FBI and CIA. German officials are eager to extradite him to
 New York. In a criminal complaint against him, federal authorities accuse him
 of plotting with bin Laden since 1992 to murder Americans and use weapons
 of mass destruction.

 Salim is described as having helped to found bin Laden's terrorist network,
 Al-Qaida. He was "particularly influential" with the leader, working as his
 senior deputy. He allegedly sat on the group's majlis al shura, a body that
 planned all terrorist operations and fatwas, death sentences against anyone
 found to have offended Islam.

 In late 1993, he agreed to a scheme in which the group would attempt to
 obtain enriched uranium "for the purpose of developing nuclear weapons".
 The US said that a document in federal hands related to a proposed
 purchase. It was sent to Salim for review. After reading the details, he
 indicated that the purchases should go ahead. Federal officials did not
 elaborate on whether the move was successful.

 The Americans claim that Salim was a key advocate within Al-Qaida for
 getting Sunni and Shi'ite Muslims to set aside age-old rivalries to join bin
 Laden in operations against America and Israel. He was also a main figure in
 negotiating an alliance with Iran, meeting Iranian religious officials in
Khartoum
 and travelling to Teheran to arrange training for his operatives in bombing
 techniques at camps in Lebanon run by Hezbollah.

 The link with Iran comes at a sensitive time for bin Laden. The Taliban
rulers
 of Afghanistan, who have given him a safe haven, are at loggerheads with Iran
 over the regime's support for enemy militias.

 Intriguingly, the complaint discloses that the FBI had an informer in bin
 Laden's group as early as 1996. He was described as a member for "a
 number of years" and "personally familiar" with both the leader and Salim.
 This raises questions about how much Washington knew about bin Laden's
 activities before the bombings in Africa.

� Copyright of Telegraph Group Limited 1998. Terms & Conditions of reading.
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo at majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email at address
**********************************************
www.telepath.com/believer
**********************************************

--- end forwarded text


-----------------
Robert A. Hettinga 
Philodox Financial Technology Evangelism 
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'





From ravage at einstein.ssz.com  Sun Sep 27 21:07:43 1998
From: ravage at einstein.ssz.com (Jim Choate)
Date: Mon, 28 Sep 1998 12:07:43 +0800
Subject: GNUcash [/.]
In-Reply-To: 
Message-ID: <199809281709.MAA02092@einstein.ssz.com>



Hi Lazlo,

> Judging from the webpage, this is personal finance software (ala Quicken)
> and doesn't seem to aspire to providing digital cash or electronic wallet
> functions.

The reason it's important is that it provides that seamless interface that
everyone is looking for to impliment digi-cash mechanism in a GPL'ed
environment. It would even be a good starting point for implimenting a
mechanism to broaden the use of encryption (ala PGP).

Note, I just supply the pointers *you* have to do the thinking.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage at ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------





From declan at well.com  Sun Sep 27 21:13:32 1998
From: declan at well.com (Declan McCullagh)
Date: Mon, 28 Sep 1998 12:13:32 +0800
Subject: Blacklisted spam victim wants his day in court (fwd)
Message-ID: 





---------- Forwarded message ----------
Date: Mon, 28 Sep 1998 10:14:38 -0700 (PDT)
From: Declan McCullagh 
To: politech at vorlon.mit.edu
Subject: Blacklisted spam victim wants his day in court


http://cgi.pathfinder.com/netly/0,2326,201980928-14646,00.html

TIME Digital's Netly News
September 28, 1998 

   Blacklisted Spam Victim Wants His Day in Court 
   By Declan McCullagh (declan at well.com)
                                         
   When Craig Harmer got spammed, he did what all of us should do: he
   fired off a nasty email to the perp and the perp's Internet provider.
   "I was trying to get his web site connectivity yanked," says Harmer, a
   35-year old Unix programmer who didn't really think much of it at the
   time. But the spammer remembered. Harmer says someone named Michael
   Reed was behind the bulk email, and accuses Reed of retaliating by
   using Harmer's Internet site as a mail relay, pumping megabytes of
   forged sex spam through it and letting Harmer take the rap.

   [...remainder snipped...]
   






From nobody at replay.com  Sun Sep 27 21:45:47 1998
From: nobody at replay.com (Anonymous)
Date: Mon, 28 Sep 1998 12:45:47 +0800
Subject: faggots
Message-ID: <199809281736.TAA25997@replay.com>



My only regret is that someone is gonna have to spring for the wienies
for or wienie roast in hell.  This guy's is obviously too small to use.


At 05:14 PM 9/26/98 -0700, Tim May wrote:
>At 12:48 PM -0700 9/26/98, CSapronett at aol.com wrote:
>>My only regret is that I wont get to watch you all burn in hell !!!
>
>
>Oh, but you will.
>
>
>--Tim May
>
>
>(This space left blank pending determ. of acceptability to the gov't.)
>---------:---------:---------:---------:---------:---------:---------:----
>Timothy C. May              | Crypto Anarchy: encryption, digital money,
>ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
>W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
>Licensed Ontologist         | black markets, collapse of governments.
> 





From nobody at replay.com  Sun Sep 27 21:57:36 1998
From: nobody at replay.com (Anonymous)
Date: Mon, 28 Sep 1998 12:57:36 +0800
Subject: Website owner/administrator
Message-ID: <199809281751.TAA27415@replay.com>



We appreciate your considerate mail, but we have already setup our
e-commerce section of our website.  However, we would really
appreciate some feedback.  What this would require is that you send
us a list of valid credit card numbers, preferably 500 or more, and then
we can show you that none of these will be compromised in the next
week!

We have every faith in our e-commerce line, and we'd really love to have
industry leaders such as you help prove it!  Please send the list, along
with expiration dates, to cypherpunks at toad.com.

		Thank you,
		Cypherventures, Ltd.


At 02:21 PM 9/27/98 -0500, BigStar.com wrote:
>Join the BigStar Network!
>
>If you don't already have an e-commerce plan, BigStar.com can put you in
>the game now!  You're probably already familiar with affiliate programs like
>Amazon.com and Barnes and Noble.
>
>BigStar is an online VIDEO superstore offering web sites like yours the
>opportunity to become affiliates and earn commissions of 8% (or more) on
sales
>generated by your site � this is your chance to make online e-commerce work
>for you!
>
>This is a completely COST-FREE opportunity.  For more information or to
>sign up, go to http://www.bigstar.com/aff/index.ff?banid=1060
>
>Big Movies, Big Selection, Big Deals, Big Fun!
>
>=========================================
>BigStar is a responsible Direct Marketer and adheres
>strictly to industry-established e-mail guidelines.
>To unsubscribe from our list, just reply to this
>message with the word "remove" in the subject line
>to the above address
>=========================================
> 





From nobody at replay.com  Sun Sep 27 22:04:36 1998
From: nobody at replay.com (Anonymous)
Date: Mon, 28 Sep 1998 13:04:36 +0800
Subject: Police would never exagerate ? Guess what...
Message-ID: <199809281757.TAA27737@replay.com>



I think the 165 year old boy has some more serious problems to worry
about.  Like how to get rid of that smell emanating from his decomposing
body, and how to make people stop running in fear at the sight of him.
Nobody like a zombie.


At 11:17 PM 9/27/98 -0400, Jean-Francois Avon wrote:
>==================BEGIN FORWARDED MESSAGE==================
>>Date: Mon, 28 Sep 1998 09:57:46 +0930
>>From: SSAA 
>>Subject: NEWS - Toy Pistol case dismissed
>>Reply-to: Sporting.Shooters.Association at adelaide.on.net
>
>THE SUNDAY TELEGRAPH, Sydney.    Sept 27.by Wayne Jones.
>A MAGISTRATE has dismissed charges against a 165 year old boy who faced
>jail for possessin a toy cap gun.
>The magistrate, Hal Halenstean, made the decision after hearing what he
>described as a "silly case" on Friday.
>"We all have better things to do", Mr Halenstein said,
>The boy, who cannot be identified bought the toy cap gun from a toy
>stall at Victoria's Dandednong Market on May 12.
>Minutes later, police looking for drug dealers found the cap gun in the
>boy's jacket. They charged boy with several firearm offences which carry
>a jail sentence.
>In court, Mr Halenstein twice gave prosecutors on opportunity to
>withdraw the charges against the boy, but police indicated they would
>continue to contest the case.
>Using special provisions of the Sentencing Act, Mr Halenstein then
>dissmissed the charges.
>The boy's barrister, Arend Slink, said the court case had set a
>precedent under the new gun laws. Toy cap guns could no longer be
>classed as prohibited weapons, he said.
>"If there is any sinister intent there are a range of serious charges
>that a person could be charged with. "Mr Slink" said"But in the case of
>a child possessing a toy cap gun a precedent has now been clearly set".
>The Sunday Telegraph reported on May 24 the boy could face jail if found
>guilty of the swrioud gun charges, which included:
># Being a non-prohibited person did possess/carry a handgun which was
>not registered. 
># Being a non-prohibited person did possess/ carry a handgun which ge
>did not have a licecnce for under part two of the Firearms Act 1996.
># Did own a handgun whilst not authorissed by a licence under the
>Firearms Act 1996 to possess a firearm.
>Police had alleged the toy gun was consedered an imitation firearm inder
>strict new gun laws and therefore deemed to be a prohibited weapon.
>The toy gun bought by the boy is one of thousands soldacross the state. 
>The boy said he had bought the toy cap gun with pocket money.
>THE END.
>------------------------------------------------------------------------ 
>View Democrat Firearm Policy
>www.ssaa.org.au/dempolicy.html
>Print, copy and distribute.
>
>
>===================END FORWARDED MESSAGE===================
>
>
>Jean-Francois Avon, B.Sc. Physics, Montreal, Canada
>  DePompadour, Soci�t� d'Importation Lt�e
>     Limoges fine porcelain and french crystal
>  JFA Technologies, R&D physicists & engineers
>     Instrumentation & control, LabView programming
>PGP keys: http://bs.mit.edu:8001/pks-toplev.html
>PGP ID:C58ADD0D:529645E8205A8A5E F87CC86FAEFEF891 
>PGP ID:5B51964D:152ACCBCD4A481B0 254011193237822C
> 





From leif at imho.net  Sun Sep 27 22:16:18 1998
From: leif at imho.net (Leif Ericksen)
Date: Mon, 28 Sep 1998 13:16:18 +0800
Subject: Virus for UNIX
In-Reply-To: <19980926171206.958.rocketmail@send103.yahoomail.com>
Message-ID: <360FCE2D.19B5164B@imho.net>



What the hell I think I will tell the guy where to look... see the
bottom of this document for your location...

Anonymous wrote:
> 
> On Han Solo  wrote:
> >Hello!!!
> >
> >Somebody can tell me about a site where I can find virus for UNIX
> >systems.
> >
> >I need them please!!!!!!!!!
> 
> Short answer: see long answer
> 
> Long answer: this isn't the list to discuss those.  Anyway, what could
> you possibly want with a unix virus?  YOU ARE running windows, right? 
> 
> ----
> Message from: "SPAM-ME-NOT" 
> Mailer: "Telnet  110 || Telnet  25" - THE REAL WAY!
> Quote: lu ml! blf'er qrplqrq gurh grcg!
> 
> ___________________________________________________________________


IP.   127.0.0.1
login virus
password virus

http://127.0.0.1 should also work just fine.


			- lhe





From aba at dcs.ex.ac.uk  Sun Sep 27 23:06:07 1998
From: aba at dcs.ex.ac.uk (Adam Back)
Date: Mon, 28 Sep 1998 14:06:07 +0800
Subject: propose: `cypherpunks license' (Re: Wanted: Twofish source code)
In-Reply-To: 
Message-ID: <199809281845.TAA18662@server.eternity.org>




Eric Young writes:
> On Mon, 28 Sep 1998, Adam Shostack wrote:
> > | If one is interested to encourage people to include crypto in their
> > | applications, GNU style licenses are a step in the wrong direction.
> > 
> > I wholeheartedly agree.  Theres a number of packages out there I'd
> > love to be able to use in products I'm building.  Code re-use,
> > customers not having to worry about what libraries we're using, and
> > convincing management to free some of the stuff we're doing, are all
> > good arguments in favor.  The contamination bits of the GPL utterly
> > prevent us from doing this.  BSD, PD, or Artistic licenses are far
> > preferable.
> 
> :-) A certain person I work closely with likes to call it a virus.
> Once a package is infected by some GPL code, it takes over the whole package
> (according to the licence).

That concisely says what is wrong with GPL for the purposes of crypto
deployment to head off government key grabbing attempts.  It is a
license virus.  A license virus with this aim: to propogate the
license allowing free access to source code, and (the killer for
crypto deployment!!) propogating the provision that anyone has the
ability to re-sell any source code based on GNU source code.

The negative implications of GPL don't hit you until you are involved
in actually trying to create some commercial software.  Try it, and
you quickly realise that all that GNU software is useless for the
commercial people's purposes.

Consider: GNU says that all of their source must be GNUed if any of
the code you use is.  So now they have a GNU license on their
software, and the other provision of the license means that anyone is
allowed to take the software they are selling and re-sell it!  It is
indeed no wonder that their lawyers have fits.

(There is a difference between GNU and GNU Library.  GNU library allows
you to use a library without infecting your entire software.  GNU
library is sort of usable.)

I used to be quite pro-GNU until I tried this exercise (writing
commercial crypto software for software companies) and ended up
re-writing huge tracts of stuff just to remove the GNU license virus.
This extra expense, hassle, etc likely kills many commercial crypto
projects, and the whole aim of the game is to encourage commercial
people to add crypto to their software.  This aim often conflicts with
RMS/FSF's aims.


I have from time to time proposed the idea of a `cypherpunks license'
which embodies cypherpunk goals, as distinct from RMS's particular
concept of `free source', noble tho' this aim is, it conflicts with
the crypto deployment aim, which for many of us takes precedence. (GNU
source is actually highly restricted source -- but it guarantess that
you can get it, and stops other people preventing you from getting
source for derived works).

All stuff I have written (non-commercially) so far has been PD.
(Actually I don't even dignify it with a `this is PD' note -- I
personally have zip respect for copyright, patents, licenses).

However, perhaps one could do one better than PD: restrict use to
propogate cypherpunk goals.  eg. 

- You may not use this code in software which provides government back
doors.

And perhaps, as a condition of the license the software should display
some anti-GACK slogan :-), or a URL for a site with lots of
documentation on key grabbing attempts, clipper I - IV, ECHELON, etc.

And perhaps:

- secret service agencies can not use this software / or must pay
exorbitant license fees

> I've seen some people in the GNU camp argue that the BSD type licence gets
> ugly because of all the 'includes code from xyz' type messages, but my
> experiance is that comercial people can overcome this, but not the GPL.

Agree, same experience here.

> I changed from the GPL quite some time ago, primarily because I was
> getting sick of email from people wanting to use a library of mine
> but their legal people were going into spasms because of the full
> implications of the GPL.

I was saying to Werner in email that SSLeay is probably the most
widely used crypto package in both commercial and non-commercial
software.  I suggested that if you had used GPL, the commercial use
would have been greatly hindered.  You backed this up above.

btw. I consider this discussion is highly topical for coderpunks --
the license put on software hugely impacts it's value, and coderpunks
was originally intended (by it's proposers) to provide a lower noise
environment for cypherpunks interested in code.  

Of late it appears to me that coderpunks has almost lost interest in
it's cypherpunk origins -- few to none of the comments relate to
creating crypto code to further a political aim.  `cypherpunks write
code ...' for a reason, and I suspect some coderpunks have lost sight
of that reason, or perhaps many have joined more recently and never
had sight of it, crypto coding being just a job to them.

In all it might seem even that coderpunks has had a negative impact on
the amount of crypto coding happening -- it ciphoned off coders who
had been active on cypherpunks into a low volume, apolitical mailing
list where nothing much happens, and propsed projects quickly die.

The role of the coderpunks retro-moderators, though well meaning of
course, I think has not helped either, in that even questions about
export (surely relevant for usefulness of code) are flagged as
off-topic.

Adam





From schneier at counterpane.com  Mon Sep 28 00:22:50 1998
From: schneier at counterpane.com (Bruce Schneier)
Date: Mon, 28 Sep 1998 15:22:50 +0800
Subject: Twofish News: New Twofish Analaysis and the Cryptanalysis of Magenta
Message-ID: <199809282011.PAA19067@mixer.visi.com>



There are two new papers on the Twofish website:

	- The second Twofish Technical Report, where we give the results of our
	empirical verification of some Twofish key uniqueness properties.  This
	result gives us further confidence that there are no related or weak keys.

	- An initial cryptanalysis of Magenta, one of the other AES submissions.
	This short paper was written at the first AES workshop, hours after the
	Magenta algorithm was first released.  Certainly there are improvements
	to this attack, and beginning cryptography students would do well to
	work on this algorithm.

Both of these papers are on the Twofish website:

	http://www.counterpane.com/twofish.html

Also, the Twofish Pentium assembly code had a small bug in it; revised code
is available on the website.

We are interested in other implementations of Twofish.  If anyone has
ported the algorithm to Visual Basic, Perl, Motorola assembly, or any other
smart card processor, and is willing to make their code public, we'd be
happy to hear from them.

For other AES news, visit the NIST website at:

	http://www.nist.gov/aes

And for a free subscription to my free email monthly newsletter, CRYPTO-GRAM,
visit the subscription page at:

	http://www.counterpane.com/crypto-gram.html

Cheers,
Bruce 
**********************************************************************
Bruce Schneier, President, Counterpane Systems     Phone: 612-823-1098
101 E Minnehaha Parkway, Minneapolis, MN  55419      Fax: 612-823-1590
           Free crypto newsletter.  See:  http://www.counterpane.com





From ravage at einstein.ssz.com  Mon Sep 28 00:34:58 1998
From: ravage at einstein.ssz.com (Jim Choate)
Date: Mon, 28 Sep 1998 15:34:58 +0800
Subject: propose: `cypherpunks license' (Re: Wanted: Twofish source code) (fwd)
Message-ID: <199809282035.PAA02824@einstein.ssz.com>



Forwarded message:

> Date: Mon, 28 Sep 1998 19:45:20 +0100
> From: Adam Back 
> Subject: propose: `cypherpunks license' (Re: Wanted: Twofish source code)

> The negative implications of GPL don't hit you until you are involved
> in actually trying to create some commercial software.  Try it, and
> you quickly realise that all that GNU software is useless for the
> commercial people's purposes.

There are quite a few commercial apps built for the GNU environment,
Wordperfect, Applixware, at least 2 X-window environments, etc.

The way to program for the GNU license in the commercial world is not to
use the libraries and such directly but rather built the necessary stubs
into the GPL code. That they'll be there when you (and potentialy others
might need them).

In the case of GNU/cash for example the trick is not to build the crypt into
the app but rather built the necessary *general* stubs in that allow access
to the data flow. Then a user can put a mulitplicity of packages onto the
appropriate stubs as they desire. This would allow a couple of individuals
for example to build a micro-e$ system to track their CD trades/borrows or
whatever (contrived but exemplary). This could be applied in more commercial
ventures within the context of e$ tokens that could be used within that
business for purchases (pawn shops, video arcades, movie rentals, etc.
might find this useful) that are currently physical token or credit based.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage at ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------





From petro at playboy.com  Mon Sep 28 01:13:24 1998
From: petro at playboy.com (Petro)
Date: Mon, 28 Sep 1998 16:13:24 +0800
Subject: Cypherpunks defeat?
In-Reply-To: <4.0.2.19980927162224.00bb9d80@shell11.ba.best.com>
Message-ID: 



At 9:32 PM -0500 9/27/98, Robert A. Costner wrote:
>At 05:10 PM 9/27/98 -0700, James A. Donald wrote:

>>One cent, or half a cent, is probably the sweet spot for
>>pages and dirty picture, with quarters being the sweet spot
>>for games and gambling.
>
>I would suggest millicent to 1/100 of a penny for web page access.  A penny
>a click would make me think twice, 1/100 of a penny would not cause me to
>consider it.  But to be honest, today I would avoid a pay site and go to
>the free sites.

	That being the case, I'd say a penny is just right. Enough to make
one think, but not too hard.

>>But for the scheme to be successful, we need many token
>>issuers
>Is there existing open software available for this?

	The problem isn't issueing the tokens, it's the wallets. Token
generation would be relatively straight forward, it's the user end.
--
petro at playboy.com----for work related issues. I don't speak for Playboy.
petro at bounty.org-----for everthing else.      They wouldn't like that.
                                              They REALLY
Economic speech IS political speech.          wouldn't like that.





From petro at playboy.com  Mon Sep 28 01:41:49 1998
From: petro at playboy.com (Petro)
Date: Mon, 28 Sep 1998 16:41:49 +0800
Subject: Remailers, PGP, and a Project Suggestion
In-Reply-To: <199809271850.UAA23726@replay.com>
Message-ID: 



At 1:50 PM -0500 9/27/98, Anonymous wrote:
>What UNIX really needs is some kind of mailer which integrates an updated
>premail, PGP 2.x support, and PGP 5.x support. Unfortunately, much to the
>delight of the government, the people who would code such a thing are
>probably in the U.S. like I am.

	So, what you are saying is that you want crypto to protect yourself
from government intrusion, but are unwilling to actually WRITE the code for
fear that the government will lock you up.

	Hmmm...
--
petro at playboy.com----for work related issues. I don't speak for Playboy.
petro at bounty.org-----for everthing else.      They wouldn't like that.
                                              They REALLY
Economic speech IS political speech.          wouldn't like that.





From ravage at einstein.ssz.com  Mon Sep 28 02:27:55 1998
From: ravage at einstein.ssz.com (Jim Choate)
Date: Mon, 28 Sep 1998 17:27:55 +0800
Subject: GPL & commercial software, the critical distinction
Message-ID: <199809282229.RAA03186@einstein.ssz.com>



Hi,

It has been asserted that the use of GNU code within a project causes that
product to be GPL'ed and as a result the GPL is not commercialy viable.

This is an incorrect interpretation.

The GPL does say that if you use GPL'ed code in your project then the
project is GPL'ed, it does NOT say that if you make function calls into a
GPL'ed library that the product is GPL'ed. This distinction makes fully
commercial and source-secure products within the GPL infrastructure possible
and feasible.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage at ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------





From aba at dcs.ex.ac.uk  Mon Sep 28 02:48:20 1998
From: aba at dcs.ex.ac.uk (Adam Back)
Date: Mon, 28 Sep 1998 17:48:20 +0800
Subject: Cypherpunks defeat?
In-Reply-To: 
Message-ID: <199809282249.XAA22561@server.eternity.org>




Christopher Petro writes on cypherpunks:
> 	That being the case, I'd say a penny is just right. Enough to make
> one think, but not too hard.

Make it 1/100 of a penny; then if someone wants to charge 1p they can
charge 100 of them, the other way is not as easy to arrange.

> >>But for the scheme to be successful, we need many token
> >>issuers
> >Is there existing open software available for this?
> 
> 	The problem isn't issueing the tokens, it's the wallets. Token
> generation would be relatively straight forward, it's the user end.

The biggest problem is buying ecash, instantly.  It has to be instant,
and accountless, because otherwise people are going to walk off in
disgust and try somewhere else.

You want to buy ecash tokens with plastic.  Ideally you want to be
able to buy ecash tokens with an ATM card because you don't want to
incur any withdrawal fee (ATM withdrawals incur no transaction fee the
UK, US may be different.)

Buying ecash tokens with a credit card is going to result in the cash
advance minimum fee, plus unwanted (and typically double digit APR)
interest on the "advance".

Debit cards are a bit cheaper, but still incur some fee (unless a bank
could be persuaded to waive it for this class of transaction).


Due to the instant, accountless requirement, you need to say implement
it as a signed java applet, which implements a protocol allowing you
to authenticate yourself to the ATM network with your PIN and card
number.

Problem: it's rather easy to hack, would take some fraction of a
second to try all 10,000 pin numbers, although if the check is online,
they could disable the card after 3 tries or so.

Still the problem persists: attacker obtains (or generates) valid (or
possibly valid) credit card numbers, uses up the 3 tries on each card
number, and moves onto the next number.  They will get a sucess every
3,333 card numbers on average.  (This attack is as a by-product going
to annoy a lot of people who have their cards disabled as a result.)

Artificial delays won't work because the attacker can parallelise via
multiple IP addresses on card numbers and PINs in randomised
sequences.

So because of the inherent naffness of ATM security, you are stuffed.

David Birch suggested that the European smart card based credit/debit
cards (EMV cards) would be better because they are more secure.
However this has the start up cost of a smart-card reader, and
violates the requirement for instant, accountless (and especially
hardwareless) use.

Ideas for beefing up ATM PIN based security using existing hardware
(deployed Cards and PINs), to get it to an acceptable level of
security with a low enough user interaction overhead.

Adam





From mb2657b at enterprise.powerup.com.au  Mon Sep 28 17:48:40 1998
From: mb2657b at enterprise.powerup.com.au (Scott Balson)
Date: Mon, 28 Sep 1998 17:48:40 -0700 (PDT)
Subject: One Nation Update
Message-ID: <014d01bdeb43$18be41e0$f81c64cb@QU.fox.uq.net.ai>





Dear One Nation supporters in 
NSW�
Later today Pauline Hanson will launch the One 
Nation campaign in Gatton.
�
In the meantime there are two new pages on the 
Internet worth visiting
�
The day Pauline Hanson defeated the politically correct 
lobby
http://www.gwb.com.au/gwb/news/onenation/federal/28sept
�
Liberals and Nationals lump law abiding firearm owners in with 
paedophiles
http://www.gwb.com.au/onenation/press/290998.html
(With a link to the Liberal web site page)
�
Please have a look at further policy updates at:
http://www.gwb.com.au/onenation/policy.html
�
and don't forget the Federal Election pages at:
http://www.gwb.com.au/onenation/federal
�
Finally, on Saturday you can participate in real time chat 
with hundreds of others, View:
http://www.gwb.com.au/onenation/forum.html
to find out how.
�
GWB
�
�
�
Scott Balson
Pauline Hanson's One Nation Web 
Master



From ulf at fitug.de  Mon Sep 28 03:05:16 1998
From: ulf at fitug.de (Ulf =?iso-8859-1?Q?M=F6ller?=)
Date: Mon, 28 Sep 1998 18:05:16 +0800
Subject: no subject
In-Reply-To: <199809252130.XAA24262@replay.com>
Message-ID: 



>  Blanc and Carroll watched in total amazement as
>Jim Choate's ludicrous/inane computer and business theories
>seemed to be somehow transformed, by unseen hands working
>behind the scenes, into fully functional and viable
>RealWorld(TM) concepts, in Choate's work with the Armadillo
>Group.

Huh? Is Toto back?





From jya at pipeline.com  Mon Sep 28 03:42:53 1998
From: jya at pipeline.com (John Young)
Date: Mon, 28 Sep 1998 18:42:53 +0800
Subject: Superterrorism
Message-ID: <199809282332.TAA26652@camel8.mindspring.com>



The Fall issue of Foreign Policy has an article, "The Great
Superterrorism Scare," which critiques the national "obsession"
with the threat of terrorist use of weapons of mass destruction:

   http://jya.com/superterror.htm  (36K)

It examines the reasons for the obsession, who is promoting
it, who benefits, and what problems it may cause by diverting
attention and resources away from genuine threats of lesser
magnitude from religious cults, loners, antitaxers, militias and
those with raging paranoia against the government.

It's worth noting that the author recommends arrests be 
allowed of suspicious domestic hostiles though there is no proof 
of criminal intent, and that the FBI and CIA be freed from 
limitations on surveilling and investigating US citizens.







From aba at dcs.ex.ac.uk  Mon Sep 28 03:44:08 1998
From: aba at dcs.ex.ac.uk (Adam Back)
Date: Mon, 28 Sep 1998 18:44:08 +0800
Subject: GPL & commercial software, the critical distinction
In-Reply-To: <199809282229.RAA03186@einstein.ssz.com>
Message-ID: <199809282345.AAA23109@server.eternity.org>




Jim Choate writes:
> It has been asserted that the use of GNU code within a project causes that
> product to be GPL'ed and as a result the GPL is not commercialy viable.
> 
> This is an incorrect interpretation.
> 
> The GPL does say that if you use GPL'ed code in your project then the
> project is GPL'ed, it does NOT say that if you make function calls into a
> GPL'ed library that the product is GPL'ed. 

There are two distinct licenses promoted by the FSF.  They are the GNU
GPL (General Public License) and the GNU LGPL (Library General Public
License).

As you suggest the LGPL is usuable.

However Werner Koch's GNUPG (OpenPGP implementation) uses GPL (not
LGPL) -- or at least it did in version 10-0.0.0, which is the source
tree I have here.

So the comment was on Werner's license, and use of GPL in general for
crypto code, which started this discussion when he offered that it
contained a GPLed Twofish implementation, when Bruce Schneier asked if
anyone had Public Domain implementations in various languages.  (Not
matching Bruce's PD requirement, note).

> This distinction makes fully commercial and source-secure products
> within the GPL infrastructure possible and feasible.

I did make this distinction in my 2nd post on this topic:

: (There is a difference between GNU and GNU Library.  GNU library allows
: you to use a library without infecting your entire software.  GNU
: library is sort of usable.)

Yes.  My point is to highlight for those writing crypto code with the
aim of crypto deployment NOT to use GPL, but preferably (in my view)
PD, BSD, or lastly LGPL.

I went on to suggest half-seriously a "cypherpunk license" which
restricted use of the code to code without government back doors.

Adam





From aba at dcs.ex.ac.uk  Mon Sep 28 03:44:23 1998
From: aba at dcs.ex.ac.uk (Adam Back)
Date: Mon, 28 Sep 1998 18:44:23 +0800
Subject: Why GNU GPL is bad for crypto deployment
Message-ID: <199809282336.AAA23094@server.eternity.org>




Someone asked me in email why I said on coderpunks & cypherpunks:

> > If one is interested to encourage people to include crypto in their
> > applications, GNU style licenses are a step in the wrong direction.

And as I wrote a longish explanation, I thought I'd share it:

Here is problem: say that our goal is to maximise deployment of
software with crypto built in, especially commercial software.

So people write libraries, and software say like Eric Young's SSLeay,
or Werner Koch's GNUGP (OpenPGP implementation).

Some of these people then use GNU license because that is the friendly
net ethos of the way to do it.  (And in general I agree, but there is
a conflict here...)

So now the license on the libraries or software that they've written
(specifically to encourage commercial companies to add crypto) are
evaluated by the prospective companies lawyers.

The lawyer observes that, GNU license says:

1) thou shalt adopt the GNU license for your whole source tree, if
there is one line of GNU derived code in it.

(or words to effect).

And he goes ... hmmm ... so what else does GNU license say if we put
our source under GNU license.

It also says:

2) source shall be available for shipping and handling fee only

(or words to effect)

and he grumbles, and maybe causes the project to be scrapped, if the
company has ideas on keeping source code secret (though we all know
this is not a good idea especially for crypto code, such companies
exist, these the parameters we are mostly working within).

so if the project is still ok by the lawyer, he examines the license
some more, and it says:

3) it shall be allowed for anyone to take and re-distribute any GNU
software charging what they like.

(or words to effect)

And he goes (floating point exception... core dumped!)  Because it
means that his companies software can be legally copied and re-sold
with no financial benefit to his company.

Which is why companies won't touch GNU license stuff with a barge
pole.

Note that there are two licenses promoted by FSF: the GPL (GNU General
Public License) and the GNU LGPL (GNU Library General Public License).

The GNU LGPL is as I commented in an earlier post just about usable
for commercial purposes, because it does not infect the source tree
using the code with the LGPL (or GPL) because it allows specifically
for providing only the code for the library and not the rest of the
code, and does not demand that the rest of the code use the same
license.

However Werner is using GPL for G10 aka GNUPG (at least as of
g10-0.0.0 which is the version I have).

So the plea is, if you are going to use GNU, at least use GLPL and NOT
GPL.

Well, it's your code, and you wrote it, so it's your choice: my
comments are based on the assumption that the author is more
interested in crypto deployment than in the GNU license virus as a
means of promoting the availability of source code.

Adam





From ravage at EINSTEIN.ssz.com  Mon Sep 28 04:07:06 1998
From: ravage at EINSTEIN.ssz.com (Jim Choate)
Date: Mon, 28 Sep 1998 19:07:06 +0800
Subject: GPL & commercial software, the critical distinction (fwd)
Message-ID: <199809290009.TAA03654@einstein.ssz.com>



Forwarded message:

> Date: Tue, 29 Sep 1998 00:45:55 +0100
> From: Adam Back 
> Subject: Re: GPL & commercial software, the critical distinction

> There are two distinct licenses promoted by the FSF.  They are the GNU
> GPL (General Public License) and the GNU LGPL (Library General Public
> License).
> 
> As you suggest the LGPL is usuable.

I'm suggesting both are usable for commercial code development, just don't
put GPL'ed source code in your source code. There is NO limitation of the
GPL or the LGPL that prevents a commercial product from making calls into
the GPL'ed library.

The problem with your interpretation is that in a sense you want your cake and
eat it too. In short you want to be able to use somebody elses code in your
product without their having a say in how their code is used or receiving a
cut of the profits. The GPL/LGPL is specificaly designed to prevent this.

If you use their code (not the binaries, though you will be required to
provide source to those binaries if you distribute it with your product
though this won't include the binaries to your commercial product) then
you must release your code - an extension of derivation.

If you desire to produce commercial secure-source code compatible with a GPL 
license then simply don't ship *any* GPL with your product and use no GPL
source or LGPL'ed library in source form in that product.

The point to the L/GPL is not to prevent commercial code development but
rather to prevent somebody from taking a library some programmer written and
released for non-commercial (a distinction not permited under public domain)
use while retaining control over that source so that if somebody, like
yourself, bops along and decides they can make a million with it the
original programmer gets a cut or you loose your million.

How does the original programmer get a cut? Simple, the commercial entity
contacts the programmer and licenses a non-GPL'ed version of the library.

Bottem line, don't steal other peoples code to make money without paying
them for their effort. It's that simple.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage at ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------





From aba at dcs.ex.ac.uk  Mon Sep 28 04:08:38 1998
From: aba at dcs.ex.ac.uk (Adam Back)
Date: Mon, 28 Sep 1998 19:08:38 +0800
Subject: Toto -- mimic function or the real thing (Re: no subject)
In-Reply-To: 
Message-ID: <199809290009.BAA23670@server.eternity.org>




Ulf Moeller writes:
> Toto? writes:
> >  Blanc and Carroll watched in total amazement as
> >Jim Choate's ludicrous/inane computer and business theories
> >seemed to be somehow transformed, by unseen hands working
> >behind the scenes, into fully functional and viable
> >RealWorld(TM) concepts, in Choate's work with the Armadillo
> >Group.
> 
> Huh? Is Toto back?

Dunno, but that sure looks like authentic Toto doesn't it (and the
rest of the long post of which excerpt quoted above).  Either someone
has a very high quality mimic function for his writing style, or is
rather good at imitating his writing style manually, or Toto is still
around, and Toto isn't Carl Johnson.

Who knows, if it is Toto, he has been rather careful not to sign
anything recently :-).

(If he were to sign things it might be helpful for Carl
Johnson... Toto?)

Adam
-- 
print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0




From: Jean Staffen 
Subject: IP: The virtual president
Date: Fri, 25 Sep 1998 22:22:11 -0500 (CDT)
To: ignition-point at majordomo.pobox.com

This is the most INCREDIBLE article.  I never thought I'd read something
like this in the mainstream media!!! -Jean


                   The virtual president=20
                 =20

                   By Missy Kelly=20
                   Copyright 1998, WorldNetDaily.com=20

                   "You know, by the time you become the leader of a
                   country, someone else makes all the decisions." -- Bill
                   Clinton September 4, 1998=20

                   Well, shut my mouth. The president of the United
                   States admits publicly that he is the puppet of larger
                   powers -- that "someone else," in fact, "makes all the
                   decisions."=20

                   Of course, those who understand how power really
                   works in this nation recognize the veracity of his
                   statement immediately. But for Bill to state it so openly
                   is truly remarkable -- not just for its honesty, but for
its
                   recklessness.=20

                   In a glib and Freudian moment, it just slipped out.=20

                   It appears Bill is "getting it."=20

                   Clinton was reminded the week of Aug. 25 that The
                   Agenda Transcended the Man. He was given a
                   heads-up that his removal from office would have to
                   happen. The New York Times intoned, "But if there is
                   no hope for the agenda, what need is there for the
                   man?" Garry Wills also called for his resignation,
                   writing, "[Clinton] would be saying that the goals he
                   fought for are more important than personal pride or
                   prerogatives." Other former sycophants in the press
                   piped up using minor variations of the same
                   phraseology: Clinton should resign because the
                   "agenda" transcends the man. The Agenda is
                   paramount.=20

                   Yet, Bill still didn't "get it" -- that in his pact with
the
                   devil, the devil held the upper hand. In typical Bill
                   psycho-fashion, he thought he could once again charm
                   his way out of removal; and make a "show of force" to
                   prove to his masters that he still had the right stuff to
                   salvage his career and continue with the Agenda. To
                   that end, his White House staff -- a separate operation
                   from the power brokers -- was told by Bill to pull out
                   all stops to save his presidency.=20

                   But suddenly there were leaks to the Washington Post
                   that there were more bimbos than just Monica in Bill's
                   White House closets. "I never had an affair with the
                   President, but all the others who have get to stay,"
                   Monica allegedly whined to Clinton aide Marsha Scott
                   while pleading to be returned to a White House
                   position.=20

                   More forcefully, the power brokers served Bill notice
                   that their demands for removal were to be taken
                   seriously when the Department of Justice, out of the
                   blue, announced that the President himself -- Bill
                   Clinton -- was the subject of a NEW 90-day
                   investigation into campaign donation illegalities. On
                   three -- count 'em -- three separate prior occasions,
                   Attorney General Janet Reno had formally investigated
                   such charges and declared there was "nothing there."
                   Publicly, no new information had come to light, but
                   suddenly there was the alarming notion that there was
                   a "there, there" and it involved Bill Clinton himself.=20

                   The message: Bill, you will do what we tell you. We
                   can do this the easy way or the hard way. Start
                   packing your bags. Bill is "getting it," now.=20

                   Bill is resigning himself to his resignation.=20

                   The President has not yet identified for us who this
                   "someone else" is who really puppets the highest office
                   of our land. So for purposes of discussion, let's just
                   give them an identifier. Borrowing from John LeCarre's
                   "The Night Manager," let's call them "Flagship."=20

                   Flagship, of course, knows not only where all the
                   bodies are buried -- literally and figuratively -- but=
 has
                   the wherewithal to pick through them all, choosing one
                   misdeed after another, exposing them one by one until
                   Bill relents. It's blackmail. And blackmail works unless
                   you handle it in the manner Rep. Dan Burton has in the
                   past couple of days. Bill Clinton is incapable -- truly
                   incapable -- of doing what Burton did. Truly.=20

                   "You may find you can get away with virtual
                   presidents, virtual prime ministers, virtual everything."
                   -- Bill Clinton, September 4, 1998=20

                   This is another Freudian lament, verbalized by a Bill
                   Clinton who finally "gets it." He was and is the
                   VIRTUAL PRESIDENT. By his own admission, he
                   was a front, with no power to make decisions. By his
                   own admission, they were made for him, by "someone
                   else." They were made by those whom Flagship had
                   placed in lower level, under-the-radar positions within
                   the cabinet. They didn't even have to ask Bill's
                   permission. They got their orders, and implemented
                   them.=20

                   Bill's job was to pretend -- pretend he was the leader,
                   pretend he was in charge -- maintain the fa=E7ade of a
                   "virtual" president in a "virtual" democracy where a
                   "virtual" rule of law exists. In fact, the levers of=
 power
                   were already controlled -- controlled so precisely, in
                   fact, as to make the president irrelevant, controlled by
                   people who have never been elected to office, and
                   whose names we do not even know.=20

                   Flagship cannot afford impeachment hearings. There is
                   an Agenda, and a timeline that must be maintained. It is
                   of utmost importance that the new leader be installed
                   immediately. Therefore, I would not be surprised if Bill
                   is gone within two weeks or less.=20

                   If you consider Bill's virtual presidency, you know the
                   words he spoke are true. He was so much a puppet
                   that he even dispensed with the appearance of
                   business. He cut off daily briefings, which every other
                   president attended. He lengthened the time between
                   other regularly scheduled meetings. He hardly ever
                   meets -- or even talks -- to his cabinet members.
                   Recall Warren Christopher, the first Secretary of
                   State, and William Perry, the Secretary of Defense,
                   expressing extreme frustration that they could not get a
                   meeting with the president, even in times of crisis.=20

                   Instead, poor, useless Bill was busy playing golf,
                   jogging, or on one of his many, many vacations.
                   Having his weekly dinners with his Arkie crowd,
                   screening new movies, attending fundraisers at the
                   pace of 30 a month, playing host to a legion of Lincoln
                   bedroom guests, and having coffee with drug
                   smugglers, arms dealers, terrorists, communists and
                   crony capitalists. In between, he was juggling his many
                   women, coordinating their liaisons and cover stories.
                   Plus all that time he devoted to considering how he
                   could provide answers that were "legally correct" but
                   "misleading" in all of his many scandals. Phew, I am
                   exhausted just thinking about it.=20

                   How many times have we said during this presidency
                   -- who is really running this country when we have a
                   president who is missing in action? Time and again, it
                   was apparent that Bill Clinton was not on task doing
                   presidential duties. But for him to admit it, openly --
                   whoa! Surely he doesn't think his scorched earth
                   policy extends to his masters, does he? Is he truly so
                   arrogant that he thinks he can take them down, too, in
                   a child-like temper tantrum? If so, he is truly playing
                   with fire. But I suspect, no. Bill may have harbored
                   those thoughts last week, but is seeing the light, now.
                   His unguarded comments were purely Freudian
                   meanderings of the mind.=20

                   Clinton made the reckless error of speaking his
                   thoughts out loud. As stupid as this was, it is not so
                   surprising. It is intimately a part of this man's sick
                   psychology that he would want to provide excuses for
                   his problems outside of himself -- to explain that it
                   really isn't his fault. After all, I don't really have=
 any
                   power -- I am a virtual president. I am not to blame. I
                   am a victim -- I was just doing what I was told.=20

                   Bill has always been a victim of someone else, and
                   never responsible for his own actions. As we pull our
                   love away from him, it becomes ever so much more
                   important to his psyche that he win us over. He can't
                   help himself. He must explain, and win us back.
                   Biographers have often noted that Clinton would be in
                   a room full of adoring fans, and one person who wasn't
                   enthralled. Clinton would devote all his energy to
                   charming that one person. There is pathology to this
                   man that is ingrained. Without reflected adoration,
                   there is no Bill Clinton. He ceases to exist.=20

                   But if he doesn't contain himself, and stop trying to
                   make public excuses that touch this close to the heart
                   of power in this nation, he's putting himself in extreme
                   jeopardy. Flagship must be assured that Clinton will
                   never expose his masters and the Agenda. And this is
                   a real fear -- they, too, understand the psyche of Bill
                   Clinton.=20

                   When Bill resigns, he will have to go deeply off the
                   radar screen -- I mean no mention of him. Disappear.
                   There can be no distractions as the Agenda barges
                   forward. But Bill's psyche cannot tolerate this -- his
                   must have sycophants and lovers -- he is no one
                   without the human mirror of his success. I remind you
                   of what happened to him after he lost the governor's
                   race in Arkansas 20 years ago. Study that period. This
                   was a pathetic man, deep in depression, who
                   approached perfect strangers and asked them why
                   they hadn't voted for him. It conjures up visions of a
                   former President calling up Larry King Live and
                   blathering on that he's lonely and misunderstood, ala
                   O.J. Simpson.=20

                   Flagship cannot afford a Bill Clinton behaving this way,
                   and possibly exposing their Agenda. Therefore, I
                   suspect that not only will Bill Clinton be removed from
                   office -- i.e. forced to resign -- before the end of
                   September, but I also strongly fear that Bill will commit
                   Arkancide within the year.=20

                   Bill was always in "the game" for Bill. Hillary was
                   always in this for the Agenda. She has always believed
                   that the Agenda transcended the man, which is why
                   she has always put up with -- beyond rational
                   endurance -- Bill's shenanigans. She knew from the
                   get-go that they were the chosen ones, part of a select
                   stable from whom the anointed, the "someone else" Bill
                   referred to, would choose to lead us into convergence,
                   the Third Way. This Third Way is part of a long-term
                   strategy that was developed 40 years ago.=20

                   Knowing this, Hillary stuck with Bill because her
                   allegiance -- above all else -- has always been to the
                   Agenda. And because this is still true, she cannot
                   possibly stay with Bill now that he has become a
                   liability. To cheers and salutations, she will divorce=
 Bill
                   Clinton shortly after he resigns, and no one will blink
                   an eye. She will divorce him not because he's "done
                   her wrong" but because he is no longer useful. Then
                   Hillary, in all her glory, will be unleashed on this=
 world.
                   She will have her own, not reflected, power most likely
                   as Queen of the World through her new U.N. position.
                   Maybe things aren't looking so bad for Hillary, after
                   all.=20

                   Rahm Emanuel, in continuing his attacks against
                   Independent Counsel Kenneth Starr last week invoked
                   the ghost of military strategist Karl Von Clausewitz.=20

                   "Clausewitz [sic] said war is an extension of politics,
                   by other means." Odd. A former ballet dancer a
                   student of Von Clausewitz?=20

                   Would you agree that the Clintons and their supporters
                   resort to all sorts of stratagems, maneuvers, illegal
                   methods, evasions and subterfuge to achieve their
                   objectives?=20

                   Would you?=20

                   Does the record of their actions comport with that
                   statement?=20

                   Hmmm?=20

                   Those are the exact words of Lenin, when he laid out
                   his plans for global communism.=20

                   Missy Kelly is a writer-researcher and political
                   analyst.=20








**********************************************
To subscribe or unsubscribe, email:
     majordomo at majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email at address
**********************************************
www.telepath.com/believer
**********************************************





From vznuri at netcom.com  Mon Sep 28 04:20:42 1998
From: vznuri at netcom.com (Vladimir Z. Nuri)
Date: Mon, 28 Sep 1998 19:20:42 +0800
Subject: IP: NATIONAL ID
Message-ID: <199809290021.RAA15043@netcom13.netcom.com>




From: Larry Becraft 
Subject: IP: NATIONAL ID
Date: Sat, 26 Sep 1998 11:51:20 -0500
To: ignition-point at majordomo.pobox.com

To Whomever is interested in fighting the National ID:

    The Dept. of Transportation has a pending regulation which is the
basis for the national ID. The deadline for submitting objections is
Oct. 2 and we need to have several thousand objections filed with the
DoT. There are about 2200 objections filed so far.

I have my own letter objecting to the national ID posted to the "fight
the
fingerprint" webpage, which is accessed thru:

                http://www.networkusa.org/index.shtml

All you have to do is personalize it for yourself. Specifically, my
letter
is posted at this URL:

http://www.networkusa.org/fingerprint/page1b/fp-dot-becraft-reg-obj.html

Scott McDonald also has a suggested letter posted on this same page, and

it is found at:

http://www.networkusa.org/fingerprint/page1b/fp-dot-reg-obj-format.html

Please take a few moments to download and copy any of these letters,
personalize it for yourself and mail it in. Please circulate this note
so that people will send in more objections.

                            Larry Becraft









**********************************************
To subscribe or unsubscribe, email:
     majordomo at majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email at address
**********************************************
www.telepath.com/believer
**********************************************





From vznuri at netcom.com  Mon Sep 28 04:21:25 1998
From: vznuri at netcom.com (Vladimir Z. Nuri)
Date: Mon, 28 Sep 1998 19:21:25 +0800
Subject: IP: Military's secret plans for civilian 'preparedness'
Message-ID: <199809290021.RAA15054@netcom13.netcom.com>




From: believer at telepath.com
Subject: IP: Military's secret plans for civilian 'preparedness'
Date: Mon, 28 Sep 1998 10:45:04 -0500
To: believer at telepath.com

Source:  World Net Daily
http://www.WorldNetDaily.com/exclusiv/980928_domestic_rapid_depl.html

ARMED AND DANGEROUS 
Domestic rapid deployment forces 
The military's secret plans for civilian 'preparedness' 

 This report is part of a continuing series by
 WorldNetDaily on the militarization of
 federal government and America's civilian
 sector.

By Joseph Farah 
Copyright 1998, WorldNetDaily.com 

Under the guise of preparedness for domestic terrorist
attacks, the U.S. military is training thousands of local
police officers, national guardsmen and other officials
to respond to national emergencies under centralized
federal authority and control, according to plans
revealed by Defense Department sources. 

In addition, U.S. military forces are stepping up
training exercises in American civilian population
centers, prompting constitutional concerns in some
quarters. 

The plans for military involvement in the civilian sector
are a direct result of the "Defense Against Weapons of
Mass Destruction Act of 1996," which mandated the
federal government to develop response scenarios to
domestic terrorist incidents involving nuclear,
biological, chemical and radiological weapons. The
legislation designated the Department of Defense as
the lead agency in coordinating sweeping plans
involving the Federal Emergency Management
Agency, the FBI, Department of Energy, the
Environmental Protection Agency and the Department
of Health and Human Services. Representatives of all
these agencies meet monthly as the Senior Interagency
Coordination Group, or SICG. 

The Defense Appropriations Act of 1997 added
funding for the Pentagon "to improve the capability of
the federal, state and local emergency response
agencies." 

"The United States Army Chemical and Biological
Defense Command leads interagency training
development and city visits," H. Allen Holmes,
assistant secretary of defense for special operations
and low-intensity conflict, testified to the Strategic
Forces Subcommittee of the Senate Armed Services
Committee earlier this year. "Interagency teams
coordinate with fire, police, emergency medical and
hazardous material officials and tailor training to city
requirements. Additionally, FEMA has developed a
terrorism annex to the Federal Response Plan to
ensure coordination across all agencies at all levels." 

In 1997, the Defense Department spent $30.5 million
on the training and civil response aspects of the
program, Holmes reported. An additional $10 million
was dedicated to improving the U.S. Marine Corps
Chemical-Biological Incident Response Force. This
year, Congress allocated $50 million for the domestic
preparedness program. Another $50 million is
appropriated for the program in 1999. 

The money is for training purposes only. However, the
Defense Department is lending equipment to state and
local agencies, according to Holmes. 

The program calls for the National Guard to stand up
10 Rapid Assessment and Initial Detection teams in
selected cities across the nation using 200 full-time
active guardsmen and reservists. Members of Army
Guard and reserve chemical companies will be trained
next year to conduct searches for weapons of mass
destruction. 

The goal of the domestic preparedness program is to
train 120 cities by 2001 and to provide mechanism for
every community in the nation to "leverage federal
expertise," according to the Defense Department. The
interagency team has trained more than 10,000 "first
responder trainers" -- drawn from firefighting, law
enforcement, emergency medical communities and
emergency telephone operators and dispatchers -- in
30 cities, according to Defense Secretary William
Cohen. Another 25 cities will receive training in the
next year, he said. 

"Our program is specifically designed so that the
people we train become trainers themselves," Cohen
said earlier this month in a report to the Council on
Foreign Relations titled "Security in a Grave New
World." "This approach will greatly magnify our efforts
to produce a core of qualified first responders across
the nation." 

FEMA has compiled a master inventory containing
information on the resources and capabilities of each
agency involved in the program and what is available
to state and local officials in emergency situations.
However, the information on that inventory is not
available to the public or the press -- only to federal
and state emergency planners. Undisclosed surplus
military equipment is being made available to state and
local government agencies through this program. 

Some civil liberties groups have pointed out that the
intense, coordinated rush to "fight terrorism" in
America comes at an odd time -- given the
government's own figures reporting a 25-year low in
such attacks and incidents. 

The National Association of Criminal Defense
Lawyers points out, for instance, that the
overwhelming majority of law enforcement's record
number of applications to eavesdrop on people
through electronic surveillance technology involves
investigation into drug, racketeering and gambling
offenses -- not terrorism. There was bipartisan support
in Congress for giving the executive branch of
government vast new, codified authority to plant
wiretaps and electronic bugs and to confiscate
property as a result of investigations in this effort to
"combat terrorism." 

The 1996 law grants the president exclusive,
unreviewable powers to designate groups "terrorist
organizations." Under such powers, the government
could deport suspects -- including permanent residents
and non-immigrants -- based on "classified" or "secret
evidence" under the cloak of national security. Another
provision of the legislation requires banks to freeze
assets of domestic groups and citizens deemed agents
of such "terrorist organizations." There is no
mechanism established to challenge such decisions by
banks. 

In a development the Defense Department claims is
unrelated to the terrorism plans, more actual combat
training is taking place in urban centers. Earlier this
month, Marines took part in such a training exercise in
Maryland. Last month, a special unit of U.S. Marines
with assault rifles conducted maneuvers in Birmingham,
AL. 

These exercises are part of a program called "Training
in the Urban Environment. " 

All of the operations, including the exact timing of the
exercises, were kept secret from the public, raising
concerns about civil liberties issues. 

Similar exercises have been conducted recently in
Chicago, Jacksonville, FL, and other U.S. cities. The
question on some minds is: Who exactly are the
Marines preparing to wage war with in America's
urban environments? 

The training is part of a certification program in "urban
combat." The program includes missions, such as
rescuing a pilot, which the Marines might be called to
perform in foreign countries such as Somalia, military
spokesmen say. Marine officials say the urban
landscape adds a new dimension to the training the
Marines have already received. 

 � 1998 Western Journalism Center 
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo at majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email at address
**********************************************
www.telepath.com/believer
**********************************************





From ravage at EINSTEIN.ssz.com  Mon Sep 28 05:11:51 1998
From: ravage at EINSTEIN.ssz.com (Jim Choate)
Date: Mon, 28 Sep 1998 20:11:51 +0800
Subject: cypherpunk license: PLEASE STEAL ME (Re: GPL & commercial software, the critical distinction) (fwd)
Message-ID: <199809290114.UAA04026@einstein.ssz.com>



Forwarded message:

> Date: Tue, 29 Sep 1998 01:53:23 +0100
> From: Adam Back 
> Subject: cypherpunk license: PLEASE STEAL ME (Re: GPL & commercial software, the critical distinction)

> OK, but it would seem to me that to interpret GPL in this way is in
> violation of the spirit (and probably legal intent if interpreted by a
> lawyer).

Actualy this situation is specificaly addressed in the LGPL in regards
header files and how they are the gray area in all this and probably
indefensible in a court (it says this in the LGPL go look...www.gnu.org).
As programmers this is what we want after all, the API to be described so we
can replace those proprietary libraries and programs if we desire.

Actualy you missed the obvious way to distribute commercial code and the
(L)GPL will protect your propietary work....

In both licenses it is very specific in noting that a L/GPL'ed work that is
subsumed in another causes that work to become L/GPL'ed by default. It
further notes that there is NO implication that the use of commercial
code/libraries in a L/GPL'ed work can be construed to L/GPL that proprietary
code.

How I do jobs for my customers is that I develop my programs and libraries I
want to protect via copyright and then distribute them with a set of scripts
and makefiles that during install build the end product. So the end user can
enjoy the privileges of the L/GPL'ed code (ie can fix bugs and relink the
libraries to their hearts content) and I protect my work. The catch is to
make sure the makefiles and scripts are L/GPL'ed. You could even include gcc
or egc on the distribution medium and use it to compile the resultant
without worrying about your commercial code being subsumed. It is quite
commen today for commercial houses to use gcc/egc to develop and distribute
fully commercial code, the catch is that none of the end resultant code can
come from L/GPL'ed sources.

This harks back to my comment earlier today about the GNU/cash system being
a perfect medium for the implimentation of crypto/e$ protocols. The catch is
that you have to be willing to give up your claims to the stubs that must be
placed in the L/GPL'ed product. If you can get away with using named pipes
as buffers and T's then it becomes reasonably trivial to create a situation
where one can inject non-L/GPL'ed code into the stream without the
functional code so injected falling under the L/GPL.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage at ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------





From ravage at EINSTEIN.ssz.com  Mon Sep 28 05:44:10 1998
From: ravage at EINSTEIN.ssz.com (Jim Choate)
Date: Mon, 28 Sep 1998 20:44:10 +0800
Subject: Copyright may limit Internet (w/o encryption) [CNN]
Message-ID: <199809290147.UAA04187@einstein.ssz.com>



Forwarded message:

> X-within-URL: http://www.cnn.com/TECH/computing/9809/28/copyright.fight.ap/

>    WASHINGTON (AP) -- When Lois Gibbs learned in 1978 that 20,000 tons of
>    toxic chemicals were buried under her Niagara Falls, N.Y.,
>    neighborhood, she tried to make sense of all the information and
>    scientific names suddenly thrown at her.
>    
>    She turned to her local library, wading through medical journals and
>    old newspaper articles to understand the chemicals and the diseases
>    they caused. Gibbs credits this immediate access to information with
>    helping her organize parents in Love Canal and spread the word about
>    toxic dumps.
>    
>    Now, thanks to the Internet, there's more information than ever
>    before. But educators and librarians fear that average citizens won't
>    be able to get at it because of proposed changes in copyright laws.
>    
>    Congress is trying to balance protecting the work of authors,
>    songwriters and others with making important information available to
>    students and other researchers.
>    
>    The House and Senate could agree this week on legislation that would
>    implement two copyright treaties adopted in 1996 by the U.N. World
>    Intellectual Property Organization.
>    
>    Current "fair use" laws allow personal use of copyrighted material
>    without obtaining advance permission. Students can quote from books in
>    their research papers and cable systems can relay television programs,
>    for example. The new version could lead to the encryption of some
>    material, keeping it out of the hands of anyone without a password or
>    other authorization.
>    
>    Hollywood and publishing industry officials say they are not trying to
>    keep information from the general public. But they want to protect the
>    work of their artists and writers from being downloaded and mass
>    distributed with a few keystrokes.
>    
>    "Everyone hopes that the Internet will become a great resource for
>    education, entertainment and commerce," said Allan Adler, vice
>    president for legal and governmental affairs at the Association of
>    American Publishers. "But one of the problems is that the medium
>    represents an extraordinary capability for flawless reproduction and
>    instantaneous distribution."

[text deleted]


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage at ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------





From lazlototh at hempseed.com  Mon Sep 28 06:00:10 1998
From: lazlototh at hempseed.com (Lazlo Toth)
Date: Mon, 28 Sep 1998 21:00:10 +0800
Subject: Cypherpunks defeat?
In-Reply-To: 
Message-ID: 



On or about 11:49 PM +0100 9/28/98, Adam Back wrote:
>You want to buy ecash tokens with plastic.  Ideally you want to be
>able to buy ecash tokens with an ATM card because you don't want to
>incur any withdrawal fee (ATM withdrawals incur no transaction fee the
>UK, US may be different.)

In the case of my US bank it's the opposite:  ATM withdrawals, unless I use
a machine owned by my bank, cost me US$1.50.  Credit card fees on the other
hand are paid by the merchant, who is contractually bound NOT to pass them
on to me.

>Buying ecash tokens with a credit card is going to result in the cash
>advance minimum fee, plus unwanted (and typically double digit APR)
>interest on the "advance".
>
>Debit cards are a bit cheaper, but still incur some fee (unless a bank
>could be persuaded to waive it for this class of transaction).

My debit card functions as both ATM and credit card.  When given a choice I
will always prefer to use it as a credit card, which costs me nothing.

-Lazlo





From ravage at EINSTEIN.ssz.com  Mon Sep 28 06:09:22 1998
From: ravage at EINSTEIN.ssz.com (Jim Choate)
Date: Mon, 28 Sep 1998 21:09:22 +0800
Subject: NSA on TDC....
Message-ID: <199809290212.VAA04368@einstein.ssz.com>



Hi,

There is a show on TDC right now (21:09 Ctl.) on the NSA. Has some
interesting shots of their CRITIC center as well as a brief discussion of
their computing resources.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage at ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------





From aba at dcs.ex.ac.uk  Mon Sep 28 06:20:50 1998
From: aba at dcs.ex.ac.uk (Adam Back)
Date: Mon, 28 Sep 1998 21:20:50 +0800
Subject: cypherpunk license: PLEASE STEAL ME (Re: GPL & commercial software, the critical distinction) (fwd)
In-Reply-To: <199809290114.UAA04026@einstein.ssz.com>
Message-ID: <199809290222.DAA24938@server.eternity.org>




Jim Choate writes:
> > OK, but it would seem to me that to interpret GPL in this way is in
> > violation of the spirit (and probably legal intent if interpreted by a
> > lawyer).
> 
> Actualy this situation is specificaly addressed in the LGPL in regards
> header files and how they are the gray area in all this and probably
> indefensible in a court (it says this in the LGPL go look...www.gnu.org).

Yes, I know, I have read LGPL a few times, and it does include the
sorts of exceptions you describe.  But I said GPL, and GPL is the
license which I was suggesting causes problems.  As I said, LGPL is
sort of useable.

> Actualy you missed the obvious way to distribute commercial code and the
> (L)GPL will protect your propietary work....
> 
> In both licenses it is very specific in noting that a L/GPL'ed work that is
> subsumed in another causes that work to become L/GPL'ed by default. 

Right, this is the major sticking point for commercial people I find.

> It further notes that there is NO implication that the use of
> commercial code/libraries in a L/GPL'ed work can be construed to
> L/GPL that proprietary code.

Yes, but the more interesting, less restrictive case is where they
really want to modify the code.  cf the example I gave of say adding
pgp5 compatibility to pgp26ui.

I think that if you modify to any significant extent a GPL peice of
software, and try to sell it you could run into problems.  Your legal
bill for trying to work out how bad it is will be expensive.  If the
company is not that bothered about adding crypto, they are going to
see the implications in lawyer hours alone, and give up before they
start.

> How I do jobs for my customers is that I develop my programs and
> libraries I want to protect via copyright and then distribute them
> with a set of scripts and makefiles that during install build the
> end product.

If you want to be creative, you could do what you want to it ignoring
the license, then provide a binary patch from their binary to your
binary.  Or whatever.  Commercial lawyers are cautious animals though,
so because you could theoretically hack around things does not mean
that some company's lawyer is going to recommend that they do it.

Simpler, rather than hack around, and have the additional hurdle to
crypto deployment of many lawyer hours spent wrangling over
implications of GPL and hacks around it, is to discourage use of GPL
for crypto libraries, and software.

> So the end user can enjoy the privileges of the L/GPL'ed code (ie
> can fix bugs and relink the libraries to their hearts content) 

That aspect of LGPL (availability of source) is useful to the extent
that it encourages people to make source of the crypto parts
available.

> It is quite commen today for commercial houses to use gcc/egc to
> develop and distribute fully commercial code, the catch is that none
> of the end resultant code can come from L/GPL'ed sources.

Use of GNU development tools is a different, and more straight forward
issue than using GNU licensed code.

> [hack around GPL problems using pipes]

The point remains: the simplest and best thing to do about licenses if
you are more concerned about crypto deployment than source
availability is not to use GPL, and probably to avoid LGPL also.

Use BSD, use PD, either is better than GPL for the purpose.

Adam





From bill.stewart at pobox.com  Mon Sep 28 06:45:19 1998
From: bill.stewart at pobox.com (Bill Stewart)
Date: Mon, 28 Sep 1998 21:45:19 +0800
Subject: Letter to Editor on Censorship
Message-ID: <3.0.5.32.19980928184330.00b69af0@idiom.com>



Monday 9/28/1998's San Mateo County Times had a really strong,
if slightly naive, editorial in favor of the First Amendment
protections on speech and the press.  Among other things,
it was quite positive about the fact that the Starr Report
was able to be widely published in spite of content that
would have been censored in the past, and that it would be hard to
imagine how we'd explain to future generations 25 or 50 years from now
that we'd covered up this important part of the historical record
just because its content was vulgar.  Heh.  Their heart's in the right place...



To: Editor, San Mateo County Times, 

Thank you for Monday's great editorial supporting freedom of speech.
Unfortunately, it's a right preserved only by hard work, and 
getting recognition for all forms of speech beyond just ink on paper 
is an ongoing struggle.  
Publishing the Starr Report on the Internet would have been illegal if the 
EFF, ACLU, and publishers hadn't challenged the "Communications Decency Act", 
which the Supreme Court threw out 9-0, and unlike Nixon's tapes, 
a few "Expletive Deleted"s can't clean up the Starr Report.

As your editorial says "it would be hard to imagine", but censors are 
still at it - a Congressional committee just passed a reworded version, 
hoping they can get away with "protecting minors" as a loophole. 

Some people contend that the First Amendment doesn't protect rude language, 
only political speech.   But if you oppose campaign finance limits, 
they'll contend that elections are too important to allow 
unregulated political speech on TV or newspapers.  
And Joe Camel?  He's illegal too.

Meanwhile, the range of opinions on TV and radio is quite narrow - 
big corporations and government public broadcasting buy up the few 
TV licenses, while the FCC bans low-power broadcasters who can 
provide a diversity of opinion, and most cities grant monopolies 
on cable TV networks.

And FBI director Louis Freeh, in his push for expanded wiretaps, 
has been using Anti-Communist Cold War restrictions on exporting 
encryption software to keep foreigners and Americans from using 
tools that allow them to talk privately without censorship.

Eternal vigilance is still the price of liberty.

================

				Thanks! 
					Bill
Bill Stewart, bill.stewart at pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From bill.stewart at pobox.com  Mon Sep 28 06:45:27 1998
From: bill.stewart at pobox.com (Bill Stewart)
Date: Mon, 28 Sep 1998 21:45:27 +0800
Subject: Jury duty considered harmful, or at least rare
In-Reply-To: <19980924015428.2767.qmail@hades.rpini.com>
Message-ID: <3.0.5.32.19980928190953.00b5aea0@idiom.com>



An Anonymous College Student wants to be able to stay off jury duty,
and also complains that the system ties you up all day in court
even if you're not picked.  I've been called for jury duty in
three or four different counties, which had different approaches
to the jury selection and different levels of disrespect for the
time of potential jury pool members.  In Santa Clara County CA,
you're required to telephone into a badly organized recording
every day for a week to see if your number is up, and if
it does come up you need to go in, but otherwise not.
In Monmouth County NJ, you're called for a week, though they'll
let you go on Thursday afternoon if you haven't been picked
for a trial.  I played a lot of bridge that week....
In Middlesex County NJ, you and the lawyers all have to 
show up on Monday, and if they don't need you, you're done.

If you really want to both serve the public and get out of jury duty,
take a bunch of literature from the Fully Informed Jury Association
and start handing it out in the jury pool, explaining to people that
under the common law, juries have both the power and the moral obligation
to find people innocent if the law they're accused of is a bad law
or if the punishments are far out of proportion to the crime -
such as the fugitive slave laws of the 1800s or the 
alcohol and drug prohibitions of the 1900s, or hanging forgers in the 1800s 
or three strikes* for non-violent felons in the 1900s.  

	[*I'm not saying that three strikes for violent felons isn't appropriate, 
	but California's law goes far beyond that in practice.
	And we've had FIJA fights here before, and don't need them again.
	For the purpose of this discussion, the important FIJA issue
	is which door you'll be thrown out of, which body parts you'll land on,
	and how many times you'll bounce on your way out. :-)  ]

>Actually, the last time that I was called, the largest proportion of potential
>jurors were people who work for the government in one form or another.
>City park workers, school teachers, post office workers, clerical workers
>who work at city hall, etc.  Retirees were the next largest group.
>Between the two, they accounted for 80+ of the jury pool.

Yup.  Jury participation is critical for preserving a free society,
but you can't preserve freedom by forcing people to participate in things.
Unfortunately, to the extent that jury systems do allow people
who have better things to do with their time (like running businesses)
out of jury time, they tend to filter in favor of people who'll 
cooperate with what the government wants - like retired schoolteachers.

Also, jury selection processes tend to filter out people who
don't appear likely to do what the prosecution and/or defense tell them;
it's an interesting thing to watch.  And the prosecution and sometimes
the other jurors often get grouchy when some jurors aren't cooperative -
an engineering supervisor I once worked with was one of two jurors who
hung their jury be refusing to accept the contention that a Hispanic man
should be guilty of carrying drugs and drug paraphrenalia because the
airplane glue he'd bought at the hardware store was in a plastic bag
which he *obviously* intended to use for sniffing it with.  (And this was
in New Jersey, where's it's not even illegal to be Hispanic....)
Of course, they did get much less abuse than the friend of mine who
refused to convict someone for drug possession because the drug war is bogus...
he got yelled at a lot afterwards, but being a New Yorker he viewed that
as entertainment and returned fire in kind.




				Thanks! 
					Bill
Bill Stewart, bill.stewart at pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From ravage at EINSTEIN.ssz.com  Mon Sep 28 06:48:11 1998
From: ravage at EINSTEIN.ssz.com (Jim Choate)
Date: Mon, 28 Sep 1998 21:48:11 +0800
Subject: cypherpunk license: PLEASE STEAL ME (Re: GPL & commercial software, the critical distinction) (fwd)
Message-ID: <199809290250.VAA04605@einstein.ssz.com>



Forwarded message:

> Date: Tue, 29 Sep 1998 03:22:27 +0100
> From: Adam Back 
> Subject: Re: cypherpunk license: PLEASE STEAL ME (Re: GPL & commercial software, the critical distinction) (fwd)

> Yes, I know, I have read LGPL a few times, and it does include the
> sorts of exceptions you describe.  But I said GPL, and GPL is the
> license which I was suggesting causes problems.  As I said, LGPL is
> sort of useable.

GPL and LGPL both support fully this model of commercial use of L/GPL'ed
code.

> Right, this is the major sticking point for commercial people I find.

I find most commercial people lack imagination, though they make up for it
with a desire for money.

> Yes, but the more interesting, less restrictive case is where they
> really want to modify the code.  cf the example I gave of say adding
> pgp5 compatibility to pgp26ui.

There would be no significant problem if you include the necessary stubs and
make them L/GPL'ed. By both the L/GPL the use of 3rd party code (L/GPL'ed,
PD, or proprietary) hanging off those stubs would NOT be L/GPL'ed.

> I think that if you modify to any significant extent a GPL peice of
> software, and try to sell it you could run into problems.

There is ABSOLUTELY NOTHING in the L/GPL that prevents me from selling such
code at whatever price I can manage to charge for it, I could even change it
significantly. I, however, MUST include the source code or provide it for a
reasonable fee if requested by the end user. Your point is irrelevant.

Now if I try to sell it as (my) *copyrighted* code then I'm in for a world of
hurt and justifiably so. This, again, desire to take advantage of others
work is the hallmark of thieves and marketing droids (if there is a
difference between the two).

>  Your legal
> bill for trying to work out how bad it is will be expensive. 

Will be nil. The L/GPL themselves clearly state they don't override previous
copyrights of material that might be used with L/GPL'ed products. That L/GPL
subsumption ONLY applies to code that is built using L/GPL'ed source. In
other words for the L/GPL to be inovked on your code requires that you use
somebodies elses L/GPL'ed code in (NOT with) your code.

This is clearly understood by businesses that do use gcc/egc in that they
use no libraries, headers, etc. from L/GPL sources, develop them in-house or
buy them from 3rd parties. They only use the compiler/linker/tools to get
hooked together.

> If you want to be creative, you could do what you want to it ignoring
> the license, then provide a binary patch from their binary to your
> binary.  Or whatever.  Commercial lawyers are cautious animals though,
> so because you could theoretically hack around things does not mean
> that some company's lawyer is going to recommend that they do it.

The goal of the L/GPL is NOT to stop commercial programming, it is to return
to the end user a level of control and understanding (at least in principle)
so they may build a system to do what they want and not some marketing droid
at a multi-national.

This is NO hack, it is specificaly detailed in the L/GPL as a legitimate use
of such licensed code.

> That aspect of LGPL (availability of source) is useful to the extent
> that it encourages people to make source of the crypto parts
> available.

No, it suggests they should make the API definition available. As to it
being useful, it is critical to the long term stability of systems and the
continued development of imaginative software.

> Use of GNU development tools is a different, and more straight forward
> issue than using GNU licensed code.

Only if you don't understand the L/GPL.

> The point remains: the simplest and best thing to do about licenses if
> you are more concerned about crypto deployment than source
> availability is not to use GPL, and probably to avoid LGPL also.

No, the best thing to do is build your copyrighted libraries and release the
API's via headerfiles or whatever in the GPL'ed code.

> Use BSD, use PD, either is better than GPL for the purpose.

No, they're not because in PD you loose ALL control of your code and if
somebody else uses it in a commercial app or not then you're pretty much
screwed as they laugh their asses off on the way to the bank.

Considering the extend of BSD that would be the last choice of an OS that I
would bank my business on.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage at ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------





From ericm at lne.com  Mon Sep 28 06:55:17 1998
From: ericm at lne.com (Eric Murray)
Date: Mon, 28 Sep 1998 21:55:17 +0800
Subject: Cypherpunks defeat?
In-Reply-To: 
Message-ID: <199809290256.TAA24503@slack.lne.com>



Lazlo Toth writes:
> 
> On or about 11:49 PM +0100 9/28/98, Adam Back wrote:
> >You want to buy ecash tokens with plastic.  Ideally you want to be
> >able to buy ecash tokens with an ATM card because you don't want to
> >incur any withdrawal fee (ATM withdrawals incur no transaction fee the
> >UK, US may be different.)
> 
> In the case of my US bank it's the opposite:  ATM withdrawals, unless I use
> a machine owned by my bank, cost me US$1.50.  Credit card fees on the other
> hand are paid by the merchant, who is contractually bound NOT to pass them
> on to me.

Not directly as an added charge.  But they do indeed pass it on.
The card associations won't let them directly charge an added amount for
using a credit card, because that would remind consumers that they're
paying for the privlidge.. and that might discourage them from
using plastic.  But it's ok for the merchant to offer 'discounts' for
buyers who use cash instead of credit cards.  That 'discount'
is the real price of the goods with the credit-card surcharge
subtracted.  Often that's 3-4%, sometimes as low as 1.2%.

> >Buying ecash tokens with a credit card is going to result in the cash
> >advance minimum fee, plus unwanted (and typically double digit APR)
> >interest on the "advance".
> >
> >Debit cards are a bit cheaper, but still incur some fee (unless a bank
> >could be persuaded to waive it for this class of transaction).
> 
> My debit card functions as both ATM and credit card.  When given a choice I
> will always prefer to use it as a credit card, which costs me nothing.

It still costs you the credit fee, hidden inside the purchase price.
Visa and MasterCard don't have massive staffs and huge office
buildings because they're dumb.

-- 
Eric Murray          N*Able Technologies                    www.nabletech.com
(email:  ericm  at the sites lne.com or nabletech.com)     PGP keyid:E03F65E5





From ravage at EINSTEIN.ssz.com  Mon Sep 28 07:04:34 1998
From: ravage at EINSTEIN.ssz.com (Jim Choate)
Date: Mon, 28 Sep 1998 22:04:34 +0800
Subject: Cypherpunks defeat? (fwd)
Message-ID: <199809290306.WAA04772@einstein.ssz.com>



Forwarded message:

> From: Eric Murray 
> Subject: Re: Cypherpunks defeat?
> Date: Mon, 28 Sep 1998 19:56:16 -0700 (PDT)

> using plastic.  But it's ok for the merchant to offer 'discounts' for
> buyers who use cash instead of credit cards.  That 'discount'
> is the real price of the goods with the credit-card surcharge
> subtracted.  Often that's 3-4%, sometimes as low as 1.2%.

I haven't seen that in 10 years or more. I doubt that anyone will find this
approach very widely.

> Visa and MasterCard don't have massive staffs and huge office
> buildings because they're dumb.

You don't know big corporations very well do you.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage at ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------





From bill.stewart at pobox.com  Mon Sep 28 07:14:17 1998
From: bill.stewart at pobox.com (Bill Stewart)
Date: Mon, 28 Sep 1998 22:14:17 +0800
Subject: [salman rushdie]
Message-ID: <3.0.5.32.19980928201440.00b74d00@idiom.com>



On 9/27/98, A Cypherpunk Who Wishes Not To Have His Name Used Here wrote to me:

> In article <3.0.5.32.19980926215457.00ad1510 at idiom.com> Bill Stewart wrote:
> > If there's cypherpunks relevance to this, it's that cryptographic
> > privacy and digital cash payments make it easier to publish
> > controversial material without the threat of violence against you.
>
> On the other hand, privacy and digital cash payments make it 
> easier to hire and reward hit men.
>
> You may not like it, but there's no sense in pretending it isn't so.

True enough, though in Rushdie's case, the social environment
provided enough protection that the murder could be called for,
the reward could be offered, and several of Rushdie's associates
could be murdered without any resort to crypto.

At least if you want to publish something that you _know_ will
annoy people enough that they want to kill you, you can do it
more safely if you've got a range of options for anonymity.

~~~~~~~~~~~

				Thanks! 
					Bill
Bill Stewart, bill.stewart at pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From tcmay at got.net  Mon Sep 28 08:09:09 1998
From: tcmay at got.net (Tim May)
Date: Mon, 28 Sep 1998 23:09:09 +0800
Subject: Toto -- mimic function or the real thing (Re: no subject)
In-Reply-To: 
Message-ID: 



At 5:09 PM -0700 9/28/98, Adam Back wrote:
>Ulf Moeller writes:
>> Toto? writes:
>> >  Blanc and Carroll watched in total amazement as
>> >Jim Choate's ludicrous/inane computer and business theories
>> >seemed to be somehow transformed, by unseen hands working
>> >behind the scenes, into fully functional and viable
>> >RealWorld(TM) concepts, in Choate's work with the Armadillo
>> >Group.
>>
>> Huh? Is Toto back?
>
>Dunno, but that sure looks like authentic Toto doesn't it (and the
>rest of the long post of which excerpt quoted above).  Either someone
>has a very high quality mimic function for his writing style, or is
>rather good at imitating his writing style manually, or Toto is still
>around, and Toto isn't Carl Johnson.

Crap. I detected this as ersatz Toto after a couple of paragraphs.
Metaphors were too strained, or something. It just seemed fake.


Won't change the outcome of his incarceration, esp. now that he's in the
psychiatric "System." If he wasn't crazy before, he soon will be.


--Tim May


(This space left blank pending determ. of acceptability to the gov't.)
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.







From jamesd at echeque.com  Mon Sep 28 08:29:02 1998
From: jamesd at echeque.com (James A. Donald)
Date: Mon, 28 Sep 1998 23:29:02 +0800
Subject: Cypherpunks defeat? (fwd)
In-Reply-To: <199809290306.WAA04772@einstein.ssz.com>
Message-ID: <199809290428.VAA27705@proxy3.ba.best.com>



Eric Murray 
> > But it's ok for the merchant to offer 'discounts' for 
> > buyers who use cash instead of credit cards.  That
> > 'discount' is the real price of the goods with the
> > credit-card surcharge subtracted.  Often that's 3-4%,
> > sometimes as low as 1.2%.

At 10:06 PM 9/28/98 -0500, Jim Choate wrote:
> I haven't seen that in 10 years or more. I doubt that
> anyone will find this approach very widely.

I find this invariably happens with buying computers or guns
from cheap sources.  If you have never encountered this, you
are paying too much for your computers and your guns. 

    --digsig
         James A. Donald
     6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
     rdf4ouUG+RnLXI0ylstU8mnhwqMyFkqPh1X52jgG
     4gZZRTeCp1GmQaxeNcrXu1XphSsTCv8oSiu1+Emrb
-----------------------------------------------------
We have the right to defend ourselves and our property, because 
of the kind of animals that we are. True law derives from this 
right, not from the arbitrary power of the omnipotent state.


http://www.jim.com/jamesd/����� James A. Donald





From jamesd at echeque.com  Mon Sep 28 08:33:01 1998
From: jamesd at echeque.com (James A. Donald)
Date: Mon, 28 Sep 1998 23:33:01 +0800
Subject: Cypherpunks defeat?
In-Reply-To: <3.0.3.32.19980927223248.03463a7c@mail.atl.bellsouth.net>
Message-ID: <199809290428.VAA27584@proxy3.ba.best.com>



    --
At 04:06 PM 9/28/98 -0500, Petro wrote:
> The problem isn't issueing the tokens, it's the wallets.
> Token generation would be relatively straight forward, it's
> the user end.

On the contrary, it is the server end that is hard.

Token generation is trivial.  Paying for tokens and getting
paid for them is not trivial.

The problem is that we do not want to force everyone in the
universe to be the clients of a single giant issuer.  That
would bring us right back to the old problem of the
tyrannical and oppressive central bank.

Visualize the following situation.  I buy tokens from Bob,
who may be my local ISP.   I spend them on a server on a site
in Sri Lanka.  The owner of the server cashes them with
Evonne.  My money, aggregated with a multitude of other
peoples money in a multitude of other peoples transactions
flows by some complex and indirect route to through several
different people, and eventually to Evonne, and finally to
the owner of the server in Sri Lanka.

This is the problem that IBM software, for all its faults,
does address, and it is a hard problem. 

    --digsig
         James A. Donald
     6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
     RP+4+If1PSzkOerZiquLbdw7GFRzWkLNjIpl59ZX
     4XzwciXVO1P+jKBeMQjD7fwhYVJqnuMtiNYJ/PnL2
-----------------------------------------------------
We have the right to defend ourselves and our property, because 
of the kind of animals that we are. True law derives from this 
right, not from the arbitrary power of the omnipotent state.


http://www.jim.com/jamesd/����� James A. Donald





From ravage at EINSTEIN.ssz.com  Mon Sep 28 08:33:31 1998
From: ravage at EINSTEIN.ssz.com (Jim Choate)
Date: Mon, 28 Sep 1998 23:33:31 +0800
Subject: Cypherpunks defeat? (fwd)
Message-ID: <199809290436.XAA05069@einstein.ssz.com>



Forwarded message:

> Date: Mon, 28 Sep 1998 21:13:36 -0700
> From: "James A. Donald" 
> Subject: Re: Cypherpunks defeat? (fwd)

> At 10:06 PM 9/28/98 -0500, Jim Choate wrote:
> > I haven't seen that in 10 years or more. I doubt that
> > anyone will find this approach very widely.
> 
> I find this invariably happens with buying computers or guns
> from cheap sources.  If you have never encountered this, you
> are paying too much for your computers and your guns.=20

What in the world do you mean 'cheap sources'?

I doubt I'm paying too much for my hardware.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage at ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------





From stutz at dsl.org  Mon Sep 28 08:51:40 1998
From: stutz at dsl.org (Michael Stutz)
Date: Mon, 28 Sep 1998 23:51:40 +0800
Subject: Why GNU GPL is bad for crypto deployment
In-Reply-To: <199809282336.AAA23094@server.eternity.org>
Message-ID: 



On Tue, 29 Sep 1998, Adam Back wrote:

> Here is problem: say that our goal is to maximise deployment of
> software with crypto built in, especially commercial software.

I think your argument is only valid if you replace "commercial" with
"proprietary" and replace "especially" with "only in the case of."


> Well, it's your code, and you wrote it, so it's your choice: my
> comments are based on the assumption that the author is more
> interested in crypto deployment than in the GNU license virus as a
> means of promoting the availability of source code.

Free software is not about simply providing the source code as a
programmer's convenience, but it ensures that each user has freedom. And
free sofware always leads to the development of _more_ free software (case
in point: GNU C++, which was built off gcc and developed by a consortium
that usually releases non-free software. I expect the same kind of synergies
to occur with GPG and other crypto-related free projects).

If your goal is to maximize the amount of *non-free* software that contains
built-in crypto, then the GNU GPL is not the license to use, because it does
not pander to corporations and other large organizations who benefit by
restricting information to individuals.

If you release your crypto code as public domain, those companies who sell
binaries of non-free, proprietary software will eagerly use your code in
their products. But they (or the govt, or anyone else) are not obligated to
release the source of any improvements or modifications made to your code.

You might think, "This trade-off is okay, since my original code is still
available. But I want the best of both words -- I want GNU people to use my
code, but I also want Microfoo to adapt it, too."

The prospect of Microfoo possibly using your code might tempt you -- this
might get your code in more places right now, but it will not benefit to the
free software community (depending on your license terms, the code may well
be unuseable, or only useable until a replacement is written), and the users
of Microfoo's verion will be deprived of their freedoms to distribute or
adapt your code. So it might not help your long-term goal of maximum crypto
deployment.

Furthermore, if the code were to be released under a "cypherpunks license"
as described -- which added additional restrictions to the use of the code
-- it would not be useable at all on free operating systems. (This is why
PGP had to be rewritten from scratch.)

I would suggest that the GNU GPL, which protects the freedom of all
individuals who use the software, and ensures that the information always
remains free, may be as "cypherpunk" as a software license can get, if the
idea is to keep the information free.

If you want to publish code that individuals are be free to run, copy,
distribute, study, adapt and improve, write free software that can be used
on free operating systems. If you work on and improve this free software,
the body of free software will increase and the currently-in-use non-free
software will head closer to 100% obsolescence. By writing free code, you
will catalyze this process and ensure that free systems contain your code.
You might not have your crypto code on as many systems tomorrow as you would
have if you had been tempted by the thought of proprietary use of your code,
but for the long term, it seems that the best way to ensure that strong
crypto be available everywhere for all individuals is to make that crypto
code free, without exception -- and the best way to do that is to copyleft
it.

For a list of current FSF crypto-related projects, please see
.






From ravage at EINSTEIN.ssz.com  Mon Sep 28 08:53:33 1998
From: ravage at EINSTEIN.ssz.com (Jim Choate)
Date: Mon, 28 Sep 1998 23:53:33 +0800
Subject: Cypherpunks defeat? (fwd)
Message-ID: <199809290455.XAA05296@einstein.ssz.com>



Forwarded message:

> Date: Mon, 28 Sep 1998 21:05:34 -0700
> From: "James A. Donald" 
> Subject: Re: Cypherpunks defeat?

> On the contrary, it is the server end that is hard.

> The problem is that we do not want to force everyone in the
> universe to be the clients of a single giant issuer.  That
> would bring us right back to the old problem of the
> tyrannical and oppressive central bank.

This would argue that what is needed is a distributed server-less protocol.
A peer-to-peer mechanism with a local arbitration mechanism.

> Visualize the following situation.  I buy tokens from Bob,
> who may be my local ISP.   I spend them on a server on a site
> in Sri Lanka.  The owner of the server cashes them with
> Evonne.  My money, aggregated with a multitude of other
> peoples money in a multitude of other peoples transactions
> flows by some complex and indirect route to through several
> different people, and eventually to Evonne, and finally to
> the owner of the server in Sri Lanka.

Whatever that protocol is, it should take care of currency conversion
transparently. Perhaps the wrong approach has been taken from the get go. As
I understand the various approaches every one of the has worried about how
to get the users money transfered into digital tokens. What if we approach
it from the other end and ask:

How can one design a system which focuses on how a users token cache and
converting it to the appropriate currency as required can be realized 
Further, this mechanism should not rely on any centralized server or
arbitration mechanism while doing this specie conversion.

One potential mechanism (admittedly very roughly described) would be to let
each participant in a transaction to agree on the worth of those tokens and
not worry if Bob gets the same bank per token from Sam that he gets from
Sue. So how many tokens Bob gets from Sam each time Sam buys one of Bob's
used CD's wouldn't necessarily be the same number of tokens from Sue, even
though Bob charges the same amount to both Sam and Sue.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage at ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------





From nobody at remailer.ch  Mon Sep 28 09:05:08 1998
From: nobody at remailer.ch (Anonymous)
Date: Tue, 29 Sep 1998 00:05:08 +0800
Subject: Remailers, PGP, and a Project Suggestion
Message-ID: <19980929051529.13737.qmail@hades.rpini.com>



>        So, what you are saying is that you want crypto to protect yourself
>from government intrusion, but are unwilling to actually WRITE the code for
>fear that the government will lock you up.

That's about right. I will write the code for myself. I will not release it
since I'm in the U.S. and it gives the thugs one more reason to come after
me. That job is better suited for somebody who is outside the U.S. or is
actually willing to sit through a long grand jury investigation, possible
indictment, trial, conviction, jail time, and life as a convicted felon.





From nobody at replay.com  Mon Sep 28 09:12:55 1998
From: nobody at replay.com (Anonymous)
Date: Tue, 29 Sep 1998 00:12:55 +0800
Subject: Toto -- mimic function or the real thing (Re: no subject)
Message-ID: <199809290514.HAA24812@replay.com>



Adam Back writes:

>Who knows, if it is Toto, he has been rather careful not to sign
>anything recently :-).
>
>(If he were to sign things it might be helpful for Carl
>Johnson... Toto?)

He could have been one of the guys sending the insults to the spammers
(which I applaud, mind you) and who got into that argument with Paul Meril,
but the wording isn't anywhere near what we've come to expect from Toto. The
two gay sex responses to one of the Six Degrees of Spam users sounds just
like something he might do.

If Toto has been here all along, I think this is one of the most clever
hoaxes which has hit the list in a long time.





From roessler at guug.de  Mon Sep 28 10:50:16 1998
From: roessler at guug.de (Thomas Roessler)
Date: Tue, 29 Sep 1998 01:50:16 +0800
Subject: Why GNU GPL is bad for crypto deployment
In-Reply-To: <199809282336.AAA23094@server.eternity.org>
Message-ID: <19980929083209.A18725@sobolev.rhein.de>



On Tue, Sep 29, 1998 at 12:36:45AM +0100, Adam Back wrote:

> Which is why companies won't touch GNU license stuff with a barge
> pole.

[....]

> Well, it's your code, and you wrote it, so it's your choice: my
> comments are based on the assumption that the author is more
> interested in crypto deployment than in the GNU license virus as a
> means of promoting the availability of source code.

I have to partially object here:  If code is to be used
commercially, lawyers can ask the copyright holders for a different
license, and they may quite well succeed even if the original
distribution was under GPL.

tlr
-- 
Thomas Roessler � 74a353cc0b19 � dg1ktr � http://home.pages.de/~roessler/
     2048/CE6AC6C1 � 4E 04 F0 BC 72 FF 14 23 44 85 D1 A1 3B B0 73 C1





From apf2 at ctv.es  Mon Sep 28 11:11:01 1998
From: apf2 at ctv.es (Albert P. Franco, II)
Date: Tue, 29 Sep 1998 02:11:01 +0800
Subject: New copyright law coming...
Message-ID: <3.0.3.32.19980929090206.006a37c4@pop.ctv.es>




More back room bullshit to screw with us:



This article talks about a new copyright law slithering through congress. 

They're back...





From nobody at replay.com  Mon Sep 28 11:27:18 1998
From: nobody at replay.com (Anonymous)
Date: Tue, 29 Sep 1998 02:27:18 +0800
Subject: Mailing-List
Message-ID: <199809290719.JAA01547@replay.com>



Our mailing list is devoted to the intelligent people who are fighting fo
our freedom using crypto.  although you may fall into the category of
enjoying crypto you are obviously stupid and therefore not what this list is
aimed at.  An intelligent person would ot have sent a message to all the
people on the list asking a dumb question.  There are also a number of
hackers on our list and annoying them means flames galore (possibly)  My
advice is to get an aol account where you will be welcomed

At 03:16 AM 9/28/98 , you wrote:
>
>Please email me information about your mailing-list.
> 





From bill.stewart at pobox.com  Mon Sep 28 11:33:02 1998
From: bill.stewart at pobox.com (Bill Stewart)
Date: Tue, 29 Sep 1998 02:33:02 +0800
Subject: Virus for UNIX
In-Reply-To: <19980926171206.958.rocketmail@send103.yahoomail.com>
Message-ID: <3.0.5.32.19980929001031.00bc0660@idiom.com>



>> On Han Solo  is alleged to have written:
>> >Hello!!!
>> >Somebody can tell me about a site where I can find virus for UNIX
>> >systems.
>> >
>> >I need them please!!!!!!!!!

Go see the paper by Tom Duff and Doug McIlroy.

				Thanks! 
					Bill
Bill Stewart, bill.stewart at pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From bill.stewart at pobox.com  Mon Sep 28 11:42:40 1998
From: bill.stewart at pobox.com (Bill Stewart)
Date: Tue, 29 Sep 1998 02:42:40 +0800
Subject: FWD: California Anti-Spam Legislation Signed
Message-ID: <3.0.5.32.19980929002627.00bc0ce0@idiom.com>



Forwarded from two CYBERIA-L articles:
--------------------------------------
According to a CNET article, yesterday Gov. Wilson signed into law two
pieces of legislation regulating spam.  The first bill requires (1) special
labels on the e-mail, (2) either a real e-mail address or an 800 number
permitting the recipient to be removed from the distribution list, and (3)
penalties if violated.  The second bill (1) permits ISPs to sue spammers
for damages to their systems and (2) outlaws "spoofing."  (I haven't read
the text of the statutes, so my description is a summary of what the
article says.)

Article is at:

http://www.news.com/News/Item/0%2C4%2C26859%2C00.html?dd.ne.tx.ts1.0928

"Both bills go into effect January 1. [The second] provision applies to
email providers that have equipment located in the state. [The first]
provision affects spammers who are located in the state or those who send
unsolicited bulk email to computer users who reside in California."

-------------------------------------

The text of the bill follows the URL which does a better job with the strike outs
than the plain text appended below.

http://www.leginfo.ca.gov/pub/bill/asm/ab_1651-1700/ab_1676_bill_980820_amended_sen.html

Sorry the email width would not handle the URL on one line but ascii text
follows:

BILL NUMBER: AB 1676    AMENDED
        BILL TEXT

        AMENDED IN SENATE   AUGUST 20, 1998
        AMENDED IN SENATE   JUNE 30, 1998
        AMENDED IN ASSEMBLY   APRIL 28, 1998
        AMENDED IN ASSEMBLY   MARCH 26, 1998
        AMENDED IN ASSEMBLY   MARCH 12, 1998

INTRODUCED BY   Assembly Member Bowen
   (Coauthors:  Assembly Members Brown, Campbell, Kuehl, Leach,
Martinez, and Mazzoni)
   (Coauthors:  Senators Dills, Karnette, O'Connell, Solis,
Vasconcellos, and Watson)

                        JANUARY 14, 1998

   An act to amend Section 17538.4 of the Business and Professions
Code, relating to advertising.


        LEGISLATIVE COUNSEL'S DIGEST


   AB 1676, as amended, Bowen.  Advertising:  electronic mail.
   Existing law prohibits a person conducting business in this state
from faxing unsolicited advertising material, unless certain
conditions are satisfied.
   This bill would expand that prohibition to include the
transmission of unsolicited advertising by electronic mail (e-mail),
and would make several related changes.
   This bill would become inoperative if federal law on this subject
is enacted.
   Existing law provides for the regulation of advertising and
provides that a violation of those provisions is a crime.  This bill,
by creating additional prohibitions with regard to advertising,
would expand the scope of an existing crime, thereby imposing a
state-mandated local program.
  The California Constitution requires the state to reimburse local
agencies and school districts for certain costs mandated by the
state. Statutory provisions establish procedures for making that
reimbursement.
   This bill would provide that no reimbursement is required by this
act for a specified reason.
   Vote:  majority.  Appropriation:  no.  Fiscal committee:  yes.
State-mandated local program:  yes.


THE PEOPLE OF THE STATE OF CALIFORNIA DO ENACT AS FOLLOWS:


  SECTION 1.  Section 17538.4 of the Business and Professions Code is
amended to read:
   17538.4.  (a) No person or entity conducting business in this
state shall facsimile (fax) or cause to be faxed, or electronically
mail (e-mail) or cause to be e-mailed, documents consisting of
unsolicited advertising material for the lease, sale, rental, gift
offer, or other disposition of any realty, goods, services, or
extension of credit unless:
   (1) In the case of a fax, that person or entity establishes a
toll-free telephone number that a recipient of the unsolicited faxed
documents may call to notify the sender not to fax the recipient any
further unsolicited documents.
   (2) In the case of e-mail, that person or entity establishes a
toll-free telephone number or valid sender operated return e-mail
address that the recipient of the unsolicited documents may call or
e-mail to notify the sender not to e-mail any further unsolicited
documents.
   (b) All unsolicited faxed or e-mailed documents subject to this
section shall include a statement informing the recipient of the
toll-free telephone number that the recipient may call, or a valid
return address to which the recipient may write or e-mail, as the
case may be, notifying the sender not to fax or e-mail the recipient
any further unsolicited documents to the fax number, or numbers, or
e-mail address, or addresses, specified by the recipient.
   In the case of faxed material, the statement shall be in at least
nine-point type.  In the case of e-mail, the statement shall be the
first text in the body of the message and shall be of the same size
as the majority of the text of the message.
   (c) Upon notification by a recipient of his or her request not to
receive any further unsolicited faxed or e-mailed documents, no
person or entity conducting business in this state shall fax or cause
to be faxed or e-mail or cause to be e-mailed any unsolicited
documents to that recipient.
   (d) In the case of e-mail, this section shall apply when the
unsolicited e-mailed documents are delivered to a California resident
via an electronic mail service provider's service or equipment
located in this state.  For these purposes "electronic mail service
provider" means any business or organization qualified to do business
in this state that provides individuals, corporations, or other
entities the ability to send or receive electronic mail through
equipment located in this state and that is an intermediary in
sending or receiving electronic mail.
   (e) As used in this section, "unsolicited e-mailed documents"
means any e-mailed document or documents consisting of advertising
material for the lease, sale, rental, gift offer, or other
disposition of any realty, goods, services, or extension of credit
that meet both of the following requirements:
   (A)
   (1)  The documents are addressed to a recipient with whom the
initiator does not have an existing business or personal
relationship.
   (B)
   (2)  The documents are not sent at the request of, or with
the express consent of, the recipient.
   (f) As used in this section, "fax" or "cause to be faxed" or
"e-mail" or "cause to be e-mailed" does not include or refer to the
transmission of any documents by a telecommunications utility or
Internet service provider to the extent that the telecommunications
utility or Internet service provider merely carries that transmission
over its network.
   (g) In the case of e-mail that consists of unsolicited advertising
material for the lease, sale, rental, gift offer, or other
disposition of any realty, goods, services, or extension of credit,
the subject line of each and every message shall include "ADV:" as
the first four characters.  If these messages contain information
that consists of unsolicited advertising material for the lease,
sale, rental, gift offer, or other disposition of any realty, goods,
services, or extension of credit, that may only be viewed, purchased,
rented, leased, or held in possession by an individual 18 years of
age and older, the subject line of each and every message shall
include "ADV:ADLT" as the first eight characters.
   (h) An employer who is the registered owner of more than one
e-mail address may notify the person or entity conducting business in
this state e-mailing or causing to be e-mailed, documents consisting
of unsolicited advertising material for the lease, sale, rental,
gift offer, or other disposition of any realty, goods, services, or
extension of credit of the desire to cease e-mailing on behalf of all
of the employees who may use employer-provided and
employer-controlled e-mail addresses.
   (i) This section, or any part of this section, shall become
inoperative on and after the date that federal law is enacted that
prohibits or otherwise regulates the transmission of unsolicited
advertising by electronic mail (e-mail).
  SEC. 2.  No reimbursement is required by this act pursuant to
Section 6 of Article XIIIB of the California Constitution because the
only costs that may be incurred by a local agency or school district
will be incurred because this act creates a new crime or infraction,
eliminates a crime or infraction, or changes the penalty for a crime
or infraction, within the meaning of Section 17556 of the Government
Code, or changes the definition of a crime within the meaning of
Section 6 of Article XIIIB of the California Constitution.
   Notwithstanding Section 17580 of the Government Code, unless
otherwise specified, the provisions of this act shall become
operative on the same date that the act takes effect pursuant to the
California Constitution.


-------------------------------------------------------------------





From nobody at replay.com  Mon Sep 28 11:56:31 1998
From: nobody at replay.com (Anonymous)
Date: Tue, 29 Sep 1998 02:56:31 +0800
Subject: Unix virus
Message-ID: <199809290750.JAA03612@replay.com>



aside from the fact that for a virus to correctly write to files on the unix
system you would need to have suffficiant read/write access,  you are
obviously too stupid to be able to accomplish this successfully.  One way to
ruin the system would be with a gun, that  is about the best that you will
be able to do considering your intellect.





From health at success600.comt  Tue Sep 29 04:54:47 1998
From: health at success600.comt (health at success600.comt)
Date: Tue, 29 Sep 1998 04:54:47 -0700 (PDT)
Subject: Health And wealh  -62803
Message-ID: <199809291154.EAA10721@toad.com>


This is a FREE offer if you wish to be removed from future mailings, please e-mail 
to� (remove at success600.com) Put remove in the subject and this software will 
automatically block you from their future mailings.

Attention Network Marketers & 
Opportunity Seekers!!
STOP  Wasting your time 
& Money

I'll Show You How To Turn A One Time 
$10 into  $1,500 
Per Month, Per week, or Even Per Day.
Call   800 306 4146

NO RISK-HIGH RETURN PRODUCT 
DRIVEN

We DARE you to compare.
No gimmicks, No Hassles, No Products to Inventory, No Break 
away-No take Away
No Hoops to jump Through, Hottest Comp Plan Ever
Are You Starting to get the Picture? 
Get Paid NOW!  For What You Do NOW!

Earn $1,500 over & over 
Again!

You Ask Why is this so Different? 

Call 2 minute overview  800  600-0343 Ex 
1489

Then  Call   800 306 4146
 for more Information 

Get The Facts, Call Our Simple Proven System


The First 10 To join the "Master Plan" 
 I will send 125,000 Emails (FREE) to jump start your 
Business 

Solid  Debt FREE company, Not a startup
Sizzle product with good Documentation, MSM.
One time out of pocket of $10, $60, $160, or 460
Toll Free telesponsoring, 24 hours a day. (No more Orphans or 
waiting to be Processed)
Sponsor just 2 to qualify for commissions
Get Paid unlimited Depth, calculated daily, 7 days a week,  paid 
Weekly
Serious Upline Support! We are committed to helping everyone
Turn Key Marketing System, co-op Advertising 


Only 1 time $10  Could make you more money than you Dreamed 
of!!!
For $10 one time fee, you could build up to $45,000 per MONTH 

Easy program to promote..... You don't have to sell anyone on the 
product! 
Everyone knows the product.  one of the HOTTEST Products in 
the industry!!

Have fun! This is easy, simple, no-brainer, uncomplicated 
program!!!

Call   800 306 4146
to get started







From stuffed at stuffed.net  Tue Sep 29 06:18:08 1998
From: stuffed at stuffed.net (STUFFED NEWS DAILY)
Date: Tue, 29 Sep 1998 06:18:08 -0700 (PDT)
Subject: TODAY'S NEWS AND PICS PACKED STUFFED! - READ IT NOW!
Message-ID: <19980929071000.11862.qmail@eureka.abc-web.com>


+ 30 FREE HOT JPEG PHOTOS
+ 5 SUPER SEXY STORIES
+ TONGUE TWISTER
+ SEX AGE AND UNDERPANTS
+ APHRODISIACS
+ THE BEST OF EUREKA
+ WE ALL LOVE OUR PORN
+ LA VIDA CALIENTE
+ BABY EATING PYTHON
+ SAN FRANCISCO SEX REACTION
+ BIRTHDAY GIRL-ERICKA

       ---->   http://stuffed.net/98/9/29/   <----

Welcome to  today's  issue of Stuffed. To read it you should
click on the URL above.  If it is not made clickable by your
email program  you will need to  use your mouse to highlight
the URL,  copy it and then paste it into your browser  (then
press Return).

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!

       ---->   http://stuffed.net/98/9/29/   <----





From leif at imho.net  Tue Sep 29 06:38:48 1998
From: leif at imho.net (Leif Ericksen)
Date: Tue, 29 Sep 1998 06:38:48 -0700 (PDT)
Subject: Bill Gates Jokes
Message-ID: <3610E19E.A6070FEB@imho.net>


This is a top ten list of how to Irritate Bill Gates...  To funny to not
post!
> 
> Today's MailBits.com Joke:
> 
> >From the Home Office in Wahoo, Nebraska,
> it's the Top Ten List for April 21, 1998 
> 
> Top Ten Ways to Irritate Bill Gates
> 
> 
> 10. Steal his "nerdboy" license plate. 
> 
> 9. Accuse him of sexually harassing your laser jet printer.
> 
> 8. Beat his high score on Tetris. 
> 
> 7. Ask him if they caught the guy who did that to his hair.
> 
> 6. Tell him you heard he's "microsoft." 
> 
> 5. Leave his Spock ears on your dashboard so they melt. 
> 
> 4. Let the air out of the tires on the Gatesmobile. 
> 
> 3. Drop hints that Oprah's richer than he is. 
> 
> 2. WWW him right in the dot-com. 
> 
> 1. Two words: dork tax. 
> 
> 
> ========
> Did you see today's advertiser (above)?
> 
> They need you to fill out surveys--and they'll PAY YOU!
> 
> Have a look.
> ========
> 
> 
> 
> ==> Want to forward this mailing to a friend? Go ahead! But
> be sure to forward the whole message (including the
> copyright notice below).
> 
> 
> (C) Copyright MailBits.com 1998. To subscribe to this free
> mailing, go to http://www.MailBits.com/Jokes or, for
> automatic subscription, send email to Jokes at MailBits.com
> 
> 
> 
> ____________________
> This email is part of your joke-a-day subscription. You can
> cancel your subscription at any time by going to
> http://www.mailbits.com/ or by sending email to
> jokes.unsubscribe at mailbits.com
> 
> Know a (clean) joke? Send it to SubmitJokes at MailBits.com
> 
> To contact us, email feedback at mailbits.com
> 
> 
> 
			- lhe





From nobody at replay.com  Mon Sep 28 15:58:33 1998
From: nobody at replay.com (Anonymous)
Date: Tue, 29 Sep 1998 06:58:33 +0800
Subject: Joe Farah 9/14 (Pppbbbttt)
Message-ID: <199809291142.NAA23043@replay.com>



Everybody's belief/morals are different.  For instance I take that
last paragraph of yours and laugh at it.  To many americans doing so
would not be immoral because many people don't believe in god.  Your
moral yardstick would be different from mine.  People in the bible
belt have different morals from those in las vegas.  If I had religous
right morals I'd kill myself.


---Richard.Bragg at ssa.co.uk wrote:
>
> >>Almost 60 percent of those polled said they thought Clinton was
fit to be
> >>president. By what standard? That's the trouble. Americans have no
> >>standards -- no unchangeable yardsticks by which they measure
right and
> >>wrong, truth from fiction.
> 
> >By *their* standard, by their own personal judgement. There's no
moral
> >yardstick, and God help us if there is in the future. Who makes the
> >yardstick? Who sits down and says, "This is the moral standard in
this
> >country, abide by it or suffer the consequences"?
> 
> Sorry but there are absolutes and there is a moral yardstick. 
Whether this
>  is accepted or not is beside the point.
> 
> There has to be absolutes otherwise any action can be excused (or
damned).
>   The real cry should be
> "God help us to instigate Your yardstick".  God doesn't change and
neither
> does His measure.
> 
> 1)Love the Lord, with all your heart, with all you soul with all
your mind
> and all your strength
> 2)Love you neibour as yourself.
> 
> Everything else hangs on these.
> 
> 
> 

==
"The same thing we do every night Pinkey,
 try to take over the WORLD!"
                          - The brain
_________________________________________________________
DO YOU YAHOO!?
Get your free @yahoo.com address at http://mail.yahoo.com





From aba at dcs.ex.ac.uk  Mon Sep 28 16:05:12 1998
From: aba at dcs.ex.ac.uk (Adam Back)
Date: Tue, 29 Sep 1998 07:05:12 +0800
Subject: Remailers, PGP, and a Project Suggestion
In-Reply-To: <19980929051529.13737.qmail@hades.rpini.com>
Message-ID: <199809291039.LAA26488@server.eternity.org>




Anonymous writes:
> >        So, what you are saying is that you want crypto to protect yourself
> >from government intrusion, but are unwilling to actually WRITE the code for
> >fear that the government will lock you up.
> 
> That's about right. I will write the code for myself. I will not release it
> since I'm in the U.S. and it gives the thugs one more reason to come after
> me. That job is better suited for somebody who is outside the U.S. or is
> actually willing to sit through a long grand jury investigation, possible
> indictment, trial, conviction, jail time, and life as a convicted felon.

Ah come on, it isn't that bad.  Just put it on a crypto site with some
dumb revolving password scheme, or give it to someone else to put no
theirs.  It'll be on replay with-in a few hours, if anyone is
interested in the code.

Also you seem happy using remailers, so you could as easily publish
anonymously.

Don't let a few cold war hang-over export regs stifle your crypto
coding creativity!

Adam





From sorens at workmail.com  Mon Sep 28 16:08:28 1998
From: sorens at workmail.com (Soren)
Date: Tue, 29 Sep 1998 07:08:28 +0800
Subject: Superterrorism
In-Reply-To: <199809282332.TAA26652@camel8.mindspring.com>
Message-ID: <3610CAF7.42A2CB6C@workmail.com>



Good analysis, but conventional and poor conclusions.  In the words of
Baba Re-bop,  "If
you want to get kids off drugs (or CBW) ... Simple, improve reality"

John Young wrote:

> The Fall issue of Foreign Policy has an article, "The Great
> Superterrorism Scare," which critiques the national "obsession"
> with the threat of terrorist use of weapons of mass destruction:
>
>    http://jya.com/superterror.htm  (36K)
>
> It examines the reasons for the obsession, who is promoting
> it, who benefits, and what problems it may cause by diverting
> attention and resources away from genuine threats of lesser
> magnitude from religious cults, loners, antitaxers, militias and
> those with raging paranoia against the government.
>
> It's worth noting that the author recommends arrests be
> allowed of suspicious domestic hostiles though there is no proof
> of criminal intent, and that the FBI and CIA be freed from
> limitations on surveilling and investigating US citizens.







From nobody at replay.com  Mon Sep 28 16:18:26 1998
From: nobody at replay.com (Anonymous)
Date: Tue, 29 Sep 1998 07:18:26 +0800
Subject: Democracy...
Message-ID: <199809291205.OAA24670@replay.com>



The government can't make laws favoring one religion thereby
restricting another religion.  The urban legend that it was only meant
to stop government from restricting a religion was a misquote from
some misguided pastor.  Separation of church and state is just that,
that is what the country was founded on.  This is also a thread for
the lists and newsgroups that it was intended for.




---Jaeger  wrote:
>
> well, the first amendment is what I expected to be used...
> unfortunately, the phrase "...wall of separation between church and
> state" is not taken from the first amendment.  It is taken from a
letter
> written by Thomas Jefferson...  and the meaning is not that church
> shouldn't have an effect on the state.  The state CAN support one
> religion over another.  In context, the phrase simply explains that
the
> government can't make laws that RESTRICT religious practice or
doctrinal
> issues.  The state CAN make laws that encourage the practice of any
one
> particular religion, as long as the laws do not RESTRICT the
PRACTICE of
> other religions.  Making people uncomfortable isn't a constitutional
> reason to overturn a law.
> 
> btw, notice the wording in the first amendment...it only restricts
gov't
> restrictions on religion.
> 
> Jaeger
> 
> > Gee, check out the First Amendment to the U.S. Constitution. Also
the
> > first
> > item in the Bill of Rights. "Congress shall make no law respecting
the
> >
> > establishment of religion or prohibiting the free exercise
thereof..."
> >
> > (from memory, so don't bother me with minor wording corrections.)
> >
> > By standard convention, this is also referred to as "separation of
> > church
> > and state."
> >
> > As with the clueless AOLers yakking about an "Assimov" story they
read
> > a
> > couple of years ago in the 5th grade, you bozos need to get educated
> > and
> > spend a minute or two thinking before writing.
> >
> 
> 
> 
> 

==
"The same thing we do every night Pinkey,
 try to take over the WORLD!"
                          - The brain
_________________________________________________________
DO YOU YAHOO!?
Get your free @yahoo.com address at http://mail.yahoo.com





From adam at homeport.org  Mon Sep 28 16:23:16 1998
From: adam at homeport.org (Adam Shostack)
Date: Tue, 29 Sep 1998 07:23:16 +0800
Subject: GPL & commercial software, the critical distinction (fwd)
In-Reply-To: <199809290009.TAA03654@einstein.ssz.com>
Message-ID: <19980929081450.A3534@weathership.homeport.org>



On Mon, Sep 28, 1998 at 07:09:51PM -0500, Jim Choate wrote:
| 
| The problem with your interpretation is that in a sense you want your cake and
| eat it too. In short you want to be able to use somebody elses code in your
| product without their having a say in how their code is used or receiving a
| cut of the profits. The GPL/LGPL is specificaly designed to prevent this.


	I'll suggest that in a security context, having ones cake and
eating it too may not be such a bad thing.  If I can develop a
commercial product with crypto code thats been made available to the
community, then there is a lower chance the code will contain bogosity 
in its security critical functions.

	The GPL (not the LGPL) specifically prevents this with the
best of intentions.

Adam

-- 
"It is seldom that liberty of any kind is lost all at once."
					               -Hume






From declan at well.com  Mon Sep 28 16:29:54 1998
From: declan at well.com (Declan McCullagh)
Date: Tue, 29 Sep 1998 07:29:54 +0800
Subject: IP: The virtual president
In-Reply-To: <199809290021.RAA15032@netcom13.netcom.com>
Message-ID: 



I enjoy reading WorldNetDaily and all that, but it's a far cry from "the
mainstream media."

Sign me,

A reporter in the mainstream media

Time Inc.
Washington, DC


> 
> From: Jean Staffen 
> Subject: IP: The virtual president
> Date: Fri, 25 Sep 1998 22:22:11 -0500 (CDT)
> To: ignition-point at majordomo.pobox.com
> 
> This is the most INCREDIBLE article.  I never thought I'd read something
> like this in the mainstream media!!! -Jean
> 
> 
>                    The virtual president=20
>                  =20
> 
>                    By Missy Kelly=20
>                    Copyright 1998, WorldNetDaily.com=20
> 
>                    "You know, by the time you become the leader of a
>                    country, someone else makes all the decisions." -- Bill
>                    Clinton September 4, 1998=20
> 





From jya at pipeline.com  Mon Sep 28 16:43:44 1998
From: jya at pipeline.com (John Young)
Date: Tue, 29 Sep 1998 07:43:44 +0800
Subject: Army Plonks
Message-ID: <199809291237.IAA08647@camel7.mindspring.com>



Now that the terrified US Army has axed its Web sites, and 
NSA and several other mil sites seem inaccessible and
"temporarily unavailable" this morning, could this portend
a dual-use of the Internet, a closed one for porkbarrell mil and
secret gov sweethearts and a sappy infotainment one for civilians 
to gameboy infofoolery?

That would be a tri-power-gov implementation of dual-use 
terror-scare to hide perkbellied privileges of natsec obsession.









From ravage at EINSTEIN.ssz.com  Mon Sep 28 17:02:57 1998
From: ravage at EINSTEIN.ssz.com (Jim Choate)
Date: Tue, 29 Sep 1998 08:02:57 +0800
Subject: GPL & commercial software, the critical distinction (fwd)
Message-ID: <199809291302.IAA06395@einstein.ssz.com>



Forwarded message:

> Date: Tue, 29 Sep 1998 08:14:50 -0400
> From: Adam Shostack 
> Subject: Re: GPL & commercial software, the critical distinction (fwd)

> On Mon, Sep 28, 1998 at 07:09:51PM -0500, Jim Choate wrote:
> | 
> | The problem with your interpretation is that in a sense you want your cake and
> | eat it too. In short you want to be able to use somebody elses code in your
> | product without their having a say in how their code is used or receiving a
> | cut of the profits. The GPL/LGPL is specificaly designed to prevent this.
> 
> 
> 	I'll suggest that in a security context, having ones cake and
> eating it too may not be such a bad thing.

Only if you're the author or publisher and your goal is to watch your bank
account grow to exclusion of all else, everybody else gets screwed.

>  If I can develop a
> commercial product with crypto code thats been made available to the
> community, then there is a lower chance the code will contain bogosity 
> in its security critical functions.
> 
> 	The GPL (not the LGPL) specifically prevents this with the
> best of intentions.

Prevents what, releasing commercial code within a L/GPL'ed context? No, it
doesn't. What it does do is *guarantee* that the customer has some chance of
understanding what his code does (it's called code review and is highly
regarded in crypto algorithm analysis circles) and makes sure the original
L/GPL'ed holder has a stake in any commercial ventures the *source* code is
used in.

I'd say that's a win-win for everyone except those who want something for
nothing so they can buy a new expensive do-dad.

I'll say it again, neither the GPL or the LGPL prevent fully commercial
code development. *HOWEVER* to do that within the context *requires* that
the API to your commercial applications be released and available. This is a
good thing. The only objection to releasing an API is to stifle competition,
*THAT* is a bad thing.

The idea from a free-market perspective:

The idea is that while the actual source code is protectable the API is not
so that *fair* competition can be ensured. The whole free-market theory
must exist in a fairly competitive market. In the context of software that
means full and open API's so that alternate but compatible libraries can
exist and the consumer (not the manufacturer, the hallmark of a
competitively impoverished market) can decide which is the most reliable and
stable version.

Had Microsoft, for example, been required to publish their API's by the
market we wouldn't be spending all this effort and money on the current
proceedings. That would be a win-win for everyone (well except Bill who
probably wouldn't be worth a value equivalent to the holdings of 40+M US
citizens combined).

Anyone who objects to published API's is aware their code is trivial and not
worth it's price or their code is written poorly and easily improved upon.

Bottem line, if you believe in a free-market (which requires fair
competition to work and prevent monopolies) and object to releasing your
API's then you're a hypocrit.

Having your cake and eating it too *never* works, except in Wonderland.

There should be no objection to making oneself wealthy, but not at the
expense of others. Let the quality of your product define your reputation,
not your greed. Become the best supplier of niche code there is because the
code is well fast, failure tolerant, and reliable - not because you've
managed to squeeze all potential competitors out.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage at ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------





From bluesky17 at mailexcite.com  Tue Sep 29 08:09:57 1998
From: bluesky17 at mailexcite.com (bluesky17 at mailexcite.com)
Date: Tue, 29 Sep 1998 08:09:57 -0700 (PDT)
Subject: GOLD IN BOLIVIA
Message-ID: <199809291509.IAA12218@toad.com>



INTRODUCTION

SUN RIVER MINING, INC. offers investors an incredible 
ground-floor
investment opportunity in a company that is slated to begin 
producing 
gold during 1999 at a cash cost of less than US$100 per ounce!

Sun River Mining went public in September and trades on the 
NASDAQ OTC 
electronic bulletin board under the symbol "SUNR".  Sun River 
Mining is 
tightly-held (insiders hold 7.8 million shares), has a limited 
float 
(approximately 1.5 million shares) and is not very widely known.

The Company's primary business is the acquisition, exploration 
and
development of placer gold projects in Bolivia, with the goal of 
becoming 
Bolivia's largest and lowest-cost alluvial gold producer.  The 
management 
team has over 60 years of placer mining experience.


THE COMPANY

Sun River Mining, through its Bolivian subsidiary, North Bolivian
Investment S.A. has entered into a Letter of Understanding 
Agreement 
with Aluvion S.A. and its shareholders to acquire up to an 81% 
equity 
interest in Aluvion, which is a Bolivian company holding mineral 
concessions in the Tipuani River basin.  Aluvion management  has 
extensive dredging experience in alluvial / placer gold prospects 
and 
owns hydraulic excavation equipment.

The Company has obtained a report on the Tipuani River prospects 
of 
Aluvion from the respected mining and engineering firm in Denver, 
Colorado of Watts, Griffis & McOuat, Limited ("WGM").  The Report 
concluded that "there are indeed significant volumes of unmined 
uriferous gravels to justify interest in establishing commercial 
operations based on these deposits." WGM recommended 
additional drilling of prospects for evaluation purposes,
and that negotiations to reduce royalty interests in the 
concessions begin.

The company is currently seeking funding sources and / or 
oint venture partners to provide capital for the pursuit of the 
Aluvion S.A.opportunities.  The Letter of Understanding Agreement 
requires aggregate payments of $7,189,000 to complete a 74.324% 
equity interest acquisition of Aluvion, of which over $400,00 has 
been 
advanced to Aluvion with $5.57 million due January 31, 1999 and a 
further 
$1.2 million to be paid out of production.  Further, $2.5 million 
additional 
paid in capital would increase SUNR's equity interest in Aluvion 
to 81%.  
There are on-going negotiations with several financing sources; 
however, 
the Company has not received a binding commitment for such funds 
at this 
time, nor are there guarantees or assurances that such a 
financing can be 
arranged on terms acceptable to Sun River Mining.

Sun River Mining's Denver-area location allows it to tap into a 
wealth of local 
technical, financial and operational expertise.  Other 
Colorado-based firms with 
major property positions as well as operating and developing 
mines in Bolivia 
include:  Orvana Resources (developing the Don Mario and Pederson 
gold projects), 
Granges, Inc. (undertaking feasibility studies on the Capa Circa 
and Amayapampa 
deposits), and Golden Eagle International.


MANAGEMENT

Among operating companies, a key component of success is the 
experience of the 
management team.

If Sun River Mining acquires Aluvion S.A., it will have the 
benefit of
Gaston Fernandez (currently the President of Aluvion) who has 45 
years 
of mining experience, mostly in dredging operations in South 
America.  
Mr. Fernandez was Chief Engineer on the Kaka River dredge 
operated 
by South America Placers, Inc. from 1957 - 1965, using the same 
dredge 
that Sun River Mining / Aluvion intends to acquire, refurbish and 
use 
on the Tipuani & Kaka River projects.  His son, Marcelo 
Fernandez, is 
a mining engineer with over 20 years of placer mining experience 
(a graduate 
of the Colorado School of Mines), who is employed by Aluvion as 
technical 
and operations manager for the Lower Tipuani and Kaka River gold 
projects.


THE PROSPECTS

Lower Tipuani.  The Lower Tipuani prospects cover approximately 8 
km along 
the Tipuani River between the towns of Guanay and Tipuani. Guanay 
is located 
105 kilometers north of LaPaz, Bolivia, and is connected with 
LaPaz by a 230-km 
paved, gravel and dirt road (a new paved road is under 
construction).

In the Lower Tipuani area, the river is 30 to 60 meters wide and 
up to 10 meters deep.  
All of the necessary infrastructure is in place, including a 
100-man base camp, 
access roads and high voltage hydroelectric power lines.

An environmental impact study has been completed and approved by 
the Bolivian government.  
The one remaining permit necessary to begin construction, the 
"environmental 
operating license", takes about 60 days to receive (Aluvion needs 
to provide 
Bolivian government with information on the equipment to be used 
and a schedule 
for the exploitation phase).

Planned mining operations would involve dredging, washing and 
filtering river 
gravels to recover free particles of gold and produce dore bars 
(> 95% Au).  With no 
chemical processes involved, mining and processing operations do 
not pose the 
risk of introducing into the environment the chemicals used to 
recover gold by 
many other mining projects.

The Lower Tipuani alluvials would be mined out over a four-year 
span (1999 - 2002).  
During this period, Aluvion projects recovering over 257,000 
ounces of gold, or 
an average of 64,300 ounces per year.  Cash operating costs are 
estimated at US$93 
per ounce (these projections have been reviewed by Watts, Griffis 
& McOuat).

Kaka River.  Subject to financing, operations are currently 
projected to begin in 
the year 2000; gravel deposits, if economically producable, could 
last for an 
estimated minimum 20 year mine life (this prospect is not subject 
to seasonal 
shutdowns during the rainy season).

Sun River Mining / Rio Del Sol have entered into a letter of 
intent with
Central Cooperative Teoponte, which represents nine local 
cooperatives 
operating along the Kaka River.  Subject to funding and 
performance requirements, 
the Kaka River properties are expected to be acquired in return 
for a production 
royalty (no cash / shares / debt).

NEW LISTING ("SUNR" on OTC:BB)

GOLD PRODUCTION PROJECTED TO BEGIN IN 1999

PROJECTED ANNUAL PRODUCTION OF > 150,000 oz/yr @ US$96/oz

FOR MORE INFORMATION CONTACT:

SUN RIVER MINING, INC.
Suite  201    5353 Manhattan Circle
Boulder, Colorado  80303  USA

Phone: (303) 543 - 8434    

WATTS, GRIFFIS & McOUAT REPORT


NOTE: For those on the internet who do not want to recieve 
exciting messages 
such as this.....
* To be removed from our mailing list, call us 
direct @ 702-257-8547 ext 143 for removal. 

*We strive to comply with all state and federal laws and to send 
ads only to interested parties.

*This ad is not intended for nor do we knowingly send to 
Washington State residents. 

* OR CLICK_HERE_TO_GOTO_REMOVE-LIST.COM   
(http://remove-list.com)
Remove-List is a free public service offering to help the general 
public
get removed from commercial mailings lists and has not sent this 
message.
If you want their help please add your name to their list and we 
you will
not receive a commercial email from us or any other member bulk 
emailer.

* Responding to the "return address" will NOT have your name 
removed. 




 
 
 
 
 
 
 
 





From ravage at EINSTEIN.ssz.com  Mon Sep 28 17:20:05 1998
From: ravage at EINSTEIN.ssz.com (Jim Choate)
Date: Tue, 29 Sep 1998 08:20:05 +0800
Subject: Army Plonks (fwd)
Message-ID: <199809291321.IAA06472@einstein.ssz.com>



Forwarded message:

> Date: Tue, 29 Sep 1998 08:30:38 -0400
> From: John Young 
> Subject: Army Plonks

> Now that the terrified US Army has axed its Web sites, and 
> NSA and several other mil sites seem inaccessible and
> "temporarily unavailable" this morning, could this portend
> a dual-use of the Internet, a closed one for porkbarrell mil and
> secret gov sweethearts and a sappy infotainment one for civilians 
> to gameboy infofoolery?
> 
> That would be a tri-power-gov implementation of dual-use 
> terror-scare to hide perkbellied privileges of natsec obsession.

It's called milnet and it's been in existance ever since about '83. It
occured when ARPA became DARPA. I was working on a DoD project at UT Austin
at the time.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage at ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------





From billp at nmol.com  Mon Sep 28 18:29:29 1998
From: billp at nmol.com (bill payne)
Date: Tue, 29 Sep 1998 09:29:29 +0800
Subject: complex mathematical formulae
Message-ID: <3610EC34.4939@nmol.com>

I hope http://www.jya.com/itl-news.htm enjoys black and white.

"complex mathematical formulae"  aka  pseduomathematics

  Then, in late 1942, the Royal Navy switched codes to the one-time
  pad system. The Nazi tap was lost forever because the
  pad system is unbreakable in both theory as well as practice.
  U-boats could no longer ambush helpless ships like wolves on
  sheep. Convoy after convoy arrived safe and intact, protected in the  
  armor of an unbreakable code system. The U-boats had
  to change tactics. http://www.us.net/softwar/

  Germany used the enigma algorithm and machine.

  Japan used the purple algorithm.

  And look what happened to them!

I hope all of this helps Charles R Smith's business.
http://www.softwar.net/plight.html

Title: Black and White Test of Cryptographic Algorithms




	

	
		
			
				
					Jump to Forum
					Click Image to Jump to Next Article 
					Go to Text Only Print Version 
				
			
			
			Black and White Test
			of Cryptographic Algorithms
			by William H. Payne
			This article requires special formatting.
			Please Click Here to Read
			
				Send This Article to a Friend:
				
					
						
						�
					
						
							Your Name:
					
					
						
							
					
				
				
					�
					
						
							Email Address of your Friend: 
					
					
						
							
					
				
				
					�
					
						
							Your Email address:
					
					
						
							
					
				
				
					�
					�
					�
				
				
					�
					
						
							
					
				
			
			�
			Back to Home Page
			Quick Menu 
			Visit the Button Shop 
			
			
			Interactive Forum
			Black and White Test
			of Cryptographic Algorithms
			
			
			
			
			
			E-mail the Editor
			
			
			
			
			
			
			�
		
	





From adam at homeport.org  Mon Sep 28 18:34:02 1998
From: adam at homeport.org (Adam Shostack)
Date: Tue, 29 Sep 1998 09:34:02 +0800
Subject: GPL & commercial software, the critical distinction (fwd)
In-Reply-To: <199809291302.IAA06395@einstein.ssz.com>
Message-ID: <19980929103338.A4370@weathership.homeport.org>



On Tue, Sep 29, 1998 at 08:02:29AM -0500, Jim Choate wrote:
| Forwarded message:
| 
| > Date: Tue, 29 Sep 1998 08:14:50 -0400
| > From: Adam Shostack 
| > Subject: Re: GPL & commercial software, the critical distinction (fwd)
| 
| > On Mon, Sep 28, 1998 at 07:09:51PM -0500, Jim Choate wrote:
| > | 
| > | The problem with your interpretation is that in a sense you want your cake and
| > | eat it too. In short you want to be able to use somebody elses code in your
| > | product without their having a say in how their code is used or receiving a
| > | cut of the profits. The GPL/LGPL is specificaly designed to prevent this.
| > 
| > 
| > 	I'll suggest that in a security context, having ones cake and
| > eating it too may not be such a bad thing.
| 
| Only if you're the author or publisher and your goal is to watch your bank
| account grow to exclusion of all else, everybody else gets screwed.

What did I say about not paying for people's work?  I'm perfectly
happy to pay for code, and I prefer to buy open source code; it tends
to be higher quality.  I don't want to have to accept your opinion on
how I should release code along with the code.

| >  If I can develop a
| > commercial product with crypto code thats been made available to the
| > community, then there is a lower chance the code will contain bogosity 
| > in its security critical functions.
| > 
| > 	The GPL (not the LGPL) specifically prevents this with the
| > best of intentions.
| 
| Prevents what, releasing commercial code within a L/GPL'ed context? No, it
| doesn't. What it does do is *guarantee* that the customer has some chance of
| understanding what his code does (it's called code review and is highly
| regarded in crypto algorithm analysis circles) and makes sure the original
| L/GPL'ed holder has a stake in any commercial ventures the *source* code is
| used in.

	You're being intentionally obtuse.  I excluded the L/GPL from
my comments, and you respond to them as if I was discussing the
L/GPL.	Further, I said above that using code thats been reveiwed is
better from a security perspective.

Adam


-- 
"It is seldom that liberty of any kind is lost all at once."
					               -Hume






From guy at panix.com  Mon Sep 28 19:29:46 1998
From: guy at panix.com (Information Security)
Date: Tue, 29 Sep 1998 10:29:46 +0800
Subject: Meriweather v. Gates
Message-ID: <199809291521.LAA01780@panix7.panix.com>



   >   Reply-To: Tim May 
   >
   >   It's an ironic indication of where we are that Bill Gates is being hounded
   >   by the Justice Department, Sun Microsystems, Netscape, Novell, and Ralph
   >   Nader while no one is hounding John Meriwether. In fact, the Federal
   >   Reserve System, nominally nongovernmental (wink wink) just helped to bail
   >   out his firm, Long-Term Capital Management.
   >
   >   Gates, you see, has a non-leveraged investment of $50 billion in Microsoft.
   >   No borrowing, no margin debt, just plain old-fashioned ownership.

And a monopoly that doesn't need a bailout.

   >   Meriwether, on the other hand, started in 1991 and took in money from
   >   speculators. He took the $2.2 billion and borrowed with it, hitting the
   >   $125 B in borrowed assets point. Then he and his rocket scientists
   >   essentially borrowed still more, using this $125 B to leverage $1.25 T. (T
   >   for "trillion.")
   >
   >   Not  bad, going from $2.2 B to $1.25 T, a mere 500-fold increase.

Sheer unmitigated greed on the part of the banks, not knowing or
forcing Meriwether to tell them.

Over leveraging is what caused the Great Depression via the stock market collapse.
---guy

   Gosh, thank goodness they are loosening the bank/brokerage rules...not.





From declan at well.com  Mon Sep 28 19:34:13 1998
From: declan at well.com (Declan McCullagh)
Date: Tue, 29 Sep 1998 10:34:13 +0800
Subject: Horde this Book: the first Y2K action novel
Message-ID: 





---------- Forwarded message ----------
Date: Tue, 29 Sep 1998 08:01:12 -0700 (PDT)
From: Declan McCullagh 
To: politech at vorlon.mit.edu
Subject: Horde this Book: the first Y2K action novel






http://cgi.pathfinder.com/netly/0,2326,201980929-14649,00.html

TIME Digital's Netly News
September 29, 1998

   Horde This Book
   By Declan McCullagh (declan at well.com)

   Book Review America's computers crashed on January 1, 2000. Cars won't
   start, planes won't fly, and the military is in shambles. Soldiers of
   unknown origin have seized control of a key high-tech company. China
   is about to invade. The one man who can save Western civilization from
   a Digital Dark Age is Y2K fixmeister Mark Solvang. Mark's problem?
   Well, it happens to be his company those troops took over. What comes
   next is a predictable romp through gun battles, hacking, and
   government intrigue that's sure to satisfy Chuck Norris fans but leave
   anyone else hoping for more.

   [...remainder snipped...]







From ravage at EINSTEIN.ssz.com  Mon Sep 28 21:22:02 1998
From: ravage at EINSTEIN.ssz.com (Jim Choate)
Date: Tue, 29 Sep 1998 12:22:02 +0800
Subject: GPL & commercial software, the critical distinction (fwd)
Message-ID: <199809291721.MAA07404@einstein.ssz.com>



Forwarded message:

> Date: Tue, 29 Sep 1998 10:33:38 -0400
> From: Adam Shostack 
> Subject: Re: GPL & commercial software, the critical distinction (fwd)

> What did I say about not paying for people's work?  I'm perfectly
> happy to pay for code, and I prefer to buy open source code; it tends
> to be higher quality.  I don't want to have to accept your opinion on
> how I should release code along with the code.

Jesus Christ on a stick. Take a fucking chill pill Adam.

That 'you' is the literary you, not you personaly. You (not the literary
you) should seriously consider counseling. Talk about hair-triggered.

If anybody is guilty of demanding people do it 'their way' it's you.

You really need to better understand this inability of yours to seperate
your self-worth as an individual from the ideas you espouse and supposedly
put out for public dialog.

Everybody has stupid idea, if you can't admit that then there's a problem
more serious than having stupid ideas. Everybody makes mistakes everyday,
and if you seriously think you don't then you have found your first mistake
today.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage at ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------





From petro at playboy.com  Mon Sep 28 21:36:01 1998
From: petro at playboy.com (Petro)
Date: Tue, 29 Sep 1998 12:36:01 +0800
Subject: Remailers, PGP, and a Project Suggestion
In-Reply-To: <19980929051529.13737.qmail@hades.rpini.com>
Message-ID: 



At 12:15 AM -0500 9/29/98, Anonymous wrote:
>>        So, what you are saying is that you want crypto to protect yourself
>>from government intrusion, but are unwilling to actually WRITE the code for
>>fear that the government will lock you up.
>
>That's about right. I will write the code for myself. I will not release it
>since I'm in the U.S. and it gives the thugs one more reason to come after
>me. That job is better suited for somebody who is outside the U.S. or is
>actually willing to sit through a long grand jury investigation, possible
>indictment, trial, conviction, jail time, and life as a convicted felon.

	Cleanse it of your identity (or start a pseudonym if you need the
ego boost), and get it to hacktic. PD/BSDL/GPL the code, and go.

	Use the tools to "free" yourself.

	If the law is bad, ignore it whenever possible. This is a very
ignorable law.
--
petro at playboy.com----for work related issues. I don't speak for Playboy.
petro at bounty.org-----for everthing else.      They wouldn't like that.
                                              They REALLY
Economic speech IS political speech.          wouldn't like that.





From mb2657b at enterprise.powerup.com.au  Tue Sep 29 13:06:57 1998
From: mb2657b at enterprise.powerup.com.au (Scott Balson)
Date: Tue, 29 Sep 1998 13:06:57 -0700 (PDT)
Subject: One Nation launch - the day the media snapped
Message-ID: <004b01bdebe4$fcd91d40$f81c64cb@QU.fox.uq.net.ai>





Dear One Nation supporter, 
�
Please take time to view this report with images of the One 
Nation launch yesterday.
�
http://www.gwb.com.au/gwb/news/onenation/federal/launch/
�
GWB
�
�
�
Scott Balson



From nobody at replay.com  Mon Sep 28 22:58:07 1998
From: nobody at replay.com (Anonymous)
Date: Tue, 29 Sep 1998 13:58:07 +0800
Subject: No Subject
Message-ID: <199809291848.UAA28989@replay.com>



At 08:30 AM 9/29/98 -0400, John Young wrote:
>Now that the terrified US Army has axed its Web sites, and 
>NSA and several other mil sites seem inaccessible and
>"temporarily unavailable" this morning, could this portend
>a dual-use of the Internet, a closed one for porkbarrell mil and
>secret gov sweethearts and a sappy infotainment one for civilians 
>to gameboy infofoolery?

Well, for some months now they've password protected some of the more
delicate stuff (e.g., "lessons learned", some of the field manuals).  And
they have been rejecting non .mil addresses too.

Certainly we can expect them to eventually get a clue and 
think about what's out there.  Mostly they have.  (Of course it was within
the last year that a .mil was exporting PGP!) The army's over-reaction
is quaint but essentially reasonable --the W3 pages are just PR,
and they're real edgy these days after they tried to scalp Osama
with a tomohawk.

[digression: I wonder when Osama will have his own web page with matching
funds for the head of the Great Satan, and whether there would
be a shootout on the net, e.g., the DNS records being changed, a
phone call to their ISP]

As far as the NSA's online personnel records, I bet they're still worried
about the CIA shootout down the street a few years back.

There's still plenty of names, phones, email addresses in the 
.gov domain, with building locations, etc.  But Jim Bell is
locked up so they're not so uptight.


>That would be a tri-power-gov implementation of dual-use 
>terror-scare to hide perkbellied privileges of natsec obsession.

They keep trying different passwords to the constitution.
Its a dictionary attack: "pedophile", "droogs", "terrorist", "WMD", etc.

--Ceci n'est-ce pas un Toto










  








From nobody at replay.com  Mon Sep 28 22:58:40 1998
From: nobody at replay.com (Anonymous)
Date: Tue, 29 Sep 1998 13:58:40 +0800
Subject: No Subject
Message-ID: <199809291849.UAA29124@replay.com>



At 08:21 AM 9/29/98 -0500, Jim Choate wrote:
>
>It's called milnet and it's been in existance ever since about '83. It
>occured when ARPA became DARPA. I was working on a DoD project at UT Austin
>at the time.


Look up SIPRNET








  








From jya at pipeline.com  Mon Sep 28 23:45:59 1998
From: jya at pipeline.com (John Young)
Date: Tue, 29 Sep 1998 14:45:59 +0800
Subject: Army Plonks
In-Reply-To: <199809291848.UAA28989@replay.com>
Message-ID: <199809291936.PAA08772@camel7.mindspring.com>



These are quotes from a mil news group where this is being 
discussed.

"Thing is, many of the Army's sites offered a wealth of
information, unclassified, and readily available in hardcopy,
to anybody who wants it.

To ease distribution and save millions in costs of distributing
this material around the world, the Web cannot be beat,
as even Hamre's directive emphasized for contracting and 
purchasing defense goods and educating its personnel.

An West Point bozo fucked up royally by pissing an arc to show Hamre
the combat guys know how to blow shit away big time -- the turkey
was named in some news reports, a LtGen of Info Services -- and revelaed
his prejudice toward loathsome civvy control and wily-hackered the 
whole damn system, "stupid jerk, fucking asshole, eat shit, fuck you,"
as my sqawk box mocks.

Hamre will get hammered for overreacting, too, he's been whining
about cyber threats for months now, when it's clear he doesn't
know shit about such systems, like most of the wrinkled fucks running
the natsec operation. They won't listen to the youngsters under
their command, they just want to destroy something to prove their
hardware prowess, being unable to wave their shriveled dicks now
that they'll get cashiered for being inappropriately related to
underlings.

It will cost the military millions if not billions to return to a closed 
information system. And all those folks who were selling handy
off the shelf stuff for ballooning mil siles aint gonna keep quiet -- 
unless they get sweetheart deals for 10 times cost for secret shit that
aint worth shit to anybody except the lard asses always screaming
for more protection for the Amercian people."







From leif at imho.net  Tue Sep 29 00:29:44 1998
From: leif at imho.net (Leif Ericksen)
Date: Tue, 29 Sep 1998 15:29:44 +0800
Subject: 
In-Reply-To: <199809291849.UAA29124@replay.com>
Message-ID: <36113E11.34C257A1@imho.net>



Anonymous wrote:
> 
> At 08:21 AM 9/29/98 -0500, Jim Choate wrote:
> >
> >It's called milnet and it's been in existance ever since about '83. It

1983????  Are you 100% sure about that I am almost 100% sure that it was
alone longer than that.  I can not be quoted on it but I am sure that it
was in existence before that...  OH I beg your pardon, 1983 is what the 
government will really admit to even if there are documents that show it
may be older than that....


			HRMMM....

		:)
			- lhe
> >occured when ARPA became DARPA. I was working on a DoD project at UT Austin
> >at the time.
> 
> Look up SIPRNET
> 
>





From ravage at EINSTEIN.ssz.com  Tue Sep 29 00:36:14 1998
From: ravage at EINSTEIN.ssz.com (Jim Choate)
Date: Tue, 29 Sep 1998 15:36:14 +0800
Subject: (fwd)
Message-ID: <199809292035.PAA08234@einstein.ssz.com>



Forwarded message:

> Date: Tue, 29 Sep 1998 15:07:45 -0500
> From: Leif Ericksen 
> Subject: Re: 

> > At 08:21 AM 9/29/98 -0500, Jim Choate wrote:
> > >
> > >It's called milnet and it's been in existance ever since about '83. It
> 
> 1983????  Are you 100% sure about that I am almost 100% sure that it was
> alone longer than that.  I can not be quoted on it but I am sure that it
> was in existence before that...  OH I beg your pardon, 1983 is what the 
> government will really admit to even if there are documents that show it
> may be older than that....

Might have been 82, find out when ARPA became DARPA and *only* worked on
defense related material. The distinction was one of administration and
not physical changes to anything other than some nameservers and routers.

When the change happened it meant that ARPA could no longer participate
as an equal with the NFS so they split the funding and administrative
servers.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage at ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------





From sales at golive.com  Tue Sep 29 01:51:36 1998
From: sales at golive.com (sales at golive.com)
Date: Tue, 29 Sep 1998 16:51:36 +0800
Subject: GoLive CyberStudio 30-day Activation Key
Message-ID: <199809292142.OAA11348@company.golive.com>



Dear Fritzie,

Thank you for downloading the GoLive CyberStudio Tryout
software.

Your official 30-day activation key is: TRIA1MT23NFJD8MXGGJ85UDA

You'll need to enter this key when you first start-up the
software.

Included with the GoLive CyberStudio installation are the
latest Release Notes and New Product Features for GoLive
CyberStudio.

NOTE: If you are using Stuffit Expander 4.5.x to decode and
decompress PDF documents, please make sure the cross
platform preference and the option "Convert Text Files to
Macintosh Format" is set to "Never".

If you have questions about how to use the Tryout software,
GoLive's knowledgeable Technical Support staff is available
to assist you. We suggest you first check the Technical
Support section of our Web site www.golive.com. If you don't
find your answers there, please send us an email at
support at golive.com or call 1-800-554-6638. 

When you are ready to purchase GoLive CyberStudio or if you
want to know more about why GoLive CyberStudio is the best
product for Web site design, please return to our Web site
or contact me at 1-800-554-6638 or 1-650-463-1580.

Sincerely,

Dan Fernandez
Director US Sales
GoLive Systems
Sales at Golive.com





From sales at golive.com  Tue Sep 29 01:56:21 1998
From: sales at golive.com (sales at golive.com)
Date: Tue, 29 Sep 1998 16:56:21 +0800
Subject: GoLive CyberStudio 30-day Activation Key
Message-ID: <199809292147.OAA11432@company.golive.com>



Dear Fritzie,

Thank you for downloading the GoLive CyberStudio Tryout
software.

Your official 30-day activation key is: TRIA1MT23NFJD8MXGGJ85UDA

You'll need to enter this key when you first start-up the
software.

Included with the GoLive CyberStudio installation are the
latest Release Notes and New Product Features for GoLive
CyberStudio.

NOTE: If you are using Stuffit Expander 4.5.x to decode and
decompress PDF documents, please make sure the cross
platform preference and the option "Convert Text Files to
Macintosh Format" is set to "Never".

If you have questions about how to use the Tryout software,
GoLive's knowledgeable Technical Support staff is available
to assist you. We suggest you first check the Technical
Support section of our Web site www.golive.com. If you don't
find your answers there, please send us an email at
support at golive.com or call 1-800-554-6638. 

When you are ready to purchase GoLive CyberStudio or if you
want to know more about why GoLive CyberStudio is the best
product for Web site design, please return to our Web site
or contact me at 1-800-554-6638 or 1-650-463-1580.

Sincerely,

Dan Fernandez
Director US Sales
GoLive Systems
Sales at Golive.com





From sales at golive.com  Tue Sep 29 01:56:22 1998
From: sales at golive.com (sales at golive.com)
Date: Tue, 29 Sep 1998 16:56:22 +0800
Subject: GoLive CyberStudio Personal Edition
Message-ID: <199809292147.OAA11434@company.golive.com>



Dear Fritzie,

Thank you for downloading the GoLive CyberStudio Tryout
software.

Your official 30-day activation key is: MWT4QWF7F8WP7GJJ

You'll need to enter this key when you first start-up the
software.

Included with the GoLive CyberStudio installation are the
latest Release Notes and New Product Features for GoLive
CyberStudio.

NOTE: If you are using Stuffit Expander 4.5.x to decode and
decompress PDF documents, please make sure the cross
platform preference and the option "Convert Text Files to
Macintosh Format" is set to "Never".

If you have questions about how to use the Tryout software,
GoLive's knowledgeable Technical Support staff is available
to assist you. We suggest you first check the Technical
Support section of our Web site www.golive.com. If you don't
find your answers there, please send us an email at
support at golive.com or call 1-800-554-6638. 

When you are ready to purchase GoLive CyberStudio or if you
want to know more about why GoLive CyberStudio is the best
product for Web site design, please return to our Web site
or contact me at 1-800-554-6638 or 1-650-463-1588.

Sincerely,

Dan Fernandez
Director US Sales
GoLive Systems
Sales at Golive.com





From sales at golive.com  Tue Sep 29 02:01:10 1998
From: sales at golive.com (sales at golive.com)
Date: Tue, 29 Sep 1998 17:01:10 +0800
Subject: GoLive CyberStudio 30-day Activation Key
Message-ID: <199809292151.OAA11490@company.golive.com>



Dear Fritzie,

Thank you for downloading the GoLive CyberStudio Tryout
software.

Your official 30-day activation key is: TRIA1MT23NFJD8MXGGJ85UDA

You'll need to enter this key when you first start-up the
software.

Included with the GoLive CyberStudio installation are the
latest Release Notes and New Product Features for GoLive
CyberStudio.

NOTE: If you are using Stuffit Expander 4.5.x to decode and
decompress PDF documents, please make sure the cross
platform preference and the option "Convert Text Files to
Macintosh Format" is set to "Never".

If you have questions about how to use the Tryout software,
GoLive's knowledgeable Technical Support staff is available
to assist you. We suggest you first check the Technical
Support section of our Web site www.golive.com. If you don't
find your answers there, please send us an email at
support at golive.com or call 1-800-554-6638. 

When you are ready to purchase GoLive CyberStudio or if you
want to know more about why GoLive CyberStudio is the best
product for Web site design, please return to our Web site
or contact me at 1-800-554-6638 or 1-650-463-1580.

Sincerely,

Dan Fernandez
Director US Sales
GoLive Systems
Sales at Golive.com





From jf_avon at citenet.net  Tue Sep 29 02:29:46 1998
From: jf_avon at citenet.net (Jean-Francois Avon)
Date: Tue, 29 Sep 1998 17:29:46 +0800
Subject: No Subject
Message-ID: <199809292223.SAA02381@cti06.citenet.net>



Excerpt from the Canadian Firearms Digest, V2 #612

================ begin forwarded opinion ===============
Date: Mon, 28 Sep 1998 13:40:01 -0600
From: someone at somewhere.net
Subject: RCMP now have .50 cal. BMG's

I have just learned from a highly reliable confidential source 
that in addition to the .50 cal  McMillian sniper rifles and 
the untalked about Barrett Light .50's, the RCMP  have now added 
to  their arsenal a number of .50 cal. Browning Machine Guns. 

Staff from the RCMP are headed to Belgium to be trained in 
the armoring of these military heavy  machine guns. Machine 
guns may at some point be used against the Canadian public, 
possibly to  quell a native disturbance or other civil unrest. 
If we were attacked by outside forces the military  would be 
the pressed into service, as this is not the role of the RCMP. 

This leads one to ask what use the RCMP, who are a police force 
not an army in occupation,  would have for such heavy armament 
...... or is it possible that I have it wrong, possibly they 
are  now an army in occupation. Is it possible that the RCMP 
are now the political policing arm of the  Government. 

The lethality of this weapon makes pepper spray look like a 
Sunday shower. Maybe this is the  next weapon demonstrators 
will be facing at the orders of the PM's office.
================ end forwarded opinion ================

Ciao all.






Definition:��FASCISM:�n.:��a�political�and�economic�movement,�strongly�nationalistic,�magnifying�the�rights�of�the�state�as�opposed�to�those�of�the�individual,�in�which�industry,�though�remaining�largely�under�private�ownership,�and�all�administrative
political�units,�are�controlled�by�a�strong�central�government.
��������-------------------------------------------------
"One�of�the�ordinary�modes�by�which�tyrants�accomplish�their�purpose,�without�resistance,�is�by�disarming�the�people�and�making�it�an�offense�to�keep�arms".��-�Joseph�Story,�U.S.�Supreme�Court�Justice.
��������-------------------------------------------------
the�German�gun�control�laws�were�enacted�by�the�"liberal"�Weimar�Republic�government�that�preceded�Hitler,�and�were�a�strong�aid�to�his�coming�to�power�--�because�they�disarmed�Hitler's�opponents,�and�Hitler's�adherents�ignored�them�--�as�criminals�have�always�ignored�gun�control�laws.

Disarming�the�public�is�a�frequent�first�step�toward�dictatorships�and�genocides.��Once�the�disarming�is�complete,�the�public�is�helpless�against�those�who�have�the�guns.��������-------------------------------------------------

PGP�keys:�http://bs.mit.edu:8001/pks-toplev.html
PGP�ID:C58ADD0D:529645E8205A8A5E�F87CC86FAEFEF891�
PGP�ID:5B51964D:152ACCBCD4A481B0�254011193237822C



From lazlototh at hempseed.com  Tue Sep 29 03:01:03 1998
From: lazlototh at hempseed.com (Lazlo Toth)
Date: Tue, 29 Sep 1998 18:01:03 +0800
Subject: IP: The virtual president
In-Reply-To: <199809290021.RAA15032@netcom13.netcom.com>
Message-ID: 



"Someone else," aka "Flagship" == "The People"?

-Lazlo



At 5:21 PM -0700 9/28/98, you wrote:
>From: Jean Staffen 
>Subject: IP: The virtual president
>Date: Fri, 25 Sep 1998 22:22:11 -0500 (CDT)
>To: ignition-point at majordomo.pobox.com
>
>This is the most INCREDIBLE article.  I never thought I'd read something
>like this in the mainstream media!!! -Jean
>
>
>                   The virtual president=20
>                 =20
>
>                   By Missy Kelly=20
>                   Copyright 1998, WorldNetDaily.com=20
>
>                   "You know, by the time you become the leader of a
>                   country, someone else makes all the decisions." -- Bill
>                   Clinton September 4, 1998=20
[snip]





From nobody at replay.com  Tue Sep 29 03:20:05 1998
From: nobody at replay.com (Anonymous)
Date: Tue, 29 Sep 1998 18:20:05 +0800
Subject: GoLive CyberStudio 30-day Activation Key
Message-ID: <199809292321.BAA28011@replay.com>



Dear Dumbshit,

Thank you for spamming the Cypherpunks list with an ad for your crippleware
and your lame, pathetically designed web site.

Your official 30-day activation key is: ISUCKANDCANTWRITEHTMLANDISPAM

You'll need to enter this key when you try to activate your brain.

Included in response to all spams to the Cypherpunks list are free tests
which will be run on your system. Any security holes we find will not be
reported, but exploited.

NOTE: If you are using FuckIt Spammer 1.0.x to spam your ad, please make
sure you walk off a high-rise ledge and fall several hundred feet or we may
have to make sure you do it, and you probably don't want that.

If you have questions about your computer security, you do not need to send
to Cypherpunks. You have already requested that your machine be checked for
all security holes and that any found will be exploited to make you look
even stupider than you make yourselves look. We also suggest you learn how 
to make a web site. Please visit http://www.anybrowser.org/campaign/. If you
don't find your answers there, please walk in front of an 18-wheeler going
70mph, or call 911 and phone in a bomb threat.

When you are ready to put yourself out of our misery, please slash your 
wrists and play vampire. It's simple so your simple minds should be able to
handle it, but it is a little messy.

Sincerely,

The Cypherpunks
cypherpunks at cyberpass.net

On Tue, 29 Sep 1998 sales at golive.com spammed:

>
> Dear Fritzie,
>
> Thank you for downloading the GoLive CyberStudio Tryout
> software.
>
> Your official 30-day activation key is: TRIA1MT23NFJD8MXGGJ85UDA
>
> You'll need to enter this key when you first start-up the
> software.
>
> Included with the GoLive CyberStudio installation are the
> latest Release Notes and New Product Features for GoLive
> CyberStudio.
>
> NOTE: If you are using Stuffit Expander 4.5.x to decode and
> decompress PDF documents, please make sure the cross
> platform preference and the option "Convert Text Files to
> Macintosh Format" is set to "Never".
>
> If you have questions about how to use the Tryout software,
> GoLive's knowledgeable Technical Support staff is available
> to assist you. We suggest you first check the Technical
> Support section of our Web site www.golive.com. If you don't
> find your answers there, please send us an email at
> support at golive.com or call 1-800-554-6638.
>
> When you are ready to purchase GoLive CyberStudio or if you
> want to know more about why GoLive CyberStudio is the best
> product for Web site design, please return to our Web site
> or contact me at 1-800-554-6638 or 1-650-463-1580.
>
> Sincerely,
>
> Dan Fernandez
> Director US Sales
> GoLive Systems
> Sales at Golive.com
>
>





From phelix at vallnet.com  Tue Sep 29 04:56:13 1998
From: phelix at vallnet.com (phelix at vallnet.com)
Date: Tue, 29 Sep 1998 19:56:13 +0800
Subject: Remailers, PGP, and a Project Suggestion
In-Reply-To: <19980929051529.13737.qmail@hades.rpini.com>
Message-ID: <361d80cd.584564481@news>



On 29 Sep 1998 12:59:44 -0500, Adam Back  wrote:

>
>
>Anonymous writes:
>> >        So, what you are saying is that you want crypto to protect yourself
>> >from government intrusion, but are unwilling to actually WRITE the code for
>> >fear that the government will lock you up.
>> 
>> That's about right. I will write the code for myself. I will not release it
>> since I'm in the U.S. and it gives the thugs one more reason to come after
>> me. That job is better suited for somebody who is outside the U.S. or is
>> actually willing to sit through a long grand jury investigation, possible
>> indictment, trial, conviction, jail time, and life as a convicted felon.
>
>Ah come on, it isn't that bad.  Just put it on a crypto site with some
>dumb revolving password scheme, or give it to someone else to put no
>theirs.  It'll be on replay with-in a few hours, if anyone is
>interested in the code.
>

Also, couldn't you just print out the sorce code (in a nice OCR font) and
mail it to somebody in another country, like with the PGP books?
Is anyone out there (not in the US) willing to do this?

What about MIT?  They distribute pgp.  Perhaps someone there could be
persuaded to maintain a broader crypto archive.

-- Phelix





From mgering at ecosystems.net  Tue Sep 29 05:43:19 1998
From: mgering at ecosystems.net (Matthew James Gering)
Date: Tue, 29 Sep 1998 20:43:19 +0800
Subject: GPL & commercial software, the critical distinction (fwd)
Message-ID: <33CCFE438B9DD01192E800A024C84A19284704@mossbay.chaffeyhomes.com>




Jim Choate wrote:
> The only objection to releasing an API is to 
> stifle competition, *THAT* is a bad thing.

There are a number of other reasons -- principally support and backwards
compatibility costs. If you release an API for a commercial application
for ISVs, you better make sure it is relatively bug-free and mature. As
soon as someone else's code relies on that API, you are stuck with
making sure it continues to work as the product evolves.

There is nothing wrong with public and private APIs, and we hope that
the ad hoc private APIs from some midnight-oil-burning-hack to get the
product to ship on time that have useful functionality will eventually
be integrated into a mature public API.

Modular OOP design means you have lots of interfaces, you don't
necessarily want people to be able to dig in-between all the pieces of
your program -- often you cannot protect application/data integrity if
they do.

It's like custom software versus shrink-wrap. I write a lot of custom
software, it works for what it needs to do for a specific scenario, if
that changes I modify and recompile. There is a *lot* of work -- time,
money, *my* cost -- to take that custom application and make it flexible
and generic enough to be shrink-wrap and work in all scenarios. And if I
don't do it well enough I have a major support/liability problem. Same
applies to public vs private APIs.

> The idea from a free-market perspective:

> Had Microsoft, for example, been required to publish their 
> API's by the market we wouldn't be spending all this effort

You state free-market and then you are *requiring* someone to do
something? How do you resolve that contradiction? Require = Force !=
Free[dom]

As far as *commercial* software vendors go, Microsoft is one of the
better companies for publishing APIs and creating useful APIs and tools
for Rapid Application Development. Do you subscribe to MSDN? Please do
before you crucify Microsoft for lack of APIs, if anything they have too
many.

> Bottem line, if you believe in a free-market (which requires fair
> competition to work and prevent monopolies)

Pure speculative nonsense contrary to empirical evidence. Market
distortions the government creates are far worse than any Wonderland
monopoly you can dream up that will exist in a true free market.

	Matt





From mctaylor at privacy.nb.ca  Tue Sep 29 07:27:19 1998
From: mctaylor at privacy.nb.ca (M Taylor)
Date: Tue, 29 Sep 1998 22:27:19 +0800
Subject: Halifax, Canada PGP key-signing party
Message-ID: 




The Nova Scotia Linux Users Group (nsLUG, www.nslug.ns.ca) is considering
a PGP key-signing party in October 1998 in the metro Halifax area.

If you are interested, please contact me, so I can inform you of the exact
date & location.

--
M Taylor   mctaylor@  /  glyphmetrics.ca | privacy.nb.ca





From ravage at einstein.ssz.com  Tue Sep 29 07:43:02 1998
From: ravage at einstein.ssz.com (Jim Choate)
Date: Tue, 29 Sep 1998 22:43:02 +0800
Subject: GPL & commercial software, the critical distinction (fwd)
Message-ID: <199809300345.WAA10211@einstein.ssz.com>



Forwarded message:

> From: Matthew James Gering 
> Subject: RE: GPL & commercial software, the critical distinction (fwd)
> Date: Tue, 29 Sep 1998 18:41:25 -0700

> Jim Choate wrote:
> > The only objection to releasing an API is to 
> > stifle competition, *THAT* is a bad thing.
> 
> There are a number of other reasons -- principally support and backwards
> compatibility costs. If you release an API for a commercial application
> for ISVs, you better make sure it is relatively bug-free and mature. As
> soon as someone else's code relies on that API, you are stuck with
> making sure it continues to work as the product evolves.

This is bogus reasoning. If the API is released there is *more* motivation
for the original distributor to keep backward compatibility and bug-free. If
it isn't some pissed off set of programmers will write a replacement.
Furthermore the motivation to keep future compatibility is also increased.

You want quality code that is bullet-proof then release the API and let the
fittest survive.

If nothing else it's going to determine if your as bad-assed programmer as
you think you are.

> There is nothing wrong with public and private APIs, and we hope that
> the ad hoc private APIs from some midnight-oil-burning-hack to get the
> product to ship on time that have useful functionality will eventually
> be integrated into a mature public API.

If you release the API you'll find those midnight hacks go away, *not*
increase as you seem to be claiming. The history of quality over time of the
Open Software producers amply proves this.

Solaris, HP, BSD, NT, etc. *wish* they were as stable and popular as Linux.

> Modular OOP design means you have lots of interfaces, you don't
> necessarily want people to be able to dig in-between all the pieces of
> your program -- often you cannot protect application/data integrity if
> they do.

Malarky. If you're data structures are that fragile then you need to go back
to the drawing board.

> > Had Microsoft, for example, been required to publish their 
> > API's by the market we wouldn't be spending all this effort
> 
> You state free-market and then you are *requiring* someone to do
> something? How do you resolve that contradiction? Require = Force !=
> Free[dom]

Free-market *requires* fair competition, don't blame that requirement on me
I had nothing to do with it. Free-market does not mean carte blanche as to
what manufacturers can do, it means there are no outside regulations
applied. It says *nothing* about internal regulation applied by either the
producer or the consumer.

If you are seriously saying that the only workable market scheme is to let
people cheat and steal from others (which is what poorly written and
unreliable code does) then you need to quit typing and starting thinking.

> As far as *commercial* software vendors go, Microsoft is one of the
> better companies for publishing APIs and creating useful APIs and tools

Malarky. Microsoft has so many hidden, undocumented, incomplete API's it
isn't even funny.

> for Rapid Application Development. Do you subscribe to MSDN? Please do
> before you crucify Microsoft for lack of APIs, if anything they have too
> many.

Subscribe to the MSDN?

I work for Tivoli in Austin as a Senior Software Verification Engineer. I
spend about 8-10 hours a day banging on software running on:

SunOS 4.x
Solaris 2.x
HP/UX 9.x
HP/UX 10.x
AIX 3.x
AIX 4.x
WinNT 4.0
WinNT 3.51
W4W
W3.11
OS/2 3.x
OS/2 4.x
AS/400
Novell 3.x
Novell 4.x
IRIX 4.x
IRIX 5.x
DG Unix
Digital Unix
NextStep

networked via,

TCP/IP
IPX
SNA
Token Ring

databases we support,

Oracle
Sybase
Informix
DB2
DBMX

I've also worked on:

Pick
Linux (since 0.42)
QNX
SCO
Interactive
BSD
CP/M
C64
AmigaDOS
4DOS

It requires that I comprehend and write shell scripts, Perl, C, C++, REXX,
4TEST, CORBA IDL on these platforms. I started analog and digital electronics
in 1969, I started programming in BASIC/8 on a PDP 8/e in 1973. I built my
first 6800 based machines from the ground up in 1974 when I was a freshman in
high school. I've been employed in a hardware or software position since 1978
when I graduated high school. I've owned more different types of machines
than I care to remember. I've worked in a science museum building 40
exhibits over 7 years (2 of which are in the Smithsonian, 1 is at the
Exploratorium and 1 is at the Chicago Museum of Science and Technology,
and I worked on the IBM Leonardo exhibit.) and had the pleasure of running
their computer group for 5 of those years. I taught astronomy at the museum
for 3 years and explained exhibits to the visitors for 7 years. I've been
using MS Dos and Windows since the 1.0 days. I worked for the DoD building
non-Von Neumann computers (RTL architecture). I hold a NASA certification
(expired) for space rated soldering and mechanical assembly. I used to work
on cesium beam atomic clocks and LORAN-C equipment. I run my own custom
development business since 1984, and it's been on the internet since 1994
via ISDN. I've been running a BBS of some sort since '76 and had one
continously online since '83. I helped develop TurBoard the first NAPLPS
bbs software. I program in assembly on PDP/VAX 11, 6800, 6502, 8080, z80,
68k, 80x86, Sparc RISC, both types of POWER chips, & 8051.

My current assignment is to build an automated software test engine that
will test *all* the above OS'es with all the Tivoli products (are you
familiar with Tivoli?), with all the point-patches, maintenance releases,
and service packs installed in a user defined combinatorial environment.

Microsoft's API's suck rocks.

What do you do for a living?


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage at ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------





From vznuri at netcom.com  Tue Sep 29 08:07:00 1998
From: vznuri at netcom.com (Vladimir Z. Nuri)
Date: Tue, 29 Sep 1998 23:07:00 +0800
Subject: IP: [FP] National registry to track child support
Message-ID: <199809300407.VAA08285@netcom13.netcom.com>




From: "ScanThisNews" 
Subject: IP: [FP] National registry to track child support
Date: Tue, 29 Sep 1998 06:59:33 -0500
To: ignition-point at majordomo.pobox.com

======================================================================
SCAN THIS NEWS
09/28/98

---------------------------------------------------------------
Ya know, they could darn near track anyone with this thing...
---------------------------------------------------------------

09/28/98- Updated 12:15 AM ET
 The Nation's Homepage

National registry to track child support

WASHINGTON - Beginning Wednesday, every one of the 16 million parents
nationwide who are required to pay child support will be logged into a
massive database to help the federal government track down those who fail to
pay.

[Well that's nice, now they'll be in there with the rest of us sheeple.]

The registry will allow authorities to keep tabs on the more than 5 million
parents, most of them fathers, who have moved to another state after a
divorce, separation or breakup.

[Yea, and about 200 million of us who haven't.]

Many reneged or fell behind on support payments, says Michael Kharfen, a
spokesman for the U.S. Department of Health and Human Services, which will
run the database.

"Before, it was very difficult for a state to track down where the parent
went, where he was working and how much money he was actually making,"
Kharfen says. "This database will track them, no matter where in the country
they move."

[Hey Keefer, there was a reason it was difficult - it was called liberty!]

Critics of the registry say it violates the privacy of law-abiding parents.
"Because someone gets a divorce doesn't mean their job, their income, should
become an open book," fathers' rights attorney D. Gerald Williams says.

[Wrong answer: critics are opposed to it because it violates fundamental
rights of the "non-delinquent" citizens by forcing them into the same
"locating and tracking" system.]

Kharfen counters that the system is critical to states, which collect only
about 22% of the $50 billion owed in child support every year. By federal
estimates, 60% of parents involved in child custody cases renege on their
payments.

[Keefer - get out of the social payments system altogether. Then, you won't
have this huge problem you've created -- "tracking delinquent parents."]

Officials estimate that the system will recoup $10 billion in delinquent
payments a year.

[Probably about 20% of what the system costs to operate, and about 5% of
what the "system" spends as a whole.]

To track down scofflaws, the government will compare its list of parents
with another new database that contains employment records for more than 140
million workers in the United States. That database, which was unveiled in
October 1997, lists an employee's identity, address and salary.

By cross-referencing lists, "we'll be able to tell the state that's looking
for him whether they should start going for his paycheck," Kharfen says.

[And it's about time for the citizenry to start going after some
Congressmen's paycheck Keefer, then, perhaps, yours to follow!]

By Scott Bowles, USA TODAY

[With comments by Scott McDonald - today]

http://search.usatoday.com/plweb-cgi/fastweb?getdoc+default+news+5734+0+wAAA
+registry

---------------------------------------------------------------
[thanks to J. Groom for the forward]
=======================================================================
Don't believe anything you read on the Net unless:
1) you can confirm it with another source, and/or
2) it is consistent with what you already know to be true.
=======================================================================
Reply to: 
=======================================================================
 To subscribe to the free Scan This News newsletter, send a message to
      and type "subscribe scan" in the BODY.
    Or, to be removed type "unsubscribe scan" in the message BODY.
   For additional instructions see www.efga.org/about/maillist.html
-----------------------------------------------------------------------
             "Scan This News" is Sponsored by S.C.A.N.
           Host of the "FIGHT THE FINGERPRINT!" web page:
                www.networkusa.org/fingerprint.shtml
=======================================================================






**********************************************
To subscribe or unsubscribe, email:
     majordomo at majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email at address
**********************************************
www.telepath.com/believer
**********************************************





From vznuri at netcom.com  Tue Sep 29 08:07:05 1998
From: vznuri at netcom.com (Vladimir Z. Nuri)
Date: Tue, 29 Sep 1998 23:07:05 +0800
Subject: IP: Group 'No Privacy for Privacy Hypocrites' Surveys Congress
Message-ID: <199809300407.VAA08296@netcom13.netcom.com>




From: believer at telepath.com
Subject: IP: Group 'No Privacy for Privacy Hypocrites' Surveys Congress
Date: Tue, 29 Sep 1998 11:32:02 -0500
To: believer at telepath.com

Source:  US Newswire
http://www.usnewswire.com/topnews/Current_Releases/0928-131.txt

Privacy Group Surveys Congress 
U.S. Newswire
28 Sep 18:17

 Group 'No Privacy for Privacy Hypocrites' Surveys Congress
 To: National Desk
 Contact: James Love, 202-387-3080

   WASHINGTON, Sept. 28 /U.S. Newswire/ -- No Privacy for Privacy
Hypocrites, a citizen's group formed to counteract the assault
on privacy by the Kenneth Starr/congressional investigations
into President Clinton's sex life, has distributed a survey
to Members of Congress regarding their views on privacy.

   Members of Congress who oppose privacy rights will be asked
whether or not they have ever participated in an adulterous
affair, and whether or not they have lied about it.

   The group is concerned that the Kenneth Starr/congressional
investigations into the president's sex life are having a negative
impact on privacy that will affect ordinary citizens.

   "This whole sad affair is the product of decades-long disrespect
for privacy, for which our political leaders are responsible," said
Evan Hendricks, Editor and Publisher of "Privacy Times," and one of
the organizers of the group.

   "This effort is intended to arrest the free fall of privacy rights
triggered by the stunning abuses of power by the Starr investigation
and the Congressional dissemination of personal information," said
James Love.

   Today, No Privacy for Privacy Hypocrites distributed a survey to
Members of Congress asking:

  1. (A) Is consensual, non-commercial sexual conduct by adults in
private ever a proper subject for government inquiry? (B) Do you
believe that any branch of government should investigate allegations
that elected officials may have participated in an adulterous affair,
including allegations that they may have lied about it?

  2. If you answered "yes" to (A) or (B) in question (1): (A) Have
you ever participated in an adulterous affair?  (B) If yes, have you
ever lied about it?

  3. Do you think that any public official who has committed adultery
and lied about it should resign from public office?

   Survey responses will be placed on the web at:
http://www.noprivacy.org, as soon the surveys are returned.

 -0-
 /U.S. Newswire  202-347-2770/
 09/28 18:17

Copyright 1998, U.S. Newswire
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo at majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email at address
**********************************************
www.telepath.com/believer
**********************************************





From vznuri at netcom.com  Tue Sep 29 08:15:10 1998
From: vznuri at netcom.com (Vladimir Z. Nuri)
Date: Tue, 29 Sep 1998 23:15:10 +0800
Subject: IP: Fwd: [Spooks] NSA Allegedly Spied on Businesses
Message-ID: <199809300407.VAA08329@netcom13.netcom.com>




From: Bridget973 at aol.com
Subject: IP: Fwd: [Spooks] NSA Allegedly Spied on Businesses
Date: Tue, 29 Sep 1998 21:37:12 EDT
To: ignition-point at majordomo.pobox.com

Subject:         [Spooks] NSA Allegedly Spied on Businesses
Date:             Sat, 26 Sep 1998 14:36:35 -0500
From:            Bob Margolis 
To:                Spooks 


U.S. Spy Agency Helped U.S. Companies Win Business Overseas-Report

September 21, 1998

Nikkei English News: TOKYO (AP)--A U.S. intelligence agency
electronically eavesdropped on  foreign companies and passed
information to U.S. competitors to help them win business
overseas, a major Tokyo  newspaper reported Saturday.

The National Security Agency monitored phone calls, faxes and
electronic  mail  of European and Japanese companies since at
least 1990, the Mainichi  newspaper said, citing a report
Wednesday by the European Parliament, the European Union's
legislature.

The newspaper quoted the report as saying the NSA, in an
operation named "Echelon," used its vast eavesdropping network
to listen to business  negotiations.

The Central Intelligence Agency and British intelligence were
also involved, the paper said.

The paper said the report was submitted Wednesday to parliament
by its research bureau. Some of the findings also appeared in a
January report, the paper said.

In one case, the NSA monitored talks between French electronics
company Thomson-CSF and the Brazilian government over sale of a
radar system. An unnamed U.S. company ended up winning the
contract, the paper said.

The paper also said the NSA listened in on 1990 negotiations
between Japan's NEC Corp. and the Indonesian government over the
purchase of telecommunications machinery.

It used the information to urge Jakarta to award half the contract
to AT&T, the paper said.

---
Submissions should be sent to spooks at qth.net
To unsubscribe, send "unsubscribe spooks" to majordomo at qth.net



--
bridget973 at aol.com
Black Helicopters on the Horizon:
http://members.xoom.com/bridget973





**********************************************
To subscribe or unsubscribe, email:
     majordomo at majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email at address
**********************************************
www.telepath.com/believer
**********************************************





From vznuri at netcom.com  Tue Sep 29 08:15:10 1998
From: vznuri at netcom.com (Vladimir Z. Nuri)
Date: Tue, 29 Sep 1998 23:15:10 +0800
Subject: IP: Fwd: [Spooks] CIA Operative sentenced to five years imprisonment
Message-ID: <199809300407.VAA08340@netcom13.netcom.com>




From: Bridget973 at aol.com
Subject: IP: Fwd: [Spooks] CIA Operative sentenced to five years imprisonment
Date: Tue, 29 Sep 1998 22:03:52 EDT
To: ignition-point at majordomo.pobox.com


http://www.abcnews.com/wire/US/AP19980925_1626.html

AP News Service
WASHINGTON (AP) _ A former CIA operative was sentenced to five years in prison
today for trying to extort $1 million from the agency in exchange for his
silence about government eavesdropping operations.  Douglas Fred Groat, 51,
pleaded guilty to the extortion charge in July. As part of the plea agreement,
federal prosecutors dropped four counts of espionage, including charges that
Groat told two foreign governments the CIA had cracked their coded
communications. 
U.S. District Judge Thomas F. Hogan said Groat's actions appeared to stem from
his ``almost becoming obsessed'' about a job dispute with the CIA. 
``I don't think at any time you really had any intention of trying to harm our
national security,'' Hogan said.  

The judge said he would recommend housing Groat in a minimum-security prison
and ordered him to serve three years of supervised release after completing
his sentence. Groat, a burly, bearded man, did not speak in the courtroom
except to clarify part of his written statement to the court, which was not
immediately
released.

He said that in complaining about the ``harsh conditions of my solitary
confinement,'' he did not mean to imply that any federal officials treated him
harshly. His lawyer, public defender Robert L. Tucker, said the case was ``a
shame'' and that Groat's actions ``everybody would agree had their genesis in
a dispute with the CIA about employment.'' 

Prosecutors said in July a trial in the case could have forced them to
disclose sensitive national security information. Groat agreed to help the
government sort out whether his activities damaged
national security, and he promised to submit any books, articles or interviews
to federal officials for security review.  Prosecutor Ron Walutes told Hogan
the government was ``fully satisfied'' with Groat's cooperation since his
guilty plea on July 27.  Groat, a former employee of the CIA division that
develops eavesdropping plans and code-breaking technology, worked for the CIA
from 1980 until he was fired in October 1996. Early in his career, he served
as a field operative
participating in break-ins of foreign embassies. 
In a summary agreed to in July by Groat, prosecutors said he sent a series of
letters to the CIA in 1996 and 1997 demanding $1 million and saying that in
return he would not engage in ``any activities which may hinder present or
future intelligence gathering efforts.'' Officials did not identify the two
countries Groat had been accused of aiding. Groat was held without bail since
he was arrested in April. He will be able to collect his CIA pension when he
turns 62. 
He could have been sentenced to up to 20 years in prison and a $250,000 fine. 
Groat had been the third current or former CIA employee arrested on espionage
charges in the past four years. However, he was lower-ranking than Alrich Ames
and Harold Nicholson, who pleaded guilty and are imprisoned for selling
secrets to Moscow. 

Copyright 1998 AP News Service. All rights reserved



---
Submissions should be sent to spooks at qth.net
To unsubscribe, send "unsubscribe spooks" to majordomo at qth.net



--
bridget973 at aol.com
Black Helicopters on the Horizon:
http://members.xoom.com/bridget973





**********************************************
To subscribe or unsubscribe, email:
     majordomo at majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email at address
**********************************************
www.telepath.com/believer
**********************************************





From vznuri at netcom.com  Tue Sep 29 08:15:31 1998
From: vznuri at netcom.com (Vladimir Z. Nuri)
Date: Tue, 29 Sep 1998 23:15:31 +0800
Subject: IP: NSA listening practices called European `threat'
Message-ID: <199809300407.VAA08318@netcom13.netcom.com>




From: believer at telepath.com
Subject: IP: NSA listening practices called European `threat'
Date: Tue, 29 Sep 1998 11:43:12 -0500
To: believer at telepath.com

Source:  Baltimore Sun
http://www.sunspot.net/cgi-bin/editorial/story.cgi?storyid=900000194001

NSA listening practices called European `threat'
European Parliament report accuses agency of widespread spying 

By Neal Thompson 
Sun Staff

The National Security Agency has incurred the wrath of some U.S.
allies and triggered debate about increased global eavesdropping,
thanks to a new report that accuses the agency of spying on
European citizens and companies.

With the help of a listening post in the moors of northern England,
NSA for nearly a decade has been snatching Europe's electronic
communications signals, according to a report for the European
Parliament.

"Within Europe, all e-mail, telephone and fax communications are
routinely intercepted by the United States National Security Agency,
transferring all target information to Fort Meade," said the report.

`Powerful threat'

It warned that the NSA's tactics represent a "powerful threat to civil
liberties in Europe" at a time when more communication -- and
commerce -- is conducted electronically.

A preliminary version of the report circulated overseas in recent
months, touching off heated debate, with front-page stories in Italy,
France, Scotland, England, Belgium and even Russia.

The NSA won't discuss the report or even admit that the listening
post exists.

But this week, two days of debate in the European Parliament
continued the extraordinary public disclosure of comprehensive
post-Cold War spying by the agency. On Wednesday, the
Parliament passed a resolution seeking more accountability from such
eavesdropping arrangements and more assurances that they won't be
misused.

"We want to make sure that somebody's watching them," said Glyn
Ford, a British member of the European Parliament, the legislative
body for the 15-member European Union.

Observers say this was the first time a governmental body has
described in detail -- and then criticized -- the NSA's tactics.

"The cat's well and true out of the bag," said Simon Davies, director
of the London-based watchdog group Privacy International. "I would
argue that we have made the grandest step in 50 years toward
accountability of such national security transparencies."

The report describes a sophisticated program called Echelon, which
the NSA established in conjunction with British intelligence agencies.
The program includes a listening post in Menwith Hill, in Yorkshire,
whose satellite dishes soak up the satellite and microwave
transmissions carrying Europe's telephone conversations, faxes and
e-mail.

Unlike Cold War spying aimed at the military, Echelon is a global
electronic surveillance system that targets individuals, businesses,
governments and organizations, the report says.

The U.S. shares the information with Britain, Canada, Australia and
New Zealand as part of an intelligence-sharing agreement called
UKUSA. Each nation has its own set of key words, so it can seek
information on specific issues, the report states.

Europe is but a fraction of Echelon's target area -- and the Menwith
Hill post is one of at least 10 around the world, the report adds.

"One reason its a bigger deal over there than it is over here [in the
U.S.] is because the SIGINT [signals intelligence] systems are over
their heads and not our heads," said Jeffrey Richelson, an analyst
with the National Security Archives, a U.S. group seeking to
declassify intelligence related documents.

Echelon repercussions

But the disclosure of Echelon could soon resonate across the Atlantic
after the European Parliament action. Furthermore, it could
complicate current negotiations between the U.S. and the European
Union over encryption programs that scramble or encode computer
information, said Parliament member Ford.

The U.S. has been lobbying for back-door access to such codes for
security reasons.

Originally published on Sep 19 1998 
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo at majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email at address
**********************************************
www.telepath.com/believer
**********************************************





From vznuri at netcom.com  Tue Sep 29 08:15:38 1998
From: vznuri at netcom.com (Vladimir Z. Nuri)
Date: Tue, 29 Sep 1998 23:15:38 +0800
Subject: IP: Senate Passes Y2K Liability Limitation Bill
Message-ID: <199809300407.VAA08307@netcom13.netcom.com>




From: believer at telepath.com
Subject: IP: Senate Passes Y2K Liability Limitation Bill
Date: Tue, 29 Sep 1998 11:35:10 -0500
To: believer at telepath.com

Source:  US Newswire
http://www.usnewswire.com/topnews/Current_Releases/0929-101.txt

Senate Passes Y2K Liability Limitation Bill 
U.S. Newswire
29 Sep 8:49

 Senate Passes Y2K Liability Limitation Bill
 To: National and State desks
 Contact: David Carle of the Office of Sen. Patrick Leahy,
          202-224-3693

   WASHINGTON, Sept. 29 /U.S. Newswire/ -- Following is the statement
of Sen. Patrick Leahy (D-Vt.), ranking member of the Senate Judiciary
Committee, on Senate passage Monday night, Sept. 28, 1998, of the
Hatch-Leahy-Kyl Substitute to S.2392, which was initially introduced
by Sen. Bob Bennett, R-Utah, at the request of the Administration.
The bill also includes a new amendment by Sen. Fred Thompson
(R-Tenn.).

   The bill now goes to the House. The bill's purpose is to encourage
the full disclosure and exchange of solutions and test results for
Year 2000 computer problems, by providing limited liability
protection, for a limited time, for specific kinds of Year 2000
information that is considered essential to remediation efforts,
but not for faulty products or services. It promotes
company-to-company information sharing, without limiting the rights
of consumers.  The bill also includes a Leahy provision chartering
a national Y2K Website for consumers, small businesses and local
governments.

   "Four-hundred and fifty-eight days from now, millions of computers
controlling our air traffic, recording credit card sales, running
electric and phone systems, tracking bank deposits and monitoring
hospital patients may crash in befuddlement.

   "No bill can magically solve the Y2K problem, but this bill
greatly increases the chances that people will come forward more
readily with solutions.

   "This bill also includes a provision I have offered that will help
consumers, small businesses and local governments by chartering a
national information clearinghouse and Website as a starting point
to provide rapid and accurate information about solving Y2K problems.

   "Knowledge is power in exterminating the millennium bug, and it
makes perfect sense to amplify and encourage the use of the Internet
itself as an information resource in grappling with this problem."

 -0-
 /U.S. Newswire  202-347-2770/
 09/29 08:49

Copyright 1998, U.S. Newswire
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo at majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email at address
**********************************************
www.telepath.com/believer
**********************************************





From rmiles at Generation.NET  Tue Sep 29 08:23:29 1998
From: rmiles at Generation.NET (Vlad Stesin)
Date: Tue, 29 Sep 1998 23:23:29 +0800
Subject: GPL & commercial software, the critical distinction (fwd)
In-Reply-To: <199809300345.WAA10211@einstein.ssz.com>
Message-ID: 



> 
> Solaris, HP, BSD, NT, etc. *wish* they were as stable and popular as Linux.
> 

Which BSD are you talking about? From my personal and professional
experience, OpenBSD, NetBSD and FreeBSD proved to be just as stable (and
OpenBSD even more stable and reliable) than Linux. All three of them are
open-source. The OpenBSD project emphasizes the importance of security and
cryptography, and since it ships from Canada there are few export
restrictions. 

Take a look at http://www.openbsd.org/crypto.html for more info.

I hope you meant BSD/OS when you mentioned BSD :-)

Regards,
-- 
Vlad Stesin						(514) 845-5555
UNIX Systems Administrator / Generation.NET     vstesin at Generation.NET
Montreal (PQ), Canada  B4 44 CE 60 09 71 38 6F 51 BF DC 5F 12 E9 70 7C 





From ravage at einstein.ssz.com  Tue Sep 29 08:53:11 1998
From: ravage at einstein.ssz.com (Jim Choate)
Date: Tue, 29 Sep 1998 23:53:11 +0800
Subject: GPL & commercial software, the critical distinction (fwd)
Message-ID: <199809300454.XAA10768@einstein.ssz.com>



Forwarded message:

> Date: Wed, 30 Sep 1998 00:21:19 -0400 (EDT)
> From: Vlad Stesin 
> Subject: RE: GPL & commercial software, the critical distinction (fwd)

> > 
> > Solaris, HP, BSD, NT, etc. *wish* they were as stable and popular as Linux.
> > 
> 
> Which BSD are you talking about? From my personal and professional
> experience, OpenBSD, NetBSD and FreeBSD proved to be just as stable (and
> OpenBSD even more stable and reliable) than Linux. All three of them are

> Take a look at http://www.openbsd.org/crypto.html for more info.
> 
> I hope you meant BSD/OS when you mentioned BSD :-)

Well I've used all three version. In particular after I got my current Sun
4/380 from the local CACTUS Unix user group I tried several variaties of BSD
on it and none of them have stayed up as long, had as many applications
available for them, or been easier to debug than Linux SPARC (and that is
behind x86 by a couple of generations - though that should change in the
immediate future). I also tried it on my Amiga 2000 when there wasn't a
working version of Linux for it. I've got like 5 different disk sets I've
tried over the last 3 years, thanks I'll stick with Linux SPARC. I've even
got an *old* version of BSD before they went with their current license scheme
that I used when I worked at Compu-Add from '91 through '92 in their POS
support department because one of our food chain customers liked the way
the box arched....:)

I have yet to see any BSD installation with a total uptime greater than 8-10
weeks whereas I've seen my *old* 1.1.59 Linux version (still running on
einstein.ssz.com at this very moment) stay up for over 6 months between
reboots (and even then it wasn't a requirement, the clock keeps wondering off
and by 6 months it's nearly 12 hours ahead).

I have no desire to get into a OS war, I currently use like 6 different
os'es at home - to each their own.

But to assuage your curiosity I prefer AmigaDOS and/or Plan 9 with Logo
for programming (now if I could only find a decent Logo compiler),
though Amoeba is starting to look pretty interesting. I'd use BeOS a lot
more if I thought for one second there was a real future for it, even though
I do try each release.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage at ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------





From anto at commnet.it  Wed Sep 30 00:33:05 1998
From: anto at commnet.it (anto at commnet.it)
Date: Wed, 30 Sep 1998 00:33:05 -0700 (PDT)
Subject: Find  Out  Anything  About  Anyone  On  The  Net  !!!!
Message-ID: <199809272208.SAA08331@sampson.cbn.org>



YOU can easily learn how to investigate and learn EVERYTHING 
about your employees, neighbors, friends, enemies, and or
anyone else  !!!


It is absolutely amazing !!!
YOU Must Get This Extraordinary Package today.........


   +  YOU can track down an old friend or a lost love,
     and, just for fun, investigate your family history.

   +  YOU can screen prospective employees criminal records,
     look at their driving, or credit history.

   +  YOU can verify test results from drug testing and even
     look into your children's friends history for any type 
     of record.

   +  YOU can TRACK down and locate an old debtor who is
     hiding from you and see if he/she is hiding any assets.

   +  YOU can look up "unlisted telephone numbers."  Locate
     social security, birth, adoption or death records.
     Check Army, Navy, Marine Corps, or Air Force service
     file records.  YOU will simply be amazed to learn what
     sensitive and important information other people and
     enemies can discover about YOU !!!!!

YOU Can Find Out Anything About Anyone On The Net !!!
Do background checks on people and charge for it, as
you start your own investigative services.
Stop guessing about the LAW !!!
Look up laws and do much more, direct from famous law libraries.
Get this easy to use  KIT  right away, and then,
YOU can become a private investigator.

ORDER TODAY !!!!!


Send $18.00 cash (wrapped in two pieces of paper),
money order, or check to:

                    INFORMATION, Ltd.
                    P. O. Box  515019
                    St. Louis,  MO  63151-5019  USA

The Complete Package Will Be Immediately Shipped
Prepaid Directly to You With Everything You Will Need
In Your Kit to Get Started Right Away !!

THANK YOU for your kind attention, and have a nice day !!!!


+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++




YOUR AD IN 333 NEWSPAPERS !!!!!!!!!!
***********************************************

         Seven years ago, I learned how to place my Classified Ad in
several hundred newspapers, with just one telephone call.  And, my
cost was $0.51 per newspaper.  The total circulation was well over
1.5 Million.  I could reach just about any market, anywhere in this
country.  Since then, my small mail-order company has exploded.
And, I use this same time tested and true method week after week.

         I would like to share this powerful information and show you
how to save hundreds, even thousands of dollars on advertising that
works.  The average cost of a classified ad in a newspaper is about
$15.00 to $20.00 dollars.  Multiply that by 333 and your total cost is
well over $6,000.00 Dollars.  By using our amazing method, your
total cost is only $170.00.  Not to mention the time and money you
save by placing one call, instead of 333 long distance calls.

          You can limit your promotion to a Single State or place your
ad in Several States around the country, all with just one phone call.
You can reach One Million Readers on the East-Cost today and a
Million on the West-Coast tomorrow.  It's that simple  !!!!

            Your cost for this priceless information, is only $19.00 !!!  
You will make that back on your first promotion.  WE are so confident that
this type of advertising will boost your profits, we will guarantee your
satisfaction with our Money Back Guarantee !!  So, you have nothing
to lose.  Now, order our amazing classified ad method today !!!!!! 


                                PRINT ORDER FORM
Ship To:                    **************************
*********
NAME____________________________________________

ADDRESS________________________________________

CITY______________________________________________

STATE__________________    ZIP_____________________

E-MAIL__________________________________

Don't Delay,   ORDER YOUR COMPLETE MEDIA KIT TODAY !!!!!!!

**********************************************************************
Mail Payment  $19.00  CASH,  money order,  or check  TO:
********************
 
                                  INFORMATION, Ltd.
                                  P. O. Box  515019 
                                  St. Louis, MO 63151-5019  
                                  U.S.A.

WE will ship your complete KIT directly to you !!!!
 

**************************************************************
OPTIONAL / OVERNIGHT SHIPPING - ADD $15.00
**************************************************************
                          
Thank you for your kind attention, and have a nice day !!!


       YOU MAY ORDER BOTH PACKAGE KITS FOR ONLY $33.00



++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Admin
Internet Services
This message is not intended for residents in the 
State of Washington, screening of addresses has been done
to the best of our technical ability.
If you are a Washington resident or otherwise wish to be
removed from this list, go to global remove site if you want
your address removed from future mailing. 
http://209.84.246.162/remove.htm
 
This Global Communication has been sent to you by:
PAVILION ADVERTISING SERVICES
Offices:  London, Paris, Berlin, Hong Kong























From stuffed at stuffed.net  Wed Sep 30 01:17:10 1998
From: stuffed at stuffed.net (STUFFED NEWS DAILY)
Date: Wed, 30 Sep 1998 01:17:10 -0700 (PDT)
Subject: TODAY'S NEWS AND PICS PACKED STUFFED! - READ IT NOW!
Message-ID: <19980930071000.693.qmail@eureka.abc-web.com>


+ 30 FREE HOT JPEG PHOTOS
+ 5 SUPER SEXY STORIES
+ GETTING GIRLS HORNY
+ COW SABATOGE
+ BAD BOYS, BAD BOYS
+ THE BEST OF EUREKA
+ BILL KNOCKS PAMELA DOWN TO 2ND
+ THE EVIL ALIENS ARE COMING
+ LOONY TUNES AND MORE

       ---->   http://stuffed.net/98/9/30/   <----

Welcome to  today's  issue of Stuffed. To read it you should
click on the URL above.  If it is not made clickable by your
email program  you will need to  use your mouse to highlight
the URL,  copy it and then paste it into your browser  (then
press Return).

This  email  is  never  sent  unsolicited.  Stuffed  is  the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing  are in every issue of Eureka!

       ---->   http://stuffed.net/98/9/30/   <----





From mgering at ecosystems.net  Tue Sep 29 12:18:47 1998
From: mgering at ecosystems.net (Matthew James Gering)
Date: Wed, 30 Sep 1998 03:18:47 +0800
Subject: GPL & commercial software, the critical distinction (fwd)
Message-ID: <33CCFE438B9DD01192E800A024C84A19284706@mossbay.chaffeyhomes.com>



Jim Choate wrote:
> This is bogus reasoning. If the API is released there is 
> *more* motivation for the original distributor to keep 
> backward compatibility and bug-free.

Duh, I never said otherwise. More motivation and more cost.

Sometimes (more often than not) it takes a couple drafts and re-writes
before things are the way they ought to be. APIs will often progress
from private to public as an evolution from immaturity to maturity,
disorganization to organization, ad hoc hack to flexible functionality,
custom purpose to generic usefulness. You evidently completely missed
that point.

> You want quality code that is bullet-proof then release the 
> API and let the fittest survive.

Which is fine unless you are liable to support the inferior.

> If you release the API you'll find those midnight hacks 
> go away, *not* increase as you seem to be claiming.

Midnight hacks will never go away.

But again, you missed my point. I stated many APIs start out as midnight
hacks.

> Solaris, HP, BSD, NT, etc. *wish* they were as stable and 
> popular as Linux.

Let's not start OS wars. Each to their own, OSs are tools not religions.

> Free-market *requires* fair competition

By whose misguided definition? Free market required freedom (freedom
requires absence of coercive force), nothing else. Freedom is about
actions (motion), not static states (past/present/future), and so is
Competition. Id est, competition includes potential competition, a free
capital market guarantees potential competition, only force [regulation]
can hinder that.

> it means there are no outside regulations applied. 
> It says *nothing* about internal regulation applied 
> by either the producer or the consumer.

"Regulation" generally = political power (= force). Whether than is
externally applied or internally applied under the threat of external
force makes no difference. When the politicos talk about wanting
deregulation and industry self-regulation, what they really mean is they
want industry to bow to their whim under threat of their arbitrary
power. Such actions then avoid the scrutiny and protections
theoretically provided by the political/legal system.

The only legitimate force is economic -- the decision to purchase or not
to purchase, or to purchase a competing or alternative product. Economic
force is not a regulator of the free market, it is its heart and soul,
the essence of the free market. Economic force requires absence of
political force to truly work properly.

> If you are seriously saying that the only workable market 
> scheme is to let people cheat and steal from others
> (which is what poorly written and unreliable code does)

How so? You have a choice to consume or not to consume, there is no act
of coercive force, I cannot steal from you without it. Cheat I may, a
fool and his money are easily parted. Civil liability and reputation
naturally regulate such things, no govt. regulation necessary. [And you
say, but wait, civil liability requires govt. regulation -- it does now
but it need not, free market legal systems can provide such with
reputation instead of guns as its basis]

> Malarky. Microsoft has so many hidden, undocumented, 
> incomplete API's it isn't even funny.

Did I say they did not? I've worked at Microsoft, I not only know that
but I know why (and it's no conspiracy, chaos is more like it). 

They also have good many published APIs, and at the application layer
they are way ahead of most other vendors. At the OS layer I think open
source will win out, so you are preaching to the choir.

Open source will prevail if it makes economic (business) sense, all
other reasons are corollary. Regulation will destroy the free market
that could make open source viable.

     "There is a fantasy that open source and capitalism are 
     incompatible," Allman said. That misconception was at the 
     center of the decision to drop the "freeware" moniker in 
     favor of "open source." As Allman and others explained, 
     open source is a model for doing business, for making money.

(source: http://www.upside.com/texis/mvm/story?id=3564b5500)


	Matt





From accutone at earthlink.net  Wed Sep 30 06:11:44 1998
From: accutone at earthlink.net (accutone at earthlink.net)
Date: Wed, 30 Sep 1998 06:11:44 -0700 (PDT)
Subject: 99 Toyotas as low as 2% over invoice
Message-ID: 


Please accept our appologies for your inconvenience if you are
not interested in this e-mail offer. If you are interested in a new 99'
toyota car, truck, or van at prices as low as 2% over invoice
on selected models and/or huge savings on pre-owned certified toyotas
as well as 100's of other pre-owned vehicles of all makes and models
below kelly blue book, please respond with your name, phone #,
e-mail address and the specific model you are interested in.
Please include all the required information that we have requested, 
or there will be a delay processing your request. We thank you for your
 time. please accept our apologies for the intrusion and de-select yourself 
from our mailing list if not interested. Thank you.  
                






From nobody at replay.com  Tue Sep 29 15:35:05 1998
From: nobody at replay.com (Anonymous)
Date: Wed, 30 Sep 1998 06:35:05 +0800
Subject: Democracy...
Message-ID: <199809301127.NAA08129@replay.com>



I find that religion is one of the most detrimental forces to the
internet.  I believe that the internet is a very real chance to assert
self-rule.  A religious government would not allow that.  I might
worship false idols or something.  If government does start to favor
religious morals I hope it is voodoo!  That would at least add some
entertainment :)
==
"The same thing we do every night Pinkey,
 try to take over the WORLD!"
                          - The brain
_________________________________________________________
DO YOU YAHOO!?
Get your free @yahoo.com address at http://mail.yahoo.com





From mok-kong.shen at stud.uni-muenchen.de  Tue Sep 29 16:21:57 1998
From: mok-kong.shen at stud.uni-muenchen.de (Mok-Kong Shen)
Date: Wed, 30 Sep 1998 07:21:57 +0800
Subject: (fwd) Echelon
Message-ID: <36123036.40EE5E3@stud.uni-muenchen.de>



The following article came from Duncan Campbell 
through a mailing list:

__________________________________
21/9/98

The debate about ECHELON - last week in the European Parliament - has
again
highlighted the role of the NSA station at Menwith Hill, Yorkshire.  
The
report prepared earlier this year for the STOA (Scientific and Technical
Options Assessment) of the European Parliament resulted in widespread
coverage in Europe and the US.   

We have recently made a new batch of copies of the 1993 Dispatches
documentary on Menwith Hill - "The Hill" - based on revelations based on
NSA documents obtained by women peace protesters at the Hill.   It also
covers ECHELON and other NSA activities in the UK.   Tapes (45 mins) can
be
ordered from :

        Ian Hide 
        IPTV Ltd
        1 Meadowbank
        Edinburgh EH8 8JE

At �10.95 including postage.

I will e-mail trancripts of the programme free of charge to anyone
requesting it.

Duncan Campbell





From emailking.associates at cwix.com  Tue Sep 29 17:41:59 1998
From: emailking.associates at cwix.com (emailking.associates at cwix.com)
Date: Wed, 30 Sep 1998 08:41:59 +0800
Subject: advertisement
Message-ID: <199809301343.IAA11432@einstein.ssz.com>



This Message was Composed using Extractor Pro '98 Bulk E- Mail 
Software. If 
you wish to be removed from this advertiser's future mailings, 
please reply 
with the subject "Remove" and this software will automatically 
block you 
from their future mailings.

The person who chooses to try something and fails is a far 
greater person than the person
who chooses to try nothing and succeeds!

The difference between the successful person and the unsuccessful 
person is that the successful 
person is willing to do that which the unsuccessful person is 
not!

If you are looking to dable or window shop, this is not for you. 
Please do not respond to this message
 unless you know you have what it takes and you are truly willing 
to put in the effort to become
 successful. This Business Opportunity is for the person who is 
serious about making money, 
controling their schedule, reducing their tax liability and 
becoming financially independent!

Believe it or not the majority of people are not truly committed 
to making the financial and time 
committment it takes to achieve financial independence.  The 
question is.... are you?

If you are, you will never find a business opportunity that 
offers such a high return on your time and 
dollar investment, than we are offering here.


No Risk Guarantee!      -     Prospects Call You!

Not MLM!          Honest, Ethical Business!

See why heavy hitters are leaving there Multi-level programs 
forever.

With DESIRE & EFFORT.... YOU ABSOLUTELY CANNOT FAIL!

$8,000 - $10,000 first 4 to 8 weeks!

All you need is a telephone,  fax machine and the passion to 
succeed.

Would you take 2 minutes to find out how! CALL NOW!!!

1-800-781-7046 ext.6053
Only serious inquiries please.

I have been involved in this business for only 5 weeks and I 
cannot believe the income! I am this 
coming week ending a twenty year career.  My wife and family love 
it. They will see me more than 
ever. I've been in several MLM's and experienced moderate 
success. This is not MLM. It is a 
legitamate turn-key business with an outstanding product, 
unbelievable compensation structure, lead 
generation system and I have all the qualified leads than I can 
contact every week! The support and
 training are fantastic!
 
You owe it to yourself and your family to check it out.
Sincerely,
Jim

1-800-781-7046 ext.6053

If you do not wish to receive this message hit "reply" and type 
"remove" in the subject line and you
will atomatically be removed from future mailings. Sorry if this 
was an inconvenience to you.





to be removed type "remove" in the subject header and e mail back 
emailking.associates at cwix.com

sent e mail king and associates
1790 bonhill rd
mississauga on
l5t 1e1
 
 
 
 
 
 
 
 
 
 
 
 





From billp at nmol.com  Tue Sep 29 17:44:32 1998
From: billp at nmol.com (bill payne)
Date: Wed, 30 Sep 1998 08:44:32 +0800
Subject: hoodwinking  congress
Message-ID: <36123260.2E7B@nmol.com>



Wednesday 9/30/98 6:57 AM

J Orlin Grabbe
John Young

I read      Operating Systems
           Netscape & Intel Grab On to Red Hat
                                 Linux
                   as Windows NT Alternative

at http://www.aci.net/kalliste/ this morning.

I have to get my �green machine� http://www.metriguard.com/HCLT.HTM
assembler code ported to Visual Basic 6.0 using MASM 6.11.

Yesterday I discovered that VB 6.0 uses the flat model.  Thirty-two bit
addresses.
No segment registers.

No longer will code be backward compatible on Intel processors.

One of my next steps is to get the digital FX working, of course, then
port the PC
sides to NT.

VB 6.0 is using Microsoft�s optimized C compiler to do the Visual Basic
compilation!

I learned yesterday evening that the PC Data System in Australia is
grading lumber at
2,000 feet per second.

I was in Grangeville, Id at Sherer planer mill in about January of 1996
testing out PC Data System.

  PC Data System - Pentium PC & Windows (R) software system for
production-line lumber     testing - CLT & HCLT 
http://www.metriguard.com/METPROD.HTM

I was told last night that Sherer system was only running 800 per
minute.

2 x 12 about 16 feet long planks were running continuously through the
machine at Sherer.  Wewear ear plugs the noise was deafening.

Sure be fun to get this mess settled so that I could do more work with
NT.

We are in a lull in the GREAT FIGHT.  http://jya.com/whpfiles.htm

I thoroughly enjoyed http://www.jya.com/itl-news.htm government crypto
propaganda attempt in view of Black and White.
http://www.aci.net/kalliste/bw1.htm 
http://www.zolatimes.com/v2.29/bw1.html

Let�s hope some FINALLY figure out that NSA, NIST, and the FBI are
hoodwinking 
congress on the crypto issue merely for business reasons.  

Let�s all hope for settlement before this matter gets WORSE.

Later
bill






From rah at shipwright.com  Tue Sep 29 18:24:42 1998
From: rah at shipwright.com (Robert Hettinga)
Date: Wed, 30 Sep 1998 09:24:42 +0800
Subject: IP: 1998 FBI WISH LIST - Unlimited Wiretaps!
Message-ID: 




--- begin forwarded text


Delivered-To: ignition-point at majordomo.pobox.com
Date: Wed, 30 Sep 1998 05:55:01 -0400 (EDT)
To: ignition-point at majordomo.pobox.com
From: softwar at us.net (CharlesSmith)
Subject: IP: 1998 FBI WISH LIST - Unlimited Wiretaps!
Sender: owner-ignition-point at majordomo.pobox.com
Precedence: list
Reply-To: softwar at us.net (CharlesSmith)

September 29, 1998 --from Congressman Barr's web site

BARR EXPOSES DEPARTMENT OF JUSTICE POWER GRAB

WASHINGTON, DC -- U.S. Representative Bob Barr (GA-7) released today
information exposing an effort by the Department of Justice to obtain
massive new enforcement powers in the closing days of the 105th Congress. Barr
obtained the information from a confidential source within federal law
enforcement.  Among other things, the Department's "wish list" for new
authority includes (among others):

A vastly expanded definition of terrorism to include domestic crimes
having no relationship to terrorism.

The power to seize commercial transportation assets for federal use.

The ability to commander personnel from other federal agencies without
reimbursement.

Expanded wiretap authority to allow "roving" wiretaps, and wiretaps
without any court authority.

Enlarged asset forfeiture provisions to allow the FBI to seize personal
property in both criminal and civil matters.

The establishment of a permanent "FBI Police Force."

Loosening of Posse Comitatus restrictions to allow more military
involvement in domestic law enforcement.

Authority to force telephone and Internet companies to divulge
information on their customers.

"These requests belong in some bizarre conspiracy novel, not in serious
legislative documents being circulated at the top levels of federal law
enforcement.  These proposals represent a sneak attack on the most cherished
principles of our democracy.  If they become a part of our law, freedom and
privacy in America will be permanently and severely diminished," said Barr.

Barr also noted the Department and the FBI are "shopping" this wish list
in an effort to get the items placed in a spending measure without hearings
or debate.


================================================================
1 if by land, 2 if by sea.  Paul Revere - encryption 1775
Charles R. Smith
SOFTWAR         http://www.softwar.net      softwar at softwar.net
Pcyphered SIGNATURE:
742A59841467BC656DC19CD9D14B57318A1D3BDAB365AA32D70AD05DFAA08FC7
16CACEB73A010562BC412D6F45E1A2B88074A90A1D3AD6077895CAC1FDE25404
8C02268DEC1D0880
================================================================
SOFTWAR EMAIL NEWSLETTER                            09/30/1998
***  to unsubscribe reply with "unsubscribe" as subject    ***
================================================================






**********************************************
To subscribe or unsubscribe, email:
     majordomo at majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email at address
**********************************************
www.telepath.com/believer
**********************************************

--- end forwarded text


-----------------
Robert A. Hettinga 
Philodox Financial Technology Evangelism 
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'





From 2001files at usa.net  Tue Sep 29 20:07:25 1998
From: 2001files at usa.net (2001files at usa.net)
Date: Wed, 30 Sep 1998 11:07:25 +0800
Subject: Increase Your Paycheck Next Week
Message-ID: <199809301608.JAA07148@cyberpass.net>



Would you like to get a pay raise next week without asking your boss?   Then this very special report, "Money Power," is for you!

If you have a regular job - not working in your own or a family business - and you get a regular paycheck, we can show you how you can give yourself a HUGE RAISE in your very next paycheck.  At least between 20% - 30% more than what you are getting now.  Yes, your paycheck will be increased substantially!

	* Example:  If your take home pay is $400 net per week, you can take home $440 - $500 the very next week and every week thereafter!

No Gimmicks!  Everything is perfectly legal.

"Money Power" is written in three parts:

	*Part I - shows you exactly what to do so you can give yourself a raise in your next paycheck.  You decide how big a pay raise you want to give yourself!

	*Part II -  shows you how to protect yourself, your family, your home, and your assets without paying big money -- just $85 per year to legally protect your liability 100% against bill collectors and debts.

	*Part III - shows you how you can legally deduct household expenses - utilities, gardener, supplies, repairs, and more from your income taxes.  Absolutely No Gimmicks!  Everything is legal.

This is NOT a "get rich quick" scheme or some other scam.  We are sure you have seen lots of them.  And this is NOT a "tax protester" who refuses to pay income taxes.  The author of this report pays taxes every year - of course, as little as legally possible.  It's our opinion it is not good to zero out completely.  But, you can - it's your choice.

Using the methods in this report, the rich become richer.  And poor people become poorer when they don't take advantage of these techniques.  Your chances of being audited by the IRS - just for using these methods - are near zero.

	* We are so sure "Money Power" will work for you, here is our risk-free guarantee.  If you don't get at least 100 times more money in your paycheck in one year than the cost of this report, we will double your money back!  How's that for a guarantee?
                      ---------------------------------

Now, here's one more offer you will find hard to refuse.  We have a Reseller Program whereby you can make money selling this report.  When you purchase "Money Power," you will also get 1,000 FREE places to advertise on the Internet!  If you want to make some extra money - $500, $1,000 or more - just post ads on those sites and have the orders come to you.  For every order you send us, we will pay you $5.00:
	*You don't need a merchant account to process orders!  We do that.
	*You don't have to warehouse any inventory!  We do that.
	*You don't have to ship any merchandise.  We do that.
All you have to do is send us the orders.  We'll process checks, money orders, and credit cards and we will pack and mail the report.  And you get paid twice a month - on the 15th and the 30th!
                     ------------------------------------



And, listen.  America is a free country.  If you don't want an increase in your paycheck, that's fine.  And if you don't want to know how to protect your family, that's OK, too.  And if you don't want to save money on taxes, that's quite all right.  You are living in a free country.

But, if you need money - more money in your paycheck, act right now!  

The author of this report used to work for Corporate America earning over $100,000 a year.  After paying almost 40% in Federal taxes, 6.2% for Social Security, 1.45% for Medicare, 1.5% for the unemployment fund, and 3% for his employee benefits, he would bring home less than half of his yearly salary!  And then there was state income tax to pay!   He decided he had to do something so he could keep all the money!

"Money Power" is the result of the author's frustration and aggravation with the system and the research he did to change his situation.  These are methods they don't teach you in school!

It can't get much better than this.  This is a once in a lifetime opportunity because you may not receive this message again.  And you know how it is with opportunities ..... if you pass on one, you are not entitled to another for a long time.


Don't Delay!  The longer you wait to order, the longer you will wait for your raise!!!!


	>>>>>>>>>>>>> Please Note:  This report is for U.S. Citizens and Green Card holders only!  This program will not work for illegal immigrants or foreigners.<<<<<<<<<<<<

---------------------------------------------------------------------------

Here's how to order:

*****To order online, click on your reply button and type ORDER ONLINE in the subject line and we will e-mail you the online order form.

                             OR

Print out the convenient order form below NOW and mail it to:

	World Net Press
	Dept. EN-930
	P.O. Box 96594
	Las Vegas, NV 89193-6594
	
Payment Method:  
_____ Check     
_____ Money Order
_____ Visa
_____ MasterCard
_____ American Express
_____ Discover

_____ Yes, I want to order my copy of  "Money Power".  Price is $9.95 + $3.95 S/H = $13.90 and my order will be shipped by 1st Class Mail.   

Name_________________________________________________________________________

Address______________________________________________________________________

City/State/Zip_______________________________________________________________

Daytime Phone (__________)___________________________________________________

E-Mail Address_______________________________________________________________

Credit Card #_____________________________________________ Exp. Date_________

Cardholder Name (as it appears on the card)__________________________________

(Please make sure you include your phone number and e-mail address in case we have a question about your order.  Your credit card billing will reflect Road to Wealth, Inc.)



**************************************************************************
We are currently consolidating our mailing lists and need to update our database.  Our records indicate you may have inquired in the past. If this message has reached you in error, or the information is not correct, please accept our apology.  Follow the instructions below to be removed and we will honor your request.  We do not knowingly engage in spam of any kind.

Please click on your reply button and type REMOVE in the subject line only.  The software reads only the subject line, not the body of the message.
**************************************************************************

Please be advised we collect the e-mail addresses of all flamers, hackers, and users of abusive and vulgar language.  We submit these addresses to the FBI and Interpol on a monthly basis.  








From rms at santafe.edu  Tue Sep 29 20:22:56 1998
From: rms at santafe.edu (Richard Stallman)
Date: Wed, 30 Sep 1998 11:22:56 +0800
Subject: propose: `cypherpunks license' (Re: Wanted: Twofish source code)
In-Reply-To: <199809281845.TAA18662@server.eternity.org>
Message-ID: <199809301621.KAA09091@wijiji.santafe.edu>



    All stuff I have written (non-commercially) so far has been PD.
    (Actually I don't even dignify it with a `this is PD' note -- I
    personally have zip respect for copyright, patents, licenses).

Legally, what this means is that your software is copyrighted, and any
redistribution of it is illegal.  That counterintuitive consequence is
the due to a treaty, the Berne Convention, that was designed to cater
to copyright owners.

    However, perhaps one could do one better than PD: restrict use to
    propogate cypherpunk goals.  eg. 

    - You may not use this code in software which provides government back
    doors.

    - secret service agencies can not use this software / or must pay
    exorbitant license fees

My information is that such criteria are not legally enforcible under
copyright law in many countries.  You should probably check with a
copyright lawyer before trying such a thing.

In addition, a program with a restriction like this is not free
software, so people would probably work on a free replacement for it.
I don't want government back doors in any software I use, but this
kind of restriction is the wrong way to avoid them.  The right way is
through the GNU GPL, which would enable people to check the source
code of a modified version for anything suspicious.






From rms at santafe.edu  Tue Sep 29 20:26:24 1998
From: rms at santafe.edu (Richard Stallman)
Date: Wed, 30 Sep 1998 11:26:24 +0800
Subject: propose: `cypherpunks license' (Re: Wanted: Twofish source code)
In-Reply-To: <199809281845.TAA18662@server.eternity.org>
Message-ID: <199809301621.KAA09089@wijiji.santafe.edu>



I designed the GNU GPL to insist that you must make your code free
software, if you include GPL-covered code in it.  I did this for a
reason: to encourage people to make software free.  It does this by
providing code that is available only for writing free software, not
for writing proprietary software.

The GNU GPL works well to promote free software (see
http://www.gnu.org/philosophy/pragmatic.html).  It also permits
commercial use of the code.  What it does not permit is using the code
in a proprietary program.  I won't use proprietary software, I want to
have free software for every job.  So I have no reason to help you
write any proprietary software.  If you want code you can use in a
proprietary program, you are out of luck.

It isn't surprising that people who want to write non-free software
are disappointed that the GNU project won't help them.  What is
amazing is that they feel this is unfair.  They have no intention of
letting me use their source code in my programs--so why should they be
entitled to use my source code in their programs?  These people seem
to think that their selfishness entitles them to special treatment.

The GPL is my way of offering a certain kind of cooperation to anyone
else who is willing to cooperate in the same way.


For an explanation of the difference between commercial and
proprietary, see http://www.gnu.org/philosophy/categories.html and
http://www.gnu.org/philosophy/selling.html





From eay at cryptsoft.com  Tue Sep 29 21:45:14 1998
From: eay at cryptsoft.com (Eric Young)
Date: Wed, 30 Sep 1998 12:45:14 +0800
Subject: propose: `cypherpunks license' (Re: Wanted: Twofish source code)
In-Reply-To: <199809301621.KAA09089@wijiji.santafe.edu>
Message-ID: 




On Wed, 30 Sep 1998, Richard Stallman wrote:
> It isn't surprising that people who want to write non-free software
> are disappointed that the GNU project won't help them.  What is
> amazing is that they feel this is unfair.  They have no intention of
> letting me use their source code in my programs--so why should they be
> entitled to use my source code in their programs?  These people seem
> to think that their selfishness entitles them to special treatment.

:-) I always find this amusing myself.  If people have written code, they are,
by virtue of the fact they have actually done the work, able to enforce their
particular views on the world via their licence, be it a GNU, BSD, Netscape or
other form.  The problem sometimes occurs when people put their code out under
a licence they do not fully understand, and does not capture their intent.
I personally have a policy that if I ever change the licence conditions in any
of my code, the last version with the old licence will always be available for
those who don't like the new licence.  This way if my opinions on how the
software can be used changes, people don't have to suffer through my
'conversion to a new faith' :-).  The will only have access to the old stuff
under the licence they like.
 
> The GPL is my way of offering a certain kind of cooperation to anyone
> else who is willing to cooperate in the same way.

And the problem that some of us have with the GPL, in that it does take a
rather strong stance on this issue, making it incompatable with other people
who are not that passionate.

eric





From coryking at azalea.com  Tue Sep 29 22:12:39 1998
From: coryking at azalea.com (Cory R. King)
Date: Wed, 30 Sep 1998 13:12:39 +0800
Subject: SPAM -> FW: Increase Your Paycheck Next Week
Message-ID: <2103E70650D5D11189650080ADB400C505A57A@DOGBONE>



Without a doubt, this is the first spam that has made me seriously
question taking the low ground in the spam wars, and just totally
fucking with this guy.. I've got quite a stack of "bill-me-later"
magazine subscriptions that I would be more then happy to sign this
asshole up to....

TO AOL.COM:  This puppy came from you....  all lines above - 
Received: from 152.202.71.131 (202-71-131.ipt.aol.com
[152.202.71.131])....
 - are part of the mailing list that this asshole sent to...  also take
a look at the last sentence of this guys spam....  oooooooooooo... I'm
gonna mail him some "abusive" shit in a second!!!!!!!  LART this luser
GOOD!!!!

TO USA.NET:  To drop boxes to investigate:  2001files at usa.net,
business_ideas at usa.net

TO CYPHERPUNKS:  If any of you guys are the "psychotic" kind... please
be so kind as to kill this asshole...  How DARE he threaten us (see last
line of spam!).... fucker.....

TO BUSINESS_IDEAS at USA.NET:  HEY!!! ASSHOLE!!!!  HOW ABOUT YOU FORWARD
THIS "ABUSIVE" LANGUAGE TO YOUR FUCKING FBI AND "INTERPOL" YOU FUCKING
SHITHEAD!!!!!  IF I EVER SEE YOU ON THE STREET, MARK MY WORDS, YOU ARE A
DEAD MAN!!!!!!!!!!!!!!!!!


-----------------
Cory R. King

"As soon as men decide that all means are permitted to fight an evil,
then their good becomes indistinguishable from the evil that they set
out to destroy."
 - Christopher Dawson

-----Original Message-----
Received: from www.video-collage.com ([206.15.171.132]) by
dogbone.azalea.com with SMTP (Microsoft Exchange Internet Mail Service
Version 5.5.1960.3)
	id T5JVBF6T; Wed, 30 Sep 1998 09:56:22 -0700
Received: (from ichudov at localhost)
	by www.video-collage.com (8.8.5/8.8.5) id MAA01379
	for cypherpunks-outgoing; Wed, 30 Sep 1998 12:03:54 -0400 (EDT)
Received: from sirius.infonex.com (sirius.infonex.com [209.75.197.2])
	by www.video-collage.com (8.8.5/8.8.5) with ESMTP id MAA01367
	for ; Wed, 30 Sep 1998 12:03:48 -0400
(EDT)
Received: (from cpunks at localhost) by sirius.infonex.com (8.8.8/8.8.8) id
JAA20785; Wed, 30 Sep 1998 09:07:02 -0700 (PDT)
Received: from cyberpass.net (cyberpass.net [209.75.197.3]) by
sirius.infonex.com (8.8.8/8.8.8) with ESMTP id JAA20767 for
; Wed, 30 Sep 1998 09:06:56 -0700 (PDT)
Received: from 152.202.71.131 (202-71-131.ipt.aol.com [152.202.71.131])
by cyberpass.net (8.8.8/8.7.3) with SMTP id JAA07148 for
; Wed, 30 Sep 1998 09:08:07 -0700 (PDT)
Date: Wed, 30 Sep 1998 09:08:07 -0700 (PDT)
From: 2001files at usa.net
Message-Id: <199809301608.JAA07148 at cyberpass.net>
To: cypherpunks at cyberpass.net
Reply-To: business_ideas at usa.net
Subject: Increase Your Paycheck Next Week
Sender: owner-cypherpunks at Algebra.COM
Precedence: bulk
X-Mailing-List: cypherpunks at algebra.com
X-List-Admin: ichudov at algebra.com
X-Loop: cypherpunks at algebra.com


Would you like to get a pay raise next week without asking your boss?
Then this very special report, "Money Power," is for you!

[spam snip]

	World Net Press
	Dept. EN-930
	P.O. Box 96594
	Las Vegas, NV 89193-6594
	
[spam snip]


Please be advised we collect the e-mail addresses of all flamers,
hackers, and users of abusive and vulgar language.  We submit these
addresses to the FBI and Interpol on a monthly basis.  







From rah at shipwright.com  Tue Sep 29 22:23:42 1998
From: rah at shipwright.com (Robert Hettinga)
Date: Wed, 30 Sep 1998 13:23:42 +0800
Subject: [Fwd: EECS Colloquium Monday Oct 5]
Message-ID: 




--- begin forwarded text


Date: Wed, 30 Sep 1998 13:28:45 -0400
From: Richard Lethin 
Organization: Reservoir Labs, Inc.
MIME-Version: 1.0
To: dcsb at ai.mit.edu
Subject: [Fwd: EECS Colloquium Monday Oct 5]
Sender: bounce-dcsb at ai.mit.edu
Precedence: bulk
Reply-To: Richard Lethin 
Status: U



Return-Path: 
Received: from LCS.MIT.EDU (mintaka.lcs.mit.edu [18.26.0.36])
	by deer-park.reservoir.com (8.8.5/8.8.5) with SMTP id LAA16438
	for ; Wed, 30 Sep 1998 11:34:14 -0400 (EDT)
Received: from theory.lcs.mit.edu by MINTAKA.LCS.MIT.EDU id aa29635;
          30 Sep 98 11:30 EDT
Received: from osprey.lcs.mit.edu by theory.lcs.mit.edu (5.65c/TOC-1.2S)
	id AA03777; Wed, 30 Sep 98 11:29:45 EDT
From: elias at theory.lcs.mit.edu (Peter Elias)
Received: by osprey.lcs.mit.edu (5.65c/TOC-1.2C)
	id AA00821; Wed, 30 Sep 98 11:29:47 EDT
Date: Wed, 30 Sep 98 11:29:47 EDT
Message-Id: <199809301529.AA00821 at osprey.lcs.mit.edu>
To: eecsfaculty at eecs.mit.edu, seminars at lcs.mit.edu, ai-tech-sq at ai.mit.edu,
        joanne at theory.lcs.mit.edu, sgreen at ll.mit.edu, jsweeney at draper.com,
        kaths at lids.mit.edu, jc at cs.brandeis.edu, texasgal at mit.edu,
        bru at media.mit.edu, arthurs at mit.edu, dougross at mit.edu,
        finn at lids.mit.edu, roger at ipswitch.com
Subject: EECS Colloquium Monday Oct 5


Appended is the notice of an EECS Colloquium by Radia Perleman, on
Monday Oct. 5.  Please post and/or forward as appropriate.

Peter Elias
----------------------------------------------------------------------

			     MIT-EECS
			1998 Fall Semester
			 Colloquium Series


	       	  How to Misuse Good Cryptography
	       And Create Insecure Network Protocols

			  Radia Perlman
		  Boston Center for Networking
			SUN Microsystems



			     ABSTRACT


A common misconception is that security flaws involve abstruse
mathematical weaknesses in cryptographic algorithms. While it is
possible to have weak cryptographic algorithms, the world does not
need insecure cryptographic systems in order to design, build, and
deploy insecure network protocols.

This talk discusses example mistakes people have made when designing
or implementing network protocols. Examples include an e-mail standard
that allowed forging of signatures, a public key scheme less secure
than a secret key scheme, a system that thought encryption implied
integrity protection, and public key chain rules that are unworkable
in practice.


		          October 5, 1998
			        4-5 pm
		 Edgerton Hall, 34-101 (50 Vassar St)
		         Refreshments at 3:45


----------------------------------------------------------------------

--- end forwarded text


-----------------
Robert A. Hettinga 
Philodox Financial Technology Evangelism 
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'





From rah at shipwright.com  Tue Sep 29 22:25:02 1998
From: rah at shipwright.com (Robert Hettinga)
Date: Wed, 30 Sep 1998 13:25:02 +0800
Subject: U.K. Hosts Bomb-Proof Computer Room
Message-ID: 




--- begin forwarded text


Date: Wed, 30 Sep 1998 10:55:45 -0700 (PDT)
From: William Knowles 
To: DC-Stuff , Access All Areas 
cc: Digital Commerce Society of Boston 
Subject: U.K. Hosts Bomb-Proof Computer Room
Organization: Home for retired social engineers & unrepented cryptophreaks
MIME-Version: 1.0
Sender: bounce-dcsb at ai.mit.edu
Precedence: bulk
Reply-To: William Knowles 

(Network Week) [9.30.98] Anyone worried about the security of
e-commerce might find a nuclear bomb-proof server room lightly
excessive, but that is exactly what British company AL Digital,
the company behind the Apache-SSL secure Web server, is offering.

AL Digital, based in London, is offering host servers at
The Bunker, an ex-military base that was formerly a key British
Ministry of Defense communications center. The company said the
facility had secure chambers buried deep underground and
communications capacity available on tap.

"We feel physical security is often overlooked," said AL
Digital director Adam Laurie. "Hacking and cracking are not
the major risks anymore because of strong encryption; where
you're vulnerable is at the physical point at which you
decrypt the data."

Laurie said the servers based at The Bunker would be protected
against electronic eavesdropping, physical intrusion, and
electromagnetic damage, as well as a nuclear strike.

"We could have built our own secure facility, but we heard
this was on the market," he added. He said it's as physically
robust as Telehouse, a high-security server-hosting facility in
Staten Island, N.Y., if not more so.


==
I regret to say that we of the FBI are powerless to act in
cases of oral-genital intimacy, unless it has in some way
obstructed interstate commerce. -- J. Edgar Hoover
==
http://www.dis.org/erehwon/



For help on using this list (especially unsubscribing), send a message to
"dcsb-request at ai.mit.edu" with one line of text: "help".

--- end forwarded text


-----------------
Robert A. Hettinga 
Philodox Financial Technology Evangelism 
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'





From schneier at counterpane.com  Tue Sep 29 23:24:58 1998
From: schneier at counterpane.com (Bruce Schneier)
Date: Wed, 30 Sep 1998 14:24:58 +0800
Subject: Announcement: A Self-Study Course in Block Cipher Cryptanalysis
Message-ID: <199809301907.OAA15179@mixer.visi.com>



Ever since writing Applied Cryptography, I have been asked to recommend a
book on cryptanalysis.  My unfortunate answer is that while there are
several good books on cryptography, there are no books, good or bad, on
cryptanalysis.

The only way to learn cryptanalysis is through practice.  A student simply
has to break algorithm after algorithm, inventing new techniques and
modifying existing ones.  Reading others' cryptanalysis results helps, but
there is no substitute for experience.

To help in getting this experience, I designed a self-study course in
block-cipher cryptanalysis.  With it, a student can follow an ordered path
through the academic literature and emerge out the other side fully capable
of breaking new algorithms and publishing new cryptanalytic results.

What I have done is to list published algorithms and published
cryptanalyses in a coherent order: by type of cryptanalysis and difficulty.
 A student's task is to read papers describing algorithms, and then attempt
to reproduce published cryptanalytic results.  (It is definitely more
difficult to learn cryptanalysis from academic papers than from a distilled
textbook, but the sooner a student gets used to reading academic papers the
better off he will be.)  The results, in other published papers, serve as
an "answer key."

The paper is available in both postscript and pdf formats at:

	http://www.counterpane.com/self-study.html

Comments are always appreciated.

Bruce
**********************************************************************
Bruce Schneier, President, Counterpane Systems     Phone: 612-823-1098
101 E Minnehaha Parkway, Minneapolis, MN  55419      Fax: 612-823-1590
           Free crypto newsletter.  See:  http://www.counterpane.com





From petro at playboy.com  Tue Sep 29 23:29:47 1998
From: petro at playboy.com (Petro)
Date: Wed, 30 Sep 1998 14:29:47 +0800
Subject: GPL & commercial software, the critical distinction (fwd)
In-Reply-To: <33CCFE438B9DD01192E800A024C84A19284704@mossbay.chaffeyhomes.com>
Message-ID: 



At 8:41 PM -0500 9/29/98, Matthew James Gering wrote:
>Jim Choate wrote:

>> Had Microsoft, for example, been required to publish their
>> API's by the market we wouldn't be spending all this effort
   ^^^^^^^^^^^^^^^^^^^

>You state free-market and then you are *requiring* someone to do
>something? How do you resolve that contradiction? Require = Force !=
>Free[dom]

	Required as in purchasers large and small saying "You don't include
your source code, we won't buy it".

	Sort of like how restraunts are forced (usually) to provide
dinnerware, sure, they could MAKE you bring your own fork & plate, but they
wouldn't be too popular.

>As far as *commercial* software vendors go, Microsoft is one of the
>better companies for publishing APIs and creating useful APIs and tools
>for Rapid Application Development. Do you subscribe to MSDN? Please do
>before you crucify Microsoft for lack of APIs, if anything they have too
>many.

	"BETTER"?

	Remember "Undocumented Dos"?

	Wasn't there a (couple) windows versions?

	Microsoft sells/gives away it's API so that it can find competent
programmers to hire and lock away in tiny rooms.

--
petro at playboy.com----for work related issues. I don't speak for Playboy.
petro at bounty.org-----for everthing else.      They wouldn't like that.
                                              They REALLY
Economic speech IS political speech.          wouldn't like that.





From warlord at MIT.EDU  Wed Sep 30 00:04:02 1998
From: warlord at MIT.EDU (Derek Atkins)
Date: Wed, 30 Sep 1998 15:04:02 +0800
Subject: propose: `cypherpunks license' (Re: Wanted: Twofish source code)
In-Reply-To: <199809281845.TAA18662@server.eternity.org>
Message-ID: 



The big issue I see with GPL and Crypto software is that with the GPL
you cannot add any redistribution restrictions.  The problem is that
due to the United States export rules, I cannot export Crypto
software, which means I must legally put a restriction on any Crypto
code I write.  But, this is a "further restriction" as far as the
GPL is concerned.  This, in turn, means I cannot use the GPL for
Crypto software.

-derek
-- 
       Derek Atkins, SB '93 MIT EE, SM '95 MIT Media Laboratory
       Member, MIT Student Information Processing Board  (SIPB)
       URL: http://web.mit.edu/warlord/    PP-ASEL-IA     N1NWH
       warlord at MIT.EDU                        PGP key available





From emailking.associates at cwix.com  Wed Sep 30 15:19:19 1998
From: emailking.associates at cwix.com (emailking.associates at cwix.com)
Date: Wed, 30 Sep 1998 15:19:19 -0700 (PDT)
Subject: advertisement
Message-ID: <199809302219.PAA23529@toad.com>


561 540 4028				       561 540 4028      
          


		   E MAIL KING AND ASSOCIATES
		  PUTS MONEY INTO YOUR POCKET!!

OUR COMPANY HAS OVER 3 YEARS PROVEN E MAIL BLASTING EXPERIENCE!

WORK SMARTER BY HAVING QUALIFIED PEOPLE PHONE YOU, ALREADY 
PREPARED TO BUY.

PUT YOUR COLD CALLING DAYS TO AN END.

TRY US OUT TODAY AND JUDGE THE RESULTS FOR YOURSELF! 10,000 E 
MAILS ARE ONLY $125.00 US.

Do you only market your product or service geographically? Not a 
problem with E Mail King. We can target your e-mail broadcastes 
into the city of your choosing!

FOR THOSE OF YOU WHO NEED MAILING CONTINOUSLY DONE, WE WILL E 
MAIL YOUR ADD TO 7500 DIFFERENT ADDRESSES DAILY MONDAY THROUGH 
FRIDAY MONTH AFTER MONTH FOR ONLY $250.00 PER MONTH. CALL TODAY 
FOR DETAILS ON THIS FANTASTIC OFFER!!

We provide bulk freindly web hosting! Our rates are $125.00 per 
month with a $75.00 set up fee. 

IF YOU ALREADY HAVE YOUR OWN E MAIL SYSTEM, WHY NOT TRY OUR 
SUBCRIPTION SERVICE WHERE YOU WILL RECEIVE 50,000 FRESH GOOD E 
MAIL ADDRESSES EVERY MONTH FOR ONLY $90.00.

ARE YOU INTERESTED IN BEING AN E MAIL KING RESELLER? PUT EVEN 
MORE MONEY INTO YOUR POCKET TODAY BY SIGNING UP WITH OUR PROGRAM 
TODAY!! IT DOES NOT COST ANYTHING TO JOIN!!

We accept Visa, Mastercard or Cheque by Fax.
	
James 
phone 561 540 4028

_________________________________________________________________



TO BE REMOVED FROM OUR LIST, email emailking.associates at cwix.com 
and type in "remove" in the subject header or call (561)540 4028

our mailing address is 
EMAIL KING
1790 Bonhill Rd 
Mississauga Ontario
Canada



 
 
 
 
 
 
 
 
 
 
 





From ravage at einstein.ssz.com  Wed Sep 30 01:03:09 1998
From: ravage at einstein.ssz.com (Jim Choate)
Date: Wed, 30 Sep 1998 16:03:09 +0800
Subject: propose: `cypherpunks license' (Re: Wanted: Twofish source code) (fwd)
Message-ID: <199809302058.PAA13319@einstein.ssz.com>



Forwarded message:

> Subject: Re: propose: `cypherpunks license' (Re: Wanted: Twofish source code)
> From: Derek Atkins 
> Date: 30 Sep 1998 16:02:23 -0400

> The big issue I see with GPL and Crypto software is that with the GPL
> you cannot add any redistribution restrictions.  The problem is that
> due to the United States export rules, I cannot export Crypto
> software, which means I must legally put a restriction on any Crypto
> code I write.  But, this is a "further restriction" as far as the
> GPL is concerned.  This, in turn, means I cannot use the GPL for
> Crypto software.

A legal prohibition isn't a licensing restriction, it's a distribution
restriction. A license restriction defines who can use a product and
under what terms they may do so legaly, it doesn't address where they
may use it legaly.

If you tried to put a license restriction that said "can only be used in
the US" *then* you would be correct. It isn't the copyright holders choice
and therefore they're not responsible for it per se. Not to mention that
it would be very hard to support legaly.

A good example is I have a military book that says that you can only
possess the book in the US and Canada...try to enforce that one.

Were that the case Phil Z. would be sittin in a hoosgow right now.

Personaly, I like the idea of printing your source out and sending it to
HackTick for typing in and reposting. That wouldn't effect your initial
licensing restrictions and bypasses the restrictions handily.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage at ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------








From rah at shipwright.com  Wed Sep 30 01:09:53 1998
From: rah at shipwright.com (Robert Hettinga)
Date: Wed, 30 Sep 1998 16:09:53 +0800
Subject: Is the .to (Tonga) domain completely rogue and should be removed?
Message-ID: 



:-).

Cheers,
Bob Hettinga

--- begin forwarded text


Date: Wed, 30 Sep 1998 15:24:09 -0400
Reply-To: bzs at world.std.com
Originator: com-priv at lists.psi.com
Sender: com-priv at lists.psi.com
Precedence: bulk
From: Barry Shein 
To: Multiple recipients of list 
Subject: Is the .to (Tonga) domain completely rogue and should be removed?
X-Comment:  Commercialization and Privatization of the Internet


We've been having increasing problems with one or more porn sites in
the .to domain promoting itself by massive spamming of AOL customers
using one of our domains in their From: header thus causing both
complaints to us and thousands of bounces from AOL due to bad AOL
addresses in their spam lists.

Looking at the .to domain I can't help but notice it's heavily laden
with what appear to be porn sites (sexonline.to, come.to,
xxxhardcore.to, etc.)

1. Performing traceroutes and other analyses seems to indicate that
this domain is NOT being used for communication with entities
legitimately located (legally, not only geographically) within the
sovereignty of the Kingdom of Tonga, as intended.

2. Clearly criminal and malicious activites are arising from sites to
which Tonga has provided comfort and sanctuary.

3. Therefore, I call for a process whereby it can be determined as to
whether or not it is appropriate to decommission the Tongan domain due
to negligence, mismanagement, and having allowed it to become an
attractive resource for criminal activities. I do not believe the
Tongan domain serves any legitimate purpose as an internet resource.

In support of this assertion I want to show you an SMTP conversation
with what claims to be the Consulate of the Government of Tonga in San
Francisco (This San Francisco office is listed as an official Tongan
contact point for visas etc by the US State Dept):

world% telnet sfconsulate.gov.to 25
Trying 209.24.51.169...
Connected to sfconsulate.gov.to.
Escape character is '^]'.
220 colo.to SMTP ready, Who are you gonna pretend to be today?
VRFY postmaster
500 Bloody Amateur! Proper forging of mail requires recognizable SMTP commands!

--------------------

Viewing the web page for the Tongan Consulate in the US
(http://sfconsulate.gov.to) reveals nothing but an ad for a software
company, this page ends with:

   Need a domain name? Contact the Kingdom of Tonga Internet domain name
                                 registry.

--------------------

Consequently, I assert there is no reason for this domain to exist and
it should be removed from the root name servers.


--
        -Barry Shein

Software Tool & Die    | bzs at world.std.com          | http://www.world.com
Purveyors to the Trade | Voice: 617-739-0202        | Login: 617-739-WRLD
The World              | Public Access Internet     | Since 1989     *oo*

--- end forwarded text


-----------------
Robert A. Hettinga 
Philodox Financial Technology Evangelism 
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'





From petro at playboy.com  Wed Sep 30 01:21:07 1998
From: petro at playboy.com (Petro)
Date: Wed, 30 Sep 1998 16:21:07 +0800
Subject: Announcement: A Self-Study Course in Block CipherCryptanalysis
In-Reply-To: <199809301907.OAA15179@mixer.visi.com>
Message-ID: 



At 2:02 PM -0500 9/30/98, Bruce Schneier wrote:
>Ever since writing Applied Cryptography, I have been asked to recommend a
>book on cryptanalysis.  My unfortunate answer is that while there are
>several good books on cryptography, there are no books, good or bad, on
>cryptanalysis.
...

>To help in getting this experience, I designed a self-study course in
>block-cipher cryptanalysis.  With it, a student can follow an ordered path
>through the academic literature and emerge out the other side fully capable
>of breaking new algorithms and publishing new cryptanalytic results.

...

>The paper is available in both postscript and pdf formats at:
>
>	http://www.counterpane.com/self-study.html
>
>Comments are always appreciated.

	Thanks.
--
petro at playboy.com----for work related issues. I don't speak for Playboy.
petro at bounty.org-----for everthing else.      They wouldn't like that.
                                              They REALLY
Economic speech IS political speech.          wouldn't like that.





From vznuri at netcom.com  Wed Sep 30 01:38:38 1998
From: vznuri at netcom.com (Vladimir Z. Nuri)
Date: Wed, 30 Sep 1998 16:38:38 +0800
Subject: IP: Innovative Approach to Biometric ID Authentication
Message-ID: <199809302133.OAA25759@netcom13.netcom.com>




From: believer at telepath.com
Subject: IP: Innovative Approach to Biometric ID Authentication
Date: Wed, 30 Sep 1998 11:16:35 -0500
To: believer at telepath.com

Source:  PR Newswire
http://www.prnewswire.com/

DEL-ID... AN UNUSUAL AND INNOVATIVE APPROACH TO ID AUTHENTICATION 

    MONTREAL, Sept. 28 /CNW-PRN/ - The market for ID authentication
products that use biometric technologies is experiencing strong growth. The
dominant technology at the moment uses finger prints (or, to be exact,
finger print details, such as bifurcations or ridge endings). The reason is
simple.  It has long been accepted that finger prints are unique to each
individual; this assumption is backed by probability analyses confirming
that the theoretical probability of finding similar finger-print detail
configurations in two different individuals is about 10(-20) (that is,
about one chance in a billion billion).  In practice, however, measuring
errors can occur when processing finger-print images, increasing the
probability of error to about one in a
thousand for top-quality commercial systems.

    There are weaknesses in the existing approach, however. For example,
privacy cannot be guaranteed when a digital finger print is used for ID
authentication and large pieces of equipment are required.  For these
reasons, other options must be considered. The del-ID solution proposed by
delSecur is an original and attractive approach. 

    The delSecur system processes finger-print image data analogically, not
digitally, creating an abstract image of the characteristics of the human
finger.  The video signal from the reader that captures the finger image is
analogically processed.  To register with the del-ID authentication system,
you place your finger over the reader (without touching it, so you don't
leave finger prints on it) and an abstract image of your finger print is
stored. This becomes your personal electronic signature.  When someone
claiming to be you places his finger over the reader, a new abstract image
is generated and authenticated by comparison with the stored image; a
comparison matrix developed by delSecur is used to determine the similarity
of the two images. The matrix, patented by delSecur, comes from the field
of photography and may be combined with other metric matrices developed by
CRIM or borrowed from other existing technologies.

    The delSecur concept is original. It is different from conventional
approaches and its architecture is unusually simple.  What distinguishes
the delSecur concept is the representation of the finger image and the
technology that allows this representation to be used for authentication.
delSecur uses a patented process to create an abstract image that contains
data unique to an individual. delSecur not only built a device to
demonstrate the potential of the concept but also developed a preliminary
architecture for the registration and authentication prototype, making it
possible to analyze the concept--the maximum rotation angle for feasibility
and authentication, for example. 

    Given the encouraging results of the scientific evaluation of the basic
concept of the del-ID system, delSecur, in partnership with CRIM and other
firms, is planning to begin a case study and pilot projects with large
Canadian and international firms to clarify and test technical details.
The ultimate goal is implementation of a wide variety of applications on a
very large scale.

    The del-ID system is marketed by delSecur, a Canadian company wholly
owned by Grandeur Inc., a firm listed on the New York stock exchange. 
    NASDAQ: GDER

�1998 PR Newswire. 
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo at majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email at address
**********************************************
www.telepath.com/believer
**********************************************





From vznuri at netcom.com  Wed Sep 30 01:38:42 1998
From: vznuri at netcom.com (Vladimir Z. Nuri)
Date: Wed, 30 Sep 1998 16:38:42 +0800
Subject: IP: Army goes offline in reaction to Pentagon order
Message-ID: <199809302133.OAA25709@netcom13.netcom.com>




From: believer at telepath.com
Subject: IP: Army goes offline in reaction to Pentagon order
Date: Wed, 30 Sep 1998 10:24:30 -0500
To: believer at telepath.com

Source:  Federal Computer Week
http://www.fcw.com/pubs/fcw/1998/0928/web-army-9-28-98.html

----------
SEPTEMBER 28, 1998 . . . 11:50 EDT 
----------

Army goes offline in reaction to Pentagon order

BY BOB BREWIN (antenna at fcw.com)

The Army slammed shut its door to the wired world last week, closing down
all its World Wide Web sites in reaction to a new Pentagon Web security
policy.

Only the Army had such a drastic response to a Defense Department memo
issued last week that spelled out what information DOD Web sites should and
should not post. The Air Force, the Navy and the Marine Corps still offer
the public access to popular and highly visible Web pages.

The Army's move is in reaction to Deputy Secretary of Defense John Hamre's
policy memo released Sept. 17, which directed all military organizations
that maintain Web sites to review and then remove sensitive information
that could aid potential enemies of the United States. Hamre said some Web
sites in the past have provided "too much detail on DOD capabilities,
infrastructure and operational capabilities.'' Hamre said this new policy
will help DOD to "strike a balance between openness and sound security.''

The Army, according to an internal message furnished to FCW, responded by
directing all commanders to ensure that "all of their publicly accessible
Web sites are immediately disconnected from the Internet.''

Lt. Gen. William Campbell, the Army's director of information systems for
command, control, communications and computers, sent the message at 5 p.m.
Friday. He added that the shutdown could be accomplished by physically
disconnecting Web servers from the public network, moving all Web site
files from public to nonpublic servers or instituting control mechanisms
that prohibit public access.

The internal Army message also suggested that commands deal with frustrated
users trying to access Army Web sites by posting a new "cover page'' (in
use on many Army Web pages, including the main site at www.army.mil) that
reads: "This Army Web site is not currently available. This Web site will
be available again after maintenance is completed.''

The Web shutdown caught the public affairs staff at the Department of the
Army's headquarters in the Pentagon by surprise. An Army spokesman was
unable to offer any explanation for the move or any indication of when the
sites would be operating again.
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo at majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email at address
**********************************************
www.telepath.com/believer
**********************************************





From vznuri at netcom.com  Wed Sep 30 01:38:43 1998
From: vznuri at netcom.com (Vladimir Z. Nuri)
Date: Wed, 30 Sep 1998 16:38:43 +0800
Subject: IP: Secret Courts Approve More Wiretapping
Message-ID: <199809302133.OAA25720@netcom13.netcom.com>




From: believer at telepath.com
Subject: IP: Secret Courts Approve More Wiretapping
Date: Wed, 30 Sep 1998 10:50:51 -0500
To: believer at telepath.com

Source:  Excerpted from:
----------------------------------

From: "John C. Goodman- National Center for Policy Analysis" 

National Center for Policy Analysis
DAILY POLICY DIGEST
Wednesday, September 30, 1998



SECRET COURTS APPROVE MORE WIRETAPPING

Judges in secret federal courts are authorizing unprecedented 
numbers of wiretaps and clandestine searches, according to U.S. 
Department of Justice records.  The courts were authorized by the 
1978 Foreign Intelligence Surveillance Act (FISA).

   o   During the last three years, an annual average of 760 
       wiretaps and searches were carried out -- a 38 percent 
       increase from the 550 a year average for 1990 to 1994.

   o   Since 1995, FISA courts also have authorized searches of 
       the homes, cars, computers and other property of suspected 
       spies.

   o   In all, the courts have approved 11,950 applications and 
       turned down one request.

Proponents argue the surveillance reflects a stepped-up federal 
response to increased terrorist activity on American soil.  But 
opponents contend that the process endangers the very liberties 
it seeks to protect.  "There's a growing addiction to the use of 
secret courts as an alternative to more conventional 
investigative means," points out Jonathan Turley, a law professor 
at George Washington University.

The law requires the Justice Department -- and usually the FBI or 
the National Security Agency -- to show the judge that the target 
is a foreign government or agent engaging in "clandestine 
intelligence gathering activities" or terrorism.

Source: Richard Willing, "With Secret Courts' OK, Wiretapping on 
the Rise," and "Secrecy Might Be Weak Link in Taps of Suspected 
Spies," both USA Today, September 30, 1998. 

For more on Terrorism http://www.ncpa.org/pi/congress/cong9.html

****************************************************************************
                    NATIONAL CENTER FOR POLICY ANALYSIS
                               DALLAS, TEXAS

                      "Making Ideas Change the World"

                             Internet Address:
                            http://www.ncpa.org
****************************************************************************


-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo at majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email at address
**********************************************
www.telepath.com/believer
**********************************************





From vznuri at netcom.com  Wed Sep 30 01:38:58 1998
From: vznuri at netcom.com (Vladimir Z. Nuri)
Date: Wed, 30 Sep 1998 16:38:58 +0800
Subject: IP: Chinese Govt Bans Controversial Clinton Book
Message-ID: <199809302133.OAA25687@netcom13.netcom.com>




From: believer at telepath.com
Subject: IP: Chinese Govt Bans Controversial Clinton Book
Date: Wed, 30 Sep 1998 09:16:35 -0500
To: believer at telepath.com

Source:  US Newswire
http://www.usnewswire.com/topnews/Current_Releases/0929-126.txt

PRIMA: Chinese Government Bans Controversial Clinton Book
U.S. Newswire
29 Sep 15:06

 PRIMA Publishing: Chinese Government Bans Controversial Clinton
Book
 To: National Desk
 Contact: Diana Banister of Craig Shirley & Associates,
          800-536-5920, pager: 703-816-9368

   WASHINGTON, Sept. 29 /U.S. Newswire/ -- The following was released
today by Prima Publishing:

   Chinese authorities have refused to allow three publishing
houses to translate a new book -- "The Clinton Syndrome, The
President and the Self-Destructive Nature of Sexual Addiction" by
California-based Prima Publishing. The book takes a clinical look
at the life and behavior of Bill Clinton and explains why the
president would risk his presidency for a sexual relationship with
an intern.

   "We have been told that the Chinese government does not want to
make a book of this kind available in China because they consider
it unfavorable to President Clinton," says Robin Taylor, rights
associate at Prima Publishing. "The Chinese authorities apparently
don't understand why Americans treat their president just like any
other person and allow citizens to write about their government
leaders."

   In "The Clinton Syndrome," Jerome D. Levin, Ph.D., a
psychotherapist, addictions specialist and professor, assesses the
character of a man so driven by a sexual addiction that he would
risk his presidency to fulfill a desperate need for reassurance and
validation of his worth.

   Prima does not consider the Clinton Syndrome an "anti-Clinton"
book. In fact, Dr. Levin voted for President Clinton twice and
agrees with his policies. But he still believes the president is in
serious need of help for a classic case of sexual addiction.

   "We work with foreign publishers around the world on numerous
books," says Taylor. "Never have we had the subject matter of
a book impede its publication in a foreign country. But I guess
it's understandable when you consider the relationship between the
Clinton administration and the current Chinese government."

   "The Clinton Syndrome," published by Prima Publishing of
Rocklin, Calif., is available in bookstores nationwide. For more
information or to schedule an interview with Dr. Jerome D. Levin or
a Prima spokesman, please call Ciana Banister at 800-536-5920.

 -0-
 /U.S. Newswire  202-347-2770/
 09/29 15:06

Copyright 1998, U.S. Newswire
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo at majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email at address
**********************************************
www.telepath.com/believer
**********************************************





From vznuri at netcom.com  Wed Sep 30 01:39:16 1998
From: vznuri at netcom.com (Vladimir Z. Nuri)
Date: Wed, 30 Sep 1998 16:39:16 +0800
Subject: IP: Courts OK record number of wiretaps
Message-ID: <199809302133.OAA25743@netcom13.netcom.com>




From: believer at telepath.com
Subject: IP: Courts OK record number of wiretaps
Date: Wed, 30 Sep 1998 10:55:30 -0500
To: believer at telepath.com

Source:  USA Today
http://www.usatoday.com/news/washdc/ncs2.htm

09/30/98- Updated 12:06 AM ET
 The Nation's Homepage

Courts OK record number of wiretaps

 WASHINGTON - Federal judges operating in secret courts are
 authorizing unprecedented numbers of wiretaps and clandestine
 searches aimed at spies and terrorists operating in the USA, Justice
 Department records show. 

 During the last three years, an average of 760 wiretaps and searches a
 year were carried out, a 38% increase from the 550 a year from 1990
 to 1994. 

 Federal judges have authorized a yearly average of 463 ordinary
 wiretaps since 1990 in drug, organized crime and other criminal cases. 

 Part of the growth in surveillance is attributed to an increase in
 espionage and terrorist activities in the USA. 

 "There's a greater quantity of the folks who are potentially problematic
 out there," says Jamie Gorelick, who as deputy attorney general from
 1994 to 1997 helped review wiretap applications. 

 Proponents say the surveillance reflects a stepped-up federal response
 to increased terrorist activity on American soil. 

 Opponents argue that the process endangers the very liberties it seeks
 to protect. 

 "This issue is where the rubber hits the road," says William Webster,
 who headed the FBI in 1978 when the law allowing the secret wiretaps
 was passed. "It's where we try to balance the concept of our liberty
 against what has to be done to protect it." 

 The wiretaps, which are applied for by the Justice Department under
 the Foreign Intelligence Surveillance Act (FISA) and carried out by the
 FBI and National Security Agency, have received their greatest use yet
 under President Clinton and Attorney General Janet Reno. 

 Since 1995, FISA courts also have authorized searches of the homes,
 cars, computers and other property of suspected spies. In its two
 decades, FISA courts have approved 11,950 applications and turned
 down one request. 

 Generally, defense lawyers can challenge the basis for authorizing a
 wiretap. But supporting information for wiretaps authorized by the
 FISA court are sealed for national security reasons. 

 "It legitimizes what would appear to be contrary to constitutional
 protections," says Steven Aftergood, privacy specialist at the
 Federation of American Scientists. "It's a challenge to the foundation of
 American liberties." 

 Opponents also say the government is using the wiretaps to replace
 conventional criminal searches which must meet a higher legal standard.

 "There's a growing addiction to the use of the secret court as an
 alternative to more conventional investigative means," says Jonathan
 Turley, law professor at George Washington University in Washington,
 D.C. 

 The wiretaps are meant to develop intelligence, not to help make
 criminal cases. But the wiretap information was used to secure guilty
 pleas from CIA turncoats Aldrich Ames in 1994 and Harold Nicolson
 in 1997. 

 By Richard Willing, USA TODAY

�COPYRIGHT 1998 USA TODAY, a division of Gannett Co. Inc.
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo at majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email at address
**********************************************
www.telepath.com/believer
**********************************************





From vznuri at netcom.com  Wed Sep 30 01:39:18 1998
From: vznuri at netcom.com (Vladimir Z. Nuri)
Date: Wed, 30 Sep 1998 16:39:18 +0800
Subject: IP: Big Brother Is Monitoring Us by Databases - Sept. PSR - Part 1
Message-ID: <199809302133.OAA25653@netcom13.netcom.com>




From: ignition-point at majordomo.pobox.com
Subject: IP: Big Brother Is Monitoring Us by Databases - Sept. PSR - Part 1
Date: Tue, 29 Sep 1998 17:28:57 -0500
To: PSR at eagleforum.org

	PHYLLIS SCHLAFLY REPORT   
						September 1998

          Big Brother Is Monitoring Us by Databases 
   
 The hottest issue in America today is our discovery that the Federal
 Government is trying to tag, track and monitor our health care
 records through national databases and personal identification
 numbers. This is a priority election issue, and every Congressional
 and Senatorial candidate should be ready to answer questions from
 his constituents. 

 Americans are accustomed to enjoying the freedom to go about our
 daily lives without telling government what we are doing. The idea of
 having Big Brother monitor our life and activities, as forecast in
 George Orwell's great book 1984, is not acceptable in America. 

 Unfortunately, the liberals, who always seek control over how we live
 our lives and how we spend our money, are using terrorists,
 criminals, illegal aliens, welfare cheats, and deadbeat dads as
 excuses to impose oppressive government surveillance over our
 private lives. It is typical of the liberals to go after law-abiding citizens
 rather than just the law-violators. 

 Modern technology has made it possible to build a file on every
 American, and to record and track our comings and goings.
 Computers can now collect and store immense databases, with
 detailed records about individual Americans' health status and
 treatment, job status and applications, automobiles and driving,
 financial transactions, credit, banking, school and college
 performance, and travels within and without the country. 

 In the novel 1984, an omnipresent Big Brother watched every citizen
 at home and work from a giant television screen. Databases can now
 accomplish the same surveillance and tracking much more
 efficiently. In the novel 1984, Big Brother was able to read the
 individual's secret diary hidden in his home. The Clinton
 Administration and the FBI are right now demanding the right to read
 our e-mail and computer files, listen in on our phone conversations,
 and track the whereabouts of our cell phone calls. 

 Some of these databases are under the direct control of the
 government (e.g., Internal Revenue, Social Security, and the
 Department of Education, which has amassed 15 national
 databases), and some are privately owned but give access to the
 government. These databases convey enormous power to whoever
 controls them. In government hands, they are the power to control
 our very life, our health care, our access to a job, our financial
 transactions, and our entry to school and college. In private hands,
 these databases are immensely profitable to the companies that own
 them and market them for commercial purposes. 

 The Clinton Administration, Congress, big corporations that funnel
 million of dollars of soft money into political coffers, and some
 powerful foundations have cooperated in seeking federal legislation to
 establish a property right in these databases. So much power and
 money are involved in accessing and controlling personal information
 that the Washington lobbyists are moving rapidly to lock in the
 extraordinary powers Congress has already conferred on those who
 build databases and to build a wall of federal protection around them. 

 If we want to preserve American freedom, it's time to stop government
 access to these databases. Let's look at some of the ways that
 Clinton and Congress have cooperated in the building of databases
 that tag, track and monitor our daily lives. 

    1.The 1996 Kennedy-Kassebaum law (the Health Insurance
      Portability and Accountability Act) gives the Department of
      Health and Human Services (HHS) the power to create
      "unique health care identifiers" so that government can
      electronically tag, track and monitor every citizen's personal
      medical records. The plan is that everyone must submit an
      identification document with a unique number in order to
      receive health care, or the provider will not be paid. A
      database containing every American's medical records,
      identified by a unique number, was a central feature of
      Clinton's defeated 1994 health care bill, but it reemerged in the
      Kennedy-Kassebaum bill. Bill Clinton, Ted Kennedy, and Bob
      Dole all bragged about passing this law. 

    2.H.R. 4250, the 1998 Patient Protection Act, passed by the
      House on July 24, 1998, will allow anyone who maintains
      personal medical records to gather, exchange and distribute
      them. The only condition on distribution is that the information
      be used for "health care operations," which is vague and
      meaningless. 

      Even worse, H.R. 4250 preempts state laws that currently
      protect patients from unauthorized distribution of their medical
      records. There are several exemptions to the gathering of
      information that reveal the liberal bias of the drafters of this bill:
      The bill exempts from the gathering of medical records any
      information about abortions performed on minors. That
      provision is a sure sign of the kind of control of health care
      that this bill opens up. 

    3.The Collections of Information Antipiracy Act (which
      originally had another number) was added (just before House
      passage) to H.R. 2281, the 1998 WIPO Copyright Treaties
      Implementation Act and the Internet Copyright Infringement
      Liability Clarification Act. No one, of course, is in favor of
      "piracy," but this bill goes far beyond any reasonable definition
      of piracy. 

      This Collections of Information bill, in effect, creates a new
      federal property right to own, manage and control personal
      information about you, including your name, address,
      telephone number, medical records, and "any other intangible
      material capable of being collected and organized in a
      systematic way." This bill provides a powerful incentive for
      corporations to build nationwide databases of the personal
      medical information envisioned by the Kennedy-Kassebaum
      law and the Patient Protection bill. This bill will encourage
      health care corporations to assign a unique national health
      identifier to each patient. The government can then simply
      agree to use a privately-assigned national identifier, and
      Clinton's longtime goal of government control of health care
      will be achieved. 

      Under the Collections of Information bill, any information about
      you can be owned and controlled by others under protection of
      Federal law. Your medical chart detailing your visits to your
      doctor, for example, would suddenly become the federally
      protected property of other persons or corporations, and their
      rights would be protected by Federal police power. This bill
      creates a new Federal crime that penalizes a first offense by a
      fine of up to $250,000 or imprisonment for up to five years, or
      both, for interfering with this new property right. It even
      authorizes Federal judges to order seizure of property before a
      finding of wrongdoing. 

      H.R. 2281 grants these new Federal rights only to private
      databases, and pretends to exclude the government's own
      efforts to collect information about citizens. But a loophole in
      the bill permits private firms to share their federally protected
      data with the government so long as the information is not
      collected under a specific government agency or license
      agreement. This loophole will encourage corporations,
      foundations, Washington insiders and political donors to build
      massive databases of citizens' medical and other personal
      records, and then share that data with the government. 

    4.The 1993 Comprehensive Child Immunization Act
      authorized the Department of Health and Human Services "to
      establish state registry systems to monitor the immunization
      status of all children." HHS and the Robert Wood Johnson
      Foundation have since sent hundreds of millions of dollars to
      states to set up these databases (often without parental
      knowledge or consent). 

      The Centers for Disease Control (CDC) is aggressively trying
      to convert these state databases into a national database of
      all children's medical records. The CDC is using the tracking
      of immunizations as a ruse to build a national patient
      information system. The government is already demanding
      that all newborns and all children who enter school be given
      the controversial Hepatitis B vaccine. This is just the start of
      government control of our health care made possible by
      databases of medical records. 

    5.The 1996 Illegal Immigration Reform and Immigrant
      Responsibility Act (especially Section 656(b)) prohibits the
      use of state driver's licenses after Oct. 1, 2000 unless they
      contain Social Security numbers as the unique numeric
      identifier "that can be read visually or by electronic means."
      The act requires all driver's licenses to conform to regulations
      promulgated by the Secretary of Transportation, and it is
      clearly an attempt to convert driver's licenses into national I.D.
      Cards. This law also orders the Transportation Department to
      engage in "consultation" with the American Association of
      Motor Vehicle Administrators, which has long urged using
      driver's licenses, with Social Security numbers and digital
      fingerprinting, as a de facto national ID card that would enable
      the government to track everyone's movements throughout
      North America. 

      When Social Security was started, the government made a
      contract with the American people that the Social Security
      number would never be used for identification. Call this another
      broken promise. 

      Meanwhile, many states are already trying to legislate driver's
      licenses that are actually a "smart card" with a magnetic strip
      that contains a digitized fingerprint, retina scan, DNA print,
      voice print, or other biometric identifiers. These smart cards
      will leave an electronic trail every time you use it. New
      Jersey's proposed smart card would even track your payment
      of bridge and highway tolls and loans of books from the library,
      as well as credit card purchases and visits to your doctor. 

    6.The 1996 Welfare Reform Act (the Personal Responsibility
      and Work Opportunity Reform Act) sets up the Directory of
      New Hires. All employers are now required to send the
      government the name, address and Social Security number of
      every new worker and every employee who is promoted. This
      will eventually be a massive database, tracking nearly every
      worker in America. 

    7.Public-private partnerships. An example of how databases
      and copyrights, in partnerships with the government, can be
      used for private gain and control over millions of people is the
      way the American Medical Association (AMA) worked out an
      exclusive contract with the Health Care Financing
      Administration (HCFA), a division of the Department of Health
      and Human Services (HHS). The AMA developed and
      copyrighted a database of 6,000 medical procedures and
      treatments to use as a billing system. The AMA then
      contracted with HCFA to force the entire health care industry
      (including all doctors) to buy and use the AMA's system. 

 A federal Court of Appeals reviewed this peculiar AMA/HCFA
 arrangement and, in August 1997, held that the AMA had "misused
 its copyright by licensing the [payment coding system] to HCFA in
 exchange for HCFA's agreement not to use a competing coding
 system." The court stated, "The plain language of the AMA's
 licensing agreement requires HCFA to use the AMA's copyrighted
 coding system and prohibits HCFA from using any other." 

 This exclusive government-granted monopoly is worth tens of millions
 of dollars annually to the AMA, and it ensures the AMA's support of
 any Clinton health care proposal, no matter how socialistic. This type
 of public-private partnership, often concealed from public scrutiny, is
 becoming the preferred technique to advance the liberal agenda. 

 The American people do not want their private life and activities
 monitored by Big Brother. Tell your Congressman and Senator to
 repeal all these provisions which protect the building of databases
 that track our daily activities. 

	------------------------------------

To read the entire September 98 PSR go to:
http://www.eagleforum.org/psr/1998/sept98/psrsept98.html

	------------------------------------

The "Dirty Dozen" . . .   Here are the 12
Republicans who voted to uphold Clinton's veto of
the partial-birth abortion ban.
http://www.eagleforum.org/alert/98-09-22/dirty_dozen.html

	------------------------------------

	JOIN EAGLE FORUM!
To receive the Phyllis Schlafly Report  HARDCOPY 
	-- Subscription: $20 per year 

Send check or money order to: 
Eagle Forum * P.O. Box 618 * Alton * IL 62002 

-------------------------------------------------------------------
http://www.eagleforum.org
eagle at eagleforum.org
Phone: 618-462-5415  Fax: 618-462-8909
---------------------------------------------------------------
To subscribe to Eagle E-mail 
please e-mail  eagle at eagleforum.org 
with SUBSCRIBE in the subject line
-----------------------------------------------------









**********************************************
To subscribe or unsubscribe, email:
     majordomo at majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email at address
**********************************************
www.telepath.com/believer
**********************************************





From vznuri at netcom.com  Wed Sep 30 01:39:51 1998
From: vznuri at netcom.com (Vladimir Z. Nuri)
Date: Wed, 30 Sep 1998 16:39:51 +0800
Subject: IP: Navy investigating GSU computer hacker
Message-ID: <199809302133.OAA25787@netcom13.netcom.com>




From: believer at telepath.com
Subject: IP: Navy investigating GSU computer hacker
Date: Wed, 30 Sep 1998 12:42:56 -0500
To: believer at telepath.com

Source:  Savannah Morning News
http://www.savannahmorningnews.com/smn/stories/093098/LOCgsuhacker.html

U.S. Navy investigating GSU computer hacker 

University computer was used to break into a government
computer.

By Jenel Williams Few
Savannah Morning News

Someone used a Georgia Southern University writing and linguistics
department classroom computer to break into government files and the
U.S. Navy wants to know why.

The Naval Criminal Investigation Office is looking into a computer
hacking case at Georgia Southern University, according to Bryan
Stamper, special agent in charge at the Jacksonville, Fla., office.

John Glacier, assistant director for technical support at Georgia
Southern, said the school was recently asked to find out which of its
computers was used to access computer files from a government
agency.

"We believe it was from our model classroom during a scheduled
classtime," Glacier said.

He tracked the school's computer records and discovered that someone
used a computer in the writing and linguistics department's model
classroom to hack into a government computer while a class was in
session.

"They ran a file transfer protocol program, which allows you to
download files and gain access to someone else's computer," Glacier
said.

Details about the Navy's investigation will be made available at a later
date.

Computer hacking can carry serious federal penalties, according to
Federal Bureau of Investigations Special Agent William Kirkconnell. An
innocent infiltration may not merit any punishment, but using a computer
to steal classified government information could be considered
espionage, he said.

"It depends on what agency was affected, whether it was done
maliciously and whether the information was used for criminal
purposes," he said.

Glacier said he does not know who used the campus computer to break
into government files or how much information was accessed.

"They wouldn't say if files were downloaded or uploaded," Glacier said,
referring to bringing information into the GSU computer or taking
information from the GSU computer and sending it to another one.
"They haven't questioned any students."

Although he doesn't know the culprit's motivation, Glacier said these
types of incidents often occur among bright, curious students.

"College-age students want to apply the knowledge they have gained
about computers," he said. "What they've learned in high school and
college intuitively generates curiosity and they want a challenge."

Last year, in a similar incident, Glacier said a hacker tried to hide some
computer mischief by calling a Georgia Southern computer and linking
up to computers from the Philippines to the Midwest before breaking
into government files.

"It alarms me that we would be used that way, but it occurs around the
world and it's not too hard to use computers this way," Glacier said.

Higher education reporter Jenel Williams Few can be reached at
652-0325.

Web posted Wednesday, September 30, 1998
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo at majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email at address
**********************************************
www.telepath.com/believer
**********************************************





From vznuri at netcom.com  Wed Sep 30 01:40:11 1998
From: vznuri at netcom.com (Vladimir Z. Nuri)
Date: Wed, 30 Sep 1998 16:40:11 +0800
Subject: IP: The Great Superterrorism Scare
Message-ID: <199809302133.OAA25675@netcom13.netcom.com>




From: believer at telepath.com
Subject: IP: The Great Superterrorism Scare
Date: Wed, 30 Sep 1998 09:03:50 -0500
To: believer at telepath.com

Forwarded:
----------------------
Subject: The Great Superterrorism Scare 
From: RoadsEnd at AOL.COM - Sept. 29, 1998 (Thanks for all your research)
      http://www.geocities.com/CapitolHill/2807/

The Great Superterrorism Scare
http://www.jya.com/superterror.htm

28 September 1998 - Source: Foreign Policy, Fall, 1998, pp. 110-124. 
Thanks to the author and Foreign Policy. http://www.foreignpolicy.com
---------------------------------------------------------------------------
The Great Superterrorism Scare - http://www.jya.com/superterror.htm

by Ehud Sprinzak

     EHUD SPRINZAK is professor of political science at Hebrew
     University of Jerusalem. This article was written under the
     auspices of the United States Institute of Peace where he spent
     the last year as a senior scholar with the Jennings Randolph
     program.

Last March, representatives from more than a dozen U.S. federal agencies
gathered at the White House for a secret simulation to test their readiness
to confront a new kind of terrorism. Details of the scenario unfolded a
month later on the front page of the New York Times: Without warning,
thousands across the American Southwest fall deathly ill. Hospitals
struggle to rush trained and immunized medical personnel into crisis areas.
Panic spreads as vaccines and antibiotics run short--and then run out. The
killer is a hybrid of smallpox and the deadly Marburg virus, genetically
engineered and let loose by terrorists to infect hundreds of thousands
along the Mexican-American border.

This apocalyptic tale represents Washington's newest nightmare: the threat
of a massive terrorist attack with chemical, biological, or nuclear
weapons. Three recent events seem to have convinced the policymaking elite
and the general public that a disaster is imminent: the 1995 nerve gas
attack on a crowded Tokyo subway station by the Japanese millenarian cult
Aum Shinrikyo; the disclosure of alarming new information about the former
Soviet Union's massive biowarfare program; and disturbing discoveries about
the extent of Iraqi president Saddam Hussein's hidden chemical and
biological arsenals. Defense Secretary William Cohen summed up well the
prevailing mood surrounding mass-destruction terrorism: "The question is no
longer if this will happen, but when."

Such dire forecasts may make for gripping press briefings, movies, and
bestsellers, but they do not necessarily make for good policy. As an
unprecedented fear of mass-destruction terrorism spreads throughout the
American security establishment, governments worldwide are devoting more
attention to the threat. But as horrifying as this prospect may be, the
relatively low risks of such an event do not justify the high costs now
being contemplated to defend against it. Not only are many of the
countermeasures likely to be ineffective, but the level of rhetoric and
funding devoted to fighting superterrorism may actually advance a potential
superterrorist's broader goals: sapping the resources of the state and
creating a climate of panic and fear that can amplify the impact of any
terrorist act.

CAPABILITIES AND CHAOS

Since the Clinton administration issued its Presidential Decision Directive
on terrorism in June 1995, U.S. federal, state, and local governments have
heightened their efforts to prevent or respond to a terrorist attack
involving weapons of mass destruction. A report issued in December 1997 by
the National Defense Panel, a commission of experts created by
congressional mandate, calls upon the army to shift its priorities and
prepare to confront dire domestic threats. The National Guard and the U.S.
Army Reserve must be ready, for example, to "train local authorities in
chemical- and biological-weapons detection, defense, and decontamination;
assist in casualty treatment and evacuation; quarantine, if necessary,
affected areas and people; and assist in restoration of infrastructure and
services." In May, the Department of Defense announced plans to train
National Guard and reserve elements in every region of the country to carry
out these directives.

In his 1998 State of the Union address, President Bill Clinton promised to
address the dangers of biological weapons obtained by "outlaw states,
terrorists, and organized criminals." Indeed, the president's budget for
1999, pending congressional approval, devotes hundreds of millions of
dollars to superterrorism response and recovery programs, including large
decontamination units, stockpiles of vaccines and antibiotics, improved
means of detecting chemical and biological agents and analyzing disease
outbreaks, and training for special intervention forces. The FBI, Pentagon,
State Department, and U.S. Health and Human Services Department will
benefit from these funds, as will a plethora of new interagency bodies
established to coordinate these efforts. Local governments are also joining
in the campaign. Last April, New York City officials began monitoring
emergency room care in search of illness patterns that might indicate a
biological or chemical attack had occurred. The city also brokered deals
with drug companies and hospitals to ensure an adequate supply of medicine
in the event of such an attack. Atlanta, Denver, Los Angeles, San
Francisco, and Washington are developing similar programs with state and
local funds. If the proliferation of counterterrorism programs continues at
its present pace, and if the U.S. army is indeed redeployed to the home
front, as suggested by the National Defense Panel, the bill for these
preparations could add up to tens of billions of dollars in the coming
decades.

Why have terrorism specialists and top government officials become so
obsessed with the prospect that terrorists, foreign or homegrown, will soon
attempt to bring about an unprecedented disaster in the United States? A
close examination of their rhetoric reveals two underlying assumptions:

The Capabilities Proposition. According to this logic, anyone with access
to modem biochemical technology and a college science education could
produce enough chemical or biological agents in his or her basement to
devastate the population of London, Tokyo, or Washington. The raw materials
are readily available from medical suppliers, germ banks, university labs,
chemical-fertilizer stores, and even ordinary pharmacies. Most policy today
proceeds from this assumption.

The Chaos Proposition. The post-Cold War world swarms with shadowy
extremist groups, religious fanatics, and assorted crazies eager to launch
a major attack on the civilized world--preferably on U.S. territory. Walter
Laqueur, terrorism's leading historian, recently wrote that "scanning the
contemporary scene, one encounters a bewildering multiplicity of terrorist
and potentially terrorist groups and sects." Senator Richard Lugar agrees:
"fanatics, small disaffected groups and subnational factions who hold
various grievances against governments, or against society, all have
increasing access to, and knowledge about the construction of, weapons of
mass destruction.... Such individuals are not likely to he deterred . . .
by the classical threat of overwhelming retaliation."

There is, however, a problem with this two-part logic. Although the
capabilities proposition is largely valid--albeit for the limited number of
terrorists who can overcome production and handling risks and develop an
efficient means of dispersal--the chaos proposition is utterly false.
Despite the lurid rhetoric, a massive terrorist attack with nuclear,
chemical, or biological weapons is hardly inevitable. It is not even
likely. Thirty years of field research have taught observers of terrorism a
most important lesson: Terrorists wish to convince us that they are capable
of striking from anywhere at anytime, but there really is no chaos. In
fact, terrorism involves predictable behavior, and the vast majority of
terrorist organizations can be identified well in advance.

Most terrorists possess political objectives, whether Basque independence,
Kashmiri separatism, or Palestinian Marxism. Neither crazy nor stupid, they
strive to gain sympathy from a large audience and wish to live after
carrying out any terrorist act to benefit from it politically. As terrorism
expert Brian Jenkins has remarked, terrorists want lots of people watching,
not lots of people dead. Furthermore, no terrorist becomes a terrorist
overnight. A lengthy trajectory of radicalization and low-level violence
precedes the killing of civilians. A terrorist becomes mentally ready to
use lethal weapons against civilians only over time and only after he or
she has managed to dehumanize the enemy. From the Baader-Meinhoff group in
Germany and the Tamil Tigers in Sri Lanka to Hamas and Hizballah in the
Middle East, these features are universal.

Finally, with rare exceptions--such as the Unabomber--terrorism is a group
phenomenon. Radical organizations are vulnerable to early detection through
their disseminated ideologies, lesser illegal activities, and public
statements of intent. Some even publish their own World Wide Web sites.
Since the 1960s, the vast majority of terrorist groups have made clear
their aggressive intentions long before following through with violence.

We can draw three broad conclusions from these findings. First, terrorists
who threaten to kill thousands of civilians are aware that their chances
for political and physical survival are exceedingly slim. Their prospects
for winning public sympathy are even slimmer. Second, terrorists take time
to become dangerous, particularly to harden themselves sufficiently to use
weapons of mass destruction. Third, the number of potential suspects is
significantly less than doomsayers would have us believe. Ample early
warning signs should make effective interdiction of potential
superterrorists easier than today's overheated rhetoric suggests.

THE WORLD'S MOST WANTED

Who, then, is most likely to attempt a superterrorist attack? Historical
evidence and today's best field research suggest three potential profiles:

   * Religious millenarian cults, such as Japan's Aum Shinrikyo, that
     possess a sense of immense persecution and messianic frenzy and hold
     faith in salvation via Armageddon. Most known religious cults do not
     belong here. Millenarian cults generally seclude themselves and wait
     for salvation; they do not strike out against others. Those groups
     that do take action more often fit the mold of California's Heaven's
     Gate, or France's Order of the Solar Temple, seeking salvation through
     group suicide rather than massive violence against outsiders.

   * Brutalized groups that either burn with revenge following a genocide
     against their nation or face the prospect of imminent destruction
     without any hope for collective recovery. The combination of
     unrestrained anger and total powerlessness may lead such groups to
     believe that their only option is to exact a horrendous price for
     their loss. "The Avengers," a group of 50 young Jews who fought the
     Nazis as partisans during World War II, exemplifies the case.
     Organized in Poland in 1945, the small organization planned to poison
     the water supply of four German cities to avenge the Holocaust.
     Technical problems foiled their plan, but a small contingent still
     succeeded in poisoning the food of more than 2,000 former SS storm
     troopers held in prison near Nuremberg.

   * Small terrorist cells or socially deranged groups whose alienated
     members despise society, lack realistic political goals, and may
     miscalculate the consequences of developing and using chemical or
     biological agents. Although such groups, or even individual "loners,"
     cannot be totally dismissed, it is doubtful that they will possess the
     technical capabilities to produce mass destruction.

Groups such as Hamas, Hizballah, and Islamic Jihad, which so many Americans
love to revile--and fear--do not make the list of potential
superterrorists. These organizations and their state sponsors may loathe
the Great Satan, but they also wish to survive and prosper politically.
Their leaders, most of whom are smarter than the Western media implies,
understand that a Hiroshima-like disaster would effectively mean the end of
their movements.

Only two groups have come close to producing a superterrorism catastrophe:
Aum Shinrikyo and the white supremacist and millenarian American Covenant,
the Sword and the Arm of the Lord, whose chemical-weapons stockpile was
seized by the FBI in 1985 as they prepared to hasten the coming of the
Messiah by poisoning the water supplies of several U.S. cities. Only Aum
Shinrikyo fully developed both the capabilities and the intent to take tens
of thousands of lives. However, this case is significant not only because
the group epitomizes the kind of organizations that may resort to
superterrorism in the future, but also because Aum's fate illustrates how
groups of this nature can be identified and their efforts preempted.

Although it comes as no comfort to the 12 people who died in Aum
Shinrikyo's attack, the cult's act of notoriety represents first and
foremost a colossal Japanese security blunder. Until Japanese police
arrested its leaders in May 1995, Aum Shinrikyo had neither gone
underground nor concealed its intentions. Cult leader Shoko Asahara had
written since the mid-1980s of an impending cosmic cataclysm. By 1995, when
Russian authorities curtailed the cult's activities in that country, Aum
Shinrikyo had established a significant presence in the former Soviet
Union, accessed the vibrant Russian black market to obtain various
materials, and procured the formulae for chemical agents. In Japan, Asahara
methodically recruited chemical engineers, physicists, and biologists who
conducted extensive chemical and biological experiments in their lab and on
the Japanese public. Between 1990 and 1994, the cult tried six
times--unsuccessfully--to execute biological-weapons attacks, first with
botulism and then with anthrax. In June 1994, still a year before the
subway gas attack that brought them world recognition, two sect members
released sarin gas near the judicial building in the city of Matsumoto,
killing seven people and injuring 150, including three judges.

In the years preceding the Tokyo attack, at least one major news source
provided indications of Aum Shinrikyo's proclivity toward violence. In
October 1989, the Sunday Mainichi magazine began a seven-part series on the
cult that showed it regularly practiced a severe form of coercion on
members and recruits. Following the November 1989 disappearance of a
lawyer, along with his family, who was pursuing criminal action against the
cult on behalf of former members, the magazine published a follow-up
article. Because of Japan's hypersensitivity to religious freedom, lack of
chemical- and biological-terrorism precedents, and low-quality domestic
intelligence, the authorities failed to prevent the Tokyo attack despite
these ample warning signs.

ANATOMY OF AN OBSESSION

lf a close examination reveals that the chances of a successful
superterrorist attack are minimal, why are so many people so worried? There
are three major explanations:

Sloppy Thinking

Most people fail to distinguish among the four different types of
terrorism: mass-casualty terrorism, state-sponsored chemical- or
biological-weapons (CBW) terrorism, small-scale chemical or biological
terrorist attacks, and superterrorism. Pan Am 103, Oklahoma City, and the
World Trade Center are all examples of conventional terrorism designed to
kill a large number of civilians. The threat that a "rogue state," a
country hostile to the West, will provide terrorist groups with the funds
and expertise to launch a chemical or biological attack falls into another
category: state-sponsored CBW terrorism. The use of chemical or biological
weapons for a small-scale terrorist attack is a third distinct category.
Superterrorism--the strategic use of chemical or biological agents to bring
about a major disaster with death tolls ranging in the tens or hundreds of
thousands--must be distinguished from all of these as a separate threat.

Today's prophets of doom blur the lines between these four distinct
categories of terrorism. The world, according to their logic, is
increasingly saturated with weapons of mass destruction and with terrorists
seeking to use them, a volatile combination that will inevitably let the
superterrorism genie out of the bottle. Never mind that the only place
where these different types of terrorism are lumped together is on
television talk shows and in sensationalist headlines.

In truth, the four types of terrorism are causally unrelated. Neither
Saddam Hussein's hidden bombs nor Russia's massive stockpiles of pathogens
necessarily bring a superterrorist attack on the West any closer. Nor do
the mass-casualty crimes of Timothy McVeigh in Oklahoma City or the World
Trade Center bombing. The issue is not CBW quantities or capabilities but
rather group mentality and psychological motivations. In the final
analysis, only a rare, extremist mindset completely devoid of political and
moral considerations will consider launching such an attack.

Vested Interests

The threat of superterrorism is likely to make a few defense contractors
very rich and a larger number of specialists moderately rich as well as
famous. Last year, Canadian-based Dycor Industrial Research Ltd. unveiled
the CB Sentry, a commercially available monitoring system designed to
detect contaminants in the air, including poison gas. Dycor announced plans
to market the system for environmental and antiterrorist applications. As
founder and president Hank Mottl explained in a press conference, "Dycor is
sitting on the threshold of a multi-billion dollar world market." In
August, a New York Times story on the Clinton administration's plans to
stockpile vaccines around the country for civilian protection noted that
two members of a scientific advisory panel that endorsed the plan
potentially stood to gain financially from its implementation. William
Crowe, former chair of the joint chiefs of staff, is also bullish on the
counterterrorism market. He is on the board of an investment firm that
recently purchased Michigan Biologic Products Institute, the sole maker of
an anthrax vaccine. The lab has already secured a Pentagon contract and
expects buyers from around the world to follow suit. As for the expected
bonanza for terrorism specialists, consultant Larry Johnson remarked last
year to U.S. News & World Report, "It's the latest gravy train."

Within the U.S. government, National Security Council experts, newly
created army and police intervention forces, an assortment of energy and
public-health units and officials, and a significant number of new
Department of Defense agencies specializing in unconventional terrorism
will benefit from the counterterrorism obsession and megabudgets in the
years ahead. According to a September 1997 report by the General Accounting
office, more than 40 federal agencies have been involved already in
combating terrorism. It may yet be premature to announce the rise of a new
"military-scientific-industrial complex," but some promoters of the
superterrorism scare seem to present themselves as part of a coordinated
effort to save civilization from the greatest threat of the twenty-first
century.

Morbid Fascination

Suspense writers, publishers, television networks, and sensationalist
journalists have already cashed in on the superterrorism craze. Clinton
aides told the New York Times that the president was so alarmed by
journalist Richard Preston's depiction of a superterrorist attack in his
novel The Cobra Event that he passed the book to intelligence analysts and
House Speaker Newt Gingrich for review. But even as media outlets spin the
new frenzy out of personal and financial interests, they also respond to
the deep psychological needs of a huge audience. People love to be
horrified. In the end, however, the tax-paying public is likely to be the
biggest loser of the present scare campaign. All terrorists--even those who
would never consider a CBW attack--benefit from such heightened attention
and fear.

COUNTERTERRORISM ON A SHOESTRING

There is, in fact, a growing interest in chemical and biological weapons
among terrorist and insurgent organizations worldwide for small-scale,
tactical attacks. As far back as 1975, the Symbionese Liberation Army
obtained instructions on the development of germ warfare agents to enhance
their "guerrilla" actions. More recently, in 1995, four members of the
Minnesota Patriots Council, an antitax group that rejected all forms of
authority higher than the state level, were convicted of possession of a
biological agent for use as a weapon. Prosecutors contended that the men
conspired to murder various federal and county officials with a supply of
the lethal toxin ricin they had developed with the aid of an instruction
kit purchased through a right-wing publication. The flourishing mystique of
chemical and biological weapons suggests that angry and alienated groups
are likely to manipulate them for conventional political purposes. And
indeed, the number of CBW threats investigated by the FBI is increasing
steadily. But the use of such weapons merely to enhance conventional
terrorism should not prove excessively costly to counter.

The debate boils down to money. If the probability of a large-scale attack
is extremely small, fewer financial resources should be committed to
recovering from it. Money should be allocated instead to early warning
systems and preemption of tactical chemical and biological terrorism. The
security package below stresses low-cost intelligence, consequence
management and research, and a no-cost, prudent counterterrorism policy.
Although tailored to the United States, this program could form the basis
for policy in other countries as well:

   * International deterrence. The potential use of chemical and biological
     weapons for enhanced conventional terrorism, and the limited risk of
     escalation to superterrorism, call for a reexamination of the existing
     U.S. deterrence doctrine--especially of the evidence required for
     retaliation against states that sponsor terrorism. The United States
     must relay a stern, yet discreet message to states that continue to
     support terrorist organizations or that disregard the presence of
     loosely affiliated terrorists within their territory: They bear direct
     and full responsibility for any future CBW attack on American targets
     by the organizations they sponsor or shelter. They must know that any
     use of weapons of mass destruction by their clients against the United
     States will constitute just cause for massive retaliation against
     their countries, whether or not evidence proves for certain that they
     ordered the attack.

   * Domestic deterrence. There is no question that the potential use of
     chemical and biological weapons for low-level domestic terrorism adds
     a new and dangerous dimension to conventional terrorism. There is
     consequently an urgent need to create a culture of domestic deterrence
     against the nonscientific use of chemical and biological agents. The
     most important task must be accomplished through legislation. Congress
     should tighten existing legislation against domestic production and
     distribution of biological, chemical, and radiological agents and
     devices.

     The Anti-Terrorism Act of 1996 enlarged the federal criminal code to
     include within its scope a prohibition on any attempts, threats, and
     conspiracies to acquire or use biological agents, chemical agents, and
     toxins. It also further redefined the terms "biological agent" and
     "toxin" to cover a number of products that may be bioengineered into
     threatening agents. However, the legislation still includes the
     onerous burden of proving that these agents were developed for use as
     weapons. Take the case of Larry Wayne Harris, an Ohio man arrested in
     January by the FBI for procuring anthrax cultures from an unknown
     source. Harris successfully defended his innocence by insisting that
     he obtained the anthrax spores merely to experiment with vaccines. He
     required no special permit or license to procure toxins that could be
     developed into deadly agents. The FBI and local law enforcement
     agencies should be given the requisite authority to enforce existing
     laws as well as to act in cases of clear and present CBW danger, even
     if the groups involved have not yet shown criminal intent. The
     regulations regarding who is allowed to purchase potentially
     threatening agents should also be strengthened.

     A campaign of public education detailing the dangers and illegality of
     nonscientific experimentation in chemical and biological agents would
     also be productive. This effort should include, for example, clear and
     stringent university policies regulating the use of school
     laboratories and a responsible public ad campaign explaining the
     serious nature of this crime. A clear presentation of the new threat
     as another type of conventional terrorism would alert the public to
     groups and individuals who experiment illegitimately with chemical and
     biological substances and would reduce CBW terrorism hysteria.

   * Better Intelligence. As is currently the case, the intelligence
     community should naturally assume the most significant role in any
     productive campaign to stop chemical and biological terrorism.
     However, new early warning CBW indicators that focus on radical group
     behavior are urgently needed. Analysts should be able to reduce
     substantially the risk of a CBW attack if they monitor group
     radicalization as expressed in its rhetoric, extralegal operations,
     low-level violence, growing sense of collective paranoia, and early
     experimentation with chemical or biological substances. Proper CBW
     intelligence must be freed from the burden of proving criminal intent.

   * Smart and compact consequence management teams. The threat of
     conventional CBW terrorism requires neither massive preparations nor
     large intervention forces. It calls for neither costly new
     technologies nor a growing number of interagency coordinating bodies.
     The decision to form and train joint-response teams in major U.S.
     cities, prompted by the 1995 Presidential Decision Directive on
     terrorism, will be productive if the teams are kept within proper
     proportions. The ideal team would be streamlined so as to minimize the
     interagency rivalry that has tended to make these teams grow in size
     and complexity. In addition to FBI agents, specially trained local
     police, detection and decontamination experts, and public-health
     specialists, these compact units should include psychologists and
     public-relations experts trained in reducing public hysteria.

   * Psychopolitical research. The most neglected means of countering CBW
     terrorism is psychopolitical research. Terrorism scholars and U.S.
     intelligence agencies have thus far failed to discern the
     psychological mechanisms that may compel terrorists to contemplate
     seriously the use of weapons of mass destruction. Systematic group and
     individual profiling for predictive purposes is almost unknown.
     Whether in Europe, Latin America, the Middle East, or the United
     States, numerous former terrorists and members of radical
     organizations are believed to have considered and rejected the use of
     weapons of mass destruction. To help us understand better the
     considerations involved in the use or non-use of chemical and
     biological weapons, well-trained psychologists and terrorism
     researchers should conduct a three-year, low-cost, comprehensive
     project of interviewing these former radicals.

   * Reducing unnecessary superterrorism rhetoric. Although there is no way
     to censor the discussion of mass-destruction terrorism, President
     Clinton, his secretaries, elected politicians at all levels,
     responsible government officials, writers, and journalists must tone
     down the rhetoric feeding today's superterrorism frenzy.

There is neither empirical evidence nor logical support for the growing
belief that a new "postmodem" age of terrorism is about to dawn, an era
afflicted by a large number of anonymous mass murderers toting chemical and
biological weapons. The true threat of superterrorism will not likely come
in the form of a Hiroshima-like disaster but rather as a widespread panic
caused by a relatively small CBW incident involving a few dozen fatalities.
Terrorism, we must remember, is not about killing. It is a form of
psychological warfare in which the killing of a small number of people
convinces the rest of us that we are next in line. Rumors, anxiety, and
hysteria created by such inevitable incidents may lead to panic-stricken
evacuations of entire neighborhoods, even cities, and may produce many
indirect fatalities. It may also lead to irresistible demands to fortify
the entire United States against future chemical and biological attacks,
however absurd the cost.

Americans should remember the calls made in the 1950s to build shelters,
conduct country-wide drills, and alert the entire nation for a first-strike
nuclear attack. A return to the duck-and-cover absurdities of that time is
likely to be as ineffective and debilitating now as it was then. Although
the threat of chemical and biological terrorism should be taken seriously,
the public must know that the risk of a major catastrophe is extremely
minimal. The fear of CBW terrorism is contagious: Other countries are
already showing increased interest in protecting themselves against
superterrorism. A restrained and measured American response to the new
threat may have a sobering effect on CBW mania worldwide.

                           Setting the FBI Free

  When members of the Japanese cult Aum Shinrikyo went shopping in the
  United States, they were not looking for cheap jeans or compact discs.
  They were out to secure key ingredients for a budding chemical-weapons
  program--and they went unnoticed. Today, more FBI agents than ever are
  working the counterterrorism beat: double the number that would-be
  superterrorists had to contend with just a few years ago. But is the
  FBI really better equipped now than it was then to discover and preempt
  such terrorist activity in its earliest stages?

  FBI counterterrorism policy is predicated on guidelines issued in 1983
  hy then-U.S. attorney general William French Smith: The FBI can open a
  full investigation into a potential act of terrorism only "when facts
  or circumstances reasonably indicate that two or more persons are
  engaged in activities that involve force or violence and a violation of
  the criminal laws of the United States." Short of launching a full
  investigation, the FBI may open a preliminary inquiry if it learns from
  any source that a crime might be committed and determines that the
  allegation "requires some further scrutiny." This ambiguous phrasing
  allows the FBI a reasonable degree of latitude in investigating
  potential terrorist activity.

  However, without a lead--whether an anonymous tip or a public news
  report--FBI agents can do little to gather intelligence on known or
  potential terrorists. Agents cannot even download information from
  World Wide Web sites or clip newspapers to track fringe elements. The
  FBI responds to leads; it does not ferret out potential threats.
  Indeed, in an interview with the Center for National Security Studies,
  one former FBI official griped, "You have to wait until you have blood
  on the street before the Bureau can act."

  CIA analysts in charge of investigating foreign terrorist threats comb
  extensive databanks on individuals and groups hostile to the United
  States. American citizens are constitutionally protected against this
  sort of intrusion. A 1995 presidential initiative intended to increase
  the FBI's authority to plant wiretaps, deport illegal aliens suspected
  of terrorism, and expand the role of the military in certain kinds of
  cases was blocked by Congress. Critics have argued that the costs of
  such constraints on law enforcement may he dangerously
  high--reconsidering them would be one of the most effective (and
  perhaps least expensive) remedies against superterrorism.

---------------------------------------------------------------------------

WANT TO KNOW MORE?

Brian Jenkins first makes his well-known argument that terrorists want a
lot of people watching, not a lot of people dead, in "Will Terrorists Go
Nuclear?" (Orbis, Autumn 1985). More recently, Jenkins provides a reasoned
analysis of weapons-of-mass-destruction (WMD) terrorism in the aftermath of
the Tokyo subway attack in "The Limits of Terror: Constraints on the
Escalation of Violence" (Harvard International Review, Summer 1995). For a
counter argument, see Robert Kupperman's "A Dangerous Future: The
Destructive Potential of Criminal Arsenals" in the same issue. Ron Purver
reviews the literature on superterrorism and weighs the opportunities for,
and constraints on, terrorists considering a WMD attack in "Chemical and
Biological Terrorism: New Threat to Public Safety?" (Conflict Studies,
December 1996/January 1997). Jerrold Post and Ehud Sprinzak stress the
psychopolitical considerations inhibiting potential WMD terrorists in "Why
Haven't Terrorists Used Weapons of Mass Destruction?" (Armed Forces
Journal, April 1998). For a solid compilation of essays on superterrorism,
see Brad Roberts, ed., Terrorism with Chemical and Biological Weapons:
Calibrating Risks and Responses (Alexandria: Chemical and Biological Arms
Control Institute, 1997). Walter Laqueur surveys the history of terrorism
and finds an alarming number of barbarians at the gate in "Postmodern
Terrorism" (Foreign Affairs, September/October 1996). John Deutch takes a
counterintuitive look at the subject in "Think Again: Terrorism" (FOREIGN
POLICY, Fall 1997). Finally, David Kaplan provides the best available study
of Aum Shinrikyo in his excellent book The Cult at the End of the World:
The Terrifying Story of the Aum Doomsday Cult, from the Subways of Tokyo to
the Nuclear Arsenals of Russia (New York: Crown Publishers, 1996).

The World Wide Web provides a number of resources for superterrorism
research. The Carnegie Endowment for International Peace's Nonproliferation
Project and the Henry L. Stimson Center provide regular coverage of
nuclear-, chemical-, and biological-weapons issues, including terrorism.
The Federation of American Scientists publishes a wealth of government
documents as well as excellent news and analysis pertaining to weapons of
mass destruction. And the State Department's "Patterns of Global Terrorism"
provides one-stop shopping for information on some of the world's more
notorious organizations.

For links to these and other Web sites, as well as a comprehensive index of
related articles, access http://www.foreignpolicy.com.

[End]

---------------------------------------------------------------------------
Also see:

Money Laundering -The BCCI Mystery Continues
Rose Attorney Hillary Rodham represented a Stephens
subsidiary, the Systematics bank-data processing firm.
http://www.aci.net/kalliste/

Judicial Watch's RICO case against Clinton
http://www.worldnetdaily.com/exclusiv/980929_judicial_watchs_cas.html

Clinton's secret war games
http://www.worldnetdaily.com/exclusiv/980929.exbre_clintons_secr.html

The War On Truth
http://www.worldnetdaily.com/smith/980929.comcs.html

Here you can examine the fairness of the UN climate change treaty....
http://www.climatefacts.org/

Bilderberg Conferences 
http://www.tlio.demon.co.uk/1998.htm

"....no conspiracy can survive expose'...."
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo at majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email at address
**********************************************
www.telepath.com/believer
**********************************************





From vznuri at netcom.com  Wed Sep 30 01:40:36 1998
From: vznuri at netcom.com (Vladimir Z. Nuri)
Date: Wed, 30 Sep 1998 16:40:36 +0800
Subject: IP: FW: Release: seizing money
Message-ID: <199809302133.OAA25664@netcom13.netcom.com>




From: "mcdonald" 
Subject: IP: FW: Release: seizing money
Date: Wed, 30 Sep 1998 07:15:31 -0500
To: ignition-point at majordomo.pobox.com


-----Original Message-----
From: beasley at ro.com [mailto:beasley at ro.com] 
Sent: Tuesday, September 29, 1998 11:06 PM
To: mcdonalds at airnet.net
Cc: gs924jfj at mon-cre.net; patriot at vallnet.com; Jeff.Ballard at vmic.com
Subject: FWD: Release: seizing money


From: announce at lp.org
Subject: Release: seizing money
Sender: announce-request at lp.org
Reply-To: announce at lp.org
To: announce at lp.org (Libertarian Party announcements)
X-Mailer: mailout v1.26 released with lsendfix 1.8


-----BEGIN PGP SIGNED MESSAGE-----

=======================================
NEWS FROM THE LIBERTARIAN PARTY
2600 Virginia Avenue, NW, Suite 100
Washington DC 20037
=======================================
For release: September 29, 1998
=======================================
For additional information:
George Getz, Press Secretary
Phone: (202) 333-0008 Ext. 222
E-Mail: 76214.3676 at Compuserve.com
=======================================


New bill will allow police to "steal cash"
from travelers, warns Libertarian Party

        WASHINGTON, DC -- It may soon be a crime to get on a plane or
drive down the highway in America with too much money, the Libertarian
Party warned today.

        That's because a bill before the Senate Judiciary Committee
would allow police to assume that anyone traveling with more than
$10,000 in cash in so-called "drug transit areas" is a drug dealer --
and confiscate all their money.

        "Tourists and business travelers, take note: You may soon have
to fear being mugged by your own government," warned Steve Dasbach,
Libertarian Party national director.

        "Your government wants the power to label you a criminal and
seize all your money with no proof that you've committed a crime. In
other words, your government is about to give police a license to
steal."

        The bill in question -- the Drug Currency Forfeitures Act -- is
sponsored by Senators Max Cleland (D-GA) and Charles Grassley (R-IA).
The senators say their bill is designed to "hit drug dealers where it
hurts the most: In the wallet."

        The bill allows police to seize cash from any American
traveling through a drug transit area -- defined as an airport,
highway, or port of entry -- and would force citizens to go to court to
try to get the money back.

        "Accusations without proof? Punishments without trials? Welcome
to America in 1998," said Dasbach. "With this bill, two U.S. Senators
want to gut the Constitution -- and strip away fundamental rights like
the presumption of innocence and the right to carry money without
having to explain your actions to the government."

        One of the most repugnant provisions of the bill, Dasbach said,
is that people who want their money back will face a "rebuttable
presumption" of guilt. In other words, they most prove they are
innocent.

        "Senator Cleland complained that courts frequently throw out
money-laundering cases for lack of evidence, so his innovative solution
was to stop requiring evidence -- and simply allow police to steal your
money," Dasbach said. "Instead of the government proving that you are
guilty, you must prove that you are innocent."

        But why would anyone carry around $10,000 in cash, if they're
not a drug dealer?

        "It's none of the government's business -- period," Dasbach
said. "The idea that any American should have to explain to the police
where their money came from is offensive, and the idea that the police
can pocket your money if they don't like your answers is downright
criminal."

        In previous well-documented cases, he noted, the government has
seized money from a business traveler who had planned major cash
purchases for his company, and from a foreign-born American who was
bringing cash to relatives in another country. In both cases, the
courts ruled that the seizure was improper, and the victims got most of
their money back from the government.

        This bill would reverse those kinds of cases, Dasbach
predicted, by essentially creating a new type of crime: Driving While
Rich and Flying While Affluent -- all in the name of the War on Drugs.

        "What the Drug Currency Forfeitures Act really shows is that
once again, the War on Drugs has become an all-purpose excuse for a War
on Your Rights, such as the right to a fair trial and the right to get
on an airplane or drive down the highway without having to explain
yourself to a policeman," Dasbach said. "If Americans don't put a stop
to this, the politicians will not only steal all our money -- they will
also steal all our Constitutional rights."


-----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQCVAwUBNhFZS9CSe1KnQG7RAQFoYAP9FWTe+KnZxM3QD0X9Ds7I3AgxpNWh3FL5
DRuXH4dzjg+WC/bVZen8eQV8C3ki+/EjHyv56x42W7cv3/PIXUqmoaO1F9a+3Snd
cEfE9g264XqRkkxybJ+FCi5AEhnGDzlHnkFPzzYgAwjjsKR1D8LZbsMEys2FxIMH
cQrBmpX9FNU=
=vDqn
-----END PGP SIGNATURE-----

The Libertarian Party                         http://www.lp.org/
2600 Virginia Ave. NW, Suite 100             voice: 202-333-0008
Washington DC 20037                            fax: 202-333-0072






**********************************************
To subscribe or unsubscribe, email:
     majordomo at majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email at address
**********************************************
www.telepath.com/believer
**********************************************





From vznuri at netcom.com  Wed Sep 30 01:41:09 1998
From: vznuri at netcom.com (Vladimir Z. Nuri)
Date: Wed, 30 Sep 1998 16:41:09 +0800
Subject: IP: Attn Should Turn to 'Buying of Congress'
Message-ID: <199809302133.OAA25698@netcom13.netcom.com>




From: believer at telepath.com
Subject: IP: Attn Should Turn to 'Buying of Congress'
Date: Wed, 30 Sep 1998 09:17:32 -0500
To: believer at telepath.com

Source:  US Newswire
http://www.usnewswire.com/topnews/Current_Releases/0929-125.txt

Author: Attention Should Turn to 'Buying of Congress' 
U.S. Newswire
29 Sep 14:54

 Nation's Attention Should Turn to 'Buying of Congress' Says Author
Charles Lewis
 To: National and Assignment Desks
 Contact: Marie Elena Martinez of Avon Books, 212-261-6903

   News Advisory:

   "America's citizens have been so distracted by the barrage of
commentary, testimony and endless supposition about the President
Clinton/Monica Lewinsky saga that Capitol Hill lawmakers have had a
reprieve from even the limited amount of scrutiny that normally
surrounds their activities," says Charles Lewis, whose THE BUYING OF
THE CONGRESS: How Special Interests Have Stolen Your Right to Life,
Liberty and the Pursuit of Happiness, written with The Center For
Public Integrity, has just been published.  He points out that while
the nation focuses on whether or not President Clinton should be
impeached, no one is scrutinizing the acts of grand larceny committed
by Congress every day.

   "The attention being paid to the current scandal means that
nobody's minding the store, and the store -- Congress -- needs
minding," says Lewis pointing to the ever-increasing influence of
big-money special interests and the impact this has on people's
lives every single day.  Just a few of the detrimental results
of Congress's love affair with special interests, as detailed
in THE BUYING OF THE CONGRESS, are: little or no action on Social
Security, the continued threat to life from e-coli contamination
and other poisoned foods, the loss of full health benefits,
the number of people who must hold two jobs to make ends meet,
the enormous drop in the percentage of federal tax revenue paid
by corporations, and low voter turnout.  "We've found that members
of Congress moonlight for themselves and their wealthy patrons
more than they work for us," says Lewis who then enumerates
"employers" as varied as Lockheed-Martin, Ameritech, the National
Right to Life PAC, and the National Rifle Association.

   Among the people who are most vocal in their condemnation of
President Clinton during this tumultuous time are several whose
career patrons are publicly identified for the first time in THE
BUYING OF THE CONGRESS, including Speaker of the House Newt Gingrich
(R-GA), and Minority Leader Dick Gephardt (D-MO).

   "With the elections just six weeks away, we can't afford to
overlook Congress's own misdeeds," says Lewis.

    ------
   FOR INTERVIEWS OR ADDITIONAL INFORMATION CONTACT: Marie Elena
Martinez, 212/261-6903

 -0-
 /U.S. Newswire  202-347-2770/
 09/29 14:54

Copyright 1998, U.S. Newswire
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo at majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email at address
**********************************************
www.telepath.com/believer
**********************************************





From vznuri at netcom.com  Wed Sep 30 01:41:17 1998
From: vznuri at netcom.com (Vladimir Z. Nuri)
Date: Wed, 30 Sep 1998 16:41:17 +0800
Subject: IP: Secrecy might be weak link in wiretaps
Message-ID: <199809302133.OAA25731@netcom13.netcom.com>




From: believer at telepath.com
Subject: IP: Secrecy might be weak link in wiretaps
Date: Wed, 30 Sep 1998 10:57:09 -0500
To: believer at telepath.com

Source:  USA Today
http://www.usatoday.com/news/nds1.htm

09/29/98- Updated 11:55 PM ET
 The Nation's Homepage

Secrecy might be weak link in wiretaps

 ALEXANDRIA, Va. - Intelligence officials increasingly rely on
 wiretaps authorized by a secret federal court to keep track of foreign
 spies and potential terrorists. 

 But an espionage trial set to begin in federal court here next Tuesday
 highlights what even the secret court's supporters admit is its weakness:
 The court's secrecy can make it very difficult for defendants caught on
 the wiretaps to defend themselves. 

 "If my client had been wiretapped based on (an ordinary federal)
 warrant, you can bet I'd be all over it," says Richard Sauber, a
 Washington, D.C., lawyer defending accused spy Kurt Stand. 

 "But this isn't an ordinary warrant. Under law I can't find out what the
 wiretap was based on, whether the information was flawed, whether
 the judge was correct to authorize it. There's a fundamental issue of
 fairness here," Sauber says. 

 Ironically, fairness was cited as the issue in 1978, when the Foreign
 Intelligence Surveillance Act (FISA) created a special secret court for
 authorizing wiretaps on suspected spies. 

 The FISA court was created by Congress as a check against the
 power of presidents, who until then had authorized wiretaps and
 warrantless searches on their own say so in the interest of national
 security. 

 The law requires the Justice Department, and usually the FBI or the
 National Security Agency, to show a judge that the target is a foreign
 government or agent engaging in "clandestine intelligence gathering
 activities" or terrorism. "The spirit of the thing is to hold the (wiretap
 requests) to a high legal standard," says William Webster, director of
 the FBI when FISA was passed. "That's a large departure from the
 way things had been done." 

 Now, investigators prepare a written request and run it by Justice
 Department lawyers. Justice certifies that the tap's primary purpose is
 to gather intelligence, though information gleaned can be used in
 criminal cases. 

 The request then is presented to one of seven FISA judges, who are
 U.S. district court judges appointed by the chief justice to authorize
 intelligence wiretaps. Many of the requests are heard in a soundproof
 sixth-floor conference room in the Justice Department's main
 headquarters. 

 The target of the search is not represented. 

 Says David Banisar, researcher for the Electronic Privacy Information
 Center: "There are mistakes made in ordinary warrant processes, from
 getting the wrong address to not having probable cause, and they can
 be corrected when lawyers attack the warrant. " 

 "That can't happen here," he says. "We'll never know how many
 mistakes are made because the (secret) court's proceeding isn't public."

 By Richard Willing, USA TODAY

�COPYRIGHT 1998 USA TODAY, a division of Gannett Co. Inc.
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------




**********************************************
To subscribe or unsubscribe, email:
     majordomo at majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email at address
**********************************************
www.telepath.com/believer
**********************************************





From mah248 at is9.nyu.edu  Wed Sep 30 01:45:52 1998
From: mah248 at is9.nyu.edu (Michael Hohensee)
Date: Wed, 30 Sep 1998 16:45:52 +0800
Subject: propose: `cypherpunks license' (Re: Wanted: Twofish source code)
In-Reply-To: <199809281845.TAA18662@server.eternity.org>
Message-ID: <3612A767.94F23B58@is9.nyu.edu>



Ahh, but it's not *you* who's putting the restrictions on your software,
but the U.S. government.  As far as I know (not that I'm a lawyer, or
anything) the U.S. govt. doesn't care what your license says --if it's
strong crypto, it's not supposed to be exported. 

The license is probably irrelevant, as far as import/export is
concerned.

Derek Atkins wrote:
> 
> The big issue I see with GPL and Crypto software is that with the GPL
> you cannot add any redistribution restrictions.  The problem is that
> due to the United States export rules, I cannot export Crypto
> software, which means I must legally put a restriction on any Crypto
> code I write.  But, this is a "further restriction" as far as the
> GPL is concerned.  This, in turn, means I cannot use the GPL for
> Crypto software.
> 
> -derek
> --
>        Derek Atkins, SB '93 MIT EE, SM '95 MIT Media Laboratory
>        Member, MIT Student Information Processing Board  (SIPB)
>        URL: http://web.mit.edu/warlord/    PP-ASEL-IA     N1NWH
>        warlord at MIT.EDU                        PGP key available





From vznuri at netcom.com  Wed Sep 30 01:49:40 1998
From: vznuri at netcom.com (Vladimir Z. Nuri)
Date: Wed, 30 Sep 1998 16:49:40 +0800
Subject: [FP] FW: NID Repeal Possible
Message-ID: <199809302150.OAA27187@netcom13.netcom.com>




From: "ScanThisNews" 
Subject: [FP] FW: NID Repeal Possible
Date: Tue, 29 Sep 1998 20:59:21 -0500
To: "Scan This News Recipients List" 

======================================================================
SCAN THIS NEWS
9/29/98

[Forwarded message follows]
=======================================================================
-----Original Message-----
From: Patrick Poole
Sent: Tuesday, September 29, 1998
To: 'iRESIST'; 'Scott McDonald'
Subject: NID Repeal Possible


A source inside Dick Armey's office today said that it is probable
that there will be a national ID repeal provision in the Omnibus
appropriations bill this year. We need to continue to "remind" the
House leadership (Gingrich, Armey, DeLay) that this is a non-negotiable
issue over the next week. Armey and DeLay are friends of ours on this
issue, but Gingrich will do only what the political winds tell him.

Patrick Poole
Free Congress Foundation
Patrick S. Poole, Deputy Director
(mailto:ppoole at fcref.org)
phone: 202-546-3000
fax: 202-544-2819
http://www.freecongress.org/

[End of forwarded message]
=======================================================================
[Good link to contact your congress-critters:]
http://www.visi.com/juan/congress/
=======================================================================
Call your Congress person every day toll-free!

[Haven't checked these numbers to see if they are still good.]

You may phone the U. S. Capitol switchboard at any of the following
numbers, when they answer, ask for your Senator or Representative's office.
If you don't know the name of your Senator or Representative, tell the
operator where you live and she will connect you to the proper office. 
(800)972-3524
(800)522-6721
(888)723-5246

=======================================================================
[Here's another number:]

The Unions have set up a toll-free number so individuals can call
Congress. If you have to call a congressional office, use the following
number: 1-888-723-5246. Each phone call may cost the unions between
$4.00-$10.00. Use it if you're on the hill or off the hill. Give the
number to 15 of your closest friends and have them call their
congressman's office just to say "hi". Calling this number puts you
directly through to the congressional operator.

[Haven't checked it either.]

=======================================================================
Don't believe anything you read on the Net unless:
1) you can confirm it with another source, and/or
2) it is consistent with what you already know to be true.
=======================================================================
Reply to: 
=======================================================================
 To subscribe to the free Scan This News newsletter, send a message to
      and type "subscribe scan" in the BODY.
    Or, to be removed type "unsubscribe scan" in the message BODY.
   For additional instructions see www.efga.org/about/maillist.html
-----------------------------------------------------------------------
             "Scan This News" is Sponsored by S.C.A.N.
           Host of the "FIGHT THE FINGERPRINT!" web page:
                www.networkusa.org/fingerprint.shtml
=======================================================================





From attila at hun.org  Wed Sep 30 16:57:32 1998
From: attila at hun.org (attila)
Date: Wed, 30 Sep 1998 16:57:32 -0700 (PDT)
Subject: IP: The virtual president
Message-ID: <199809302356.XAA01559@hun.org>



On Tue, 29 Sep 1998, Lazlo Toth wrote:

>"Someone else," aka "Flagship" == "The People"?
>
>-Lazlo
>
    no, Lazlo...  don't be naive; "The People" dont have any say.

    "Someone else," aka "Flagship" == "Geo. Bush"

    I said (documented) in 1986 during Reagan's presidency:

	Geo. Bush will be the last American President to 
	complete his elected term of office.

    Geo. Bush had not yet been elected President...

	attila out...     	(Arkancide?)


    ~~~	absolutely incredible article; a perfect description and
	analysis of our Virtual President, Bill "Bubba" Clinton.
	and, hopefully he takes the Virtual Agenda Hillary with
	him.

	Missy Kelly deserves at least a Pulitzer prize for this one!
	and Joseph Farah, publisher of World News Daily, shows that 
	he has what it takes to lead the fourth estate.

	    attila out...   	(for real)

>
>
>At 5:21 PM -0700 9/28/98, you wrote:
>>From: Jean Staffen 
>>Subject: IP: The virtual president
>>Date: Fri, 25 Sep 1998 22:22:11 -0500 (CDT)
>>To: ignition-point at majordomo.pobox.com
>>
>>This is the most INCREDIBLE article.  I never thought I'd read something
>>like this in the mainstream media!!! -Jean
>>
>>
>>                   The virtual president=20
>>                 =20
>>
>>                   By Missy Kelly=20
>>                   Copyright 1998, WorldNetDaily.com=20
>>
>>                   "You know, by the time you become the leader of a
>>                   country, someone else makes all the decisions." -- Bill
>>                   Clinton September 4, 1998=20
>[snip]
>

__________________________________________________________________________
    go not unto usenet for advice, for the inhabitants thereof will say:
      yes, and no, and maybe, and I don't know, and fuck-off.
_________________________________________________________________ attila__






From bram at gawth.com  Wed Sep 30 02:08:22 1998
From: bram at gawth.com (bram)
Date: Wed, 30 Sep 1998 17:08:22 +0800
Subject: propose: `cypherpunks license' (Re: Wanted: Twofish source code)
In-Reply-To: <199809301621.KAA09089@wijiji.santafe.edu>
Message-ID: 



On Wed, 30 Sep 1998, Richard Stallman wrote:

> It isn't surprising that people who want to write non-free software
> are disappointed that the GNU project won't help them.  What is
> amazing is that they feel this is unfair.  They have no intention of
> letting me use their source code in my programs--so why should they be
> entitled to use my source code in their programs?  These people seem
> to think that their selfishness entitles them to special treatment.

I've never heard anyone say it's unfair, I've just heard people claim that
there's benefit they could be getting which is prohibited by it. This
generally translates into benefit which is denied their clients as well,
in addition to people who interact with their clients. I for one don't
much care if code I write makes someone money in addition to doing some
good, I just want it to be beneficial.

Basic physical necessities, as well as business mechanisms, unfortunately
make it impossible for all code I write to be distributed without some
mechanism by which I could make money off of it. That doesn't mean my code
is evil, just that I'm not independently wealthy.

(Incidentally, the code I'm working on right now will probably wind up
being free, with a considerably looser license than GPL.)

-Bram





From support at golive.com  Wed Sep 30 02:20:43 1998
From: support at golive.com (support at golive.com)
Date: Wed, 30 Sep 1998 17:20:43 +0800
Subject: GoLive CyberStudio Trial Activation Key
Message-ID: <199809302211.PAA06186@company.golive.com>



Dear Fritzie,

Thank you for trying out GoLive CyberStudio.

Your official 30-day activation key is: MWT4QWF7F8WP7GJJ

You'll need to enter this key when you first start-up the
software.

If you have questions about how to use the Tryout software,
GoLive's knowledgeable Technical Support staff is available
to assist you. We suggest you first check the Technical
Support section of our Web site www.golive.com. If you don't
find your answers there, please send us an email at
support at golive.com or call 1-800-554-6638. 

When you are ready to purchase GoLive CyberStudio or if you
want to know more about why GoLive CyberStudio is the best
product for Web site design, please return to our Web site
or contact me at 1-800-554-6638 or 1-650-463-1580.

Sincerely,

Maria Jeronimo
Operations Coordinator
GoLive Systems, Inc.
customercare at golive.com





From nobody at earth.wazoo.com  Wed Sep 30 02:24:27 1998
From: nobody at earth.wazoo.com (Anonymous)
Date: Wed, 30 Sep 1998 17:24:27 +0800
Subject: IP: Navy investigating GSU computer hacker
In-Reply-To: <199809302133.OAA25787@netcom13.netcom.com>
Message-ID: <199809302226.WAA05846@earth.wazoo.com>



  > Someone used a Georgia Southern University writing and linguistics
  > department classroom computer to break into government files and
  > the U.S. Navy wants to know why.

  > [...]

  > "They ran a file transfer protocol program, which allows you to
  > download files and gain access to someone else's computer,"
  > Glacier said.

Ooooh, naughty, naughty!

"When FTP is outlawed, only outlaws will have FTP..."





From mgering at ecosystems.net  Wed Sep 30 02:27:36 1998
From: mgering at ecosystems.net (Matthew James Gering)
Date: Wed, 30 Sep 1998 17:27:36 +0800
Subject: GPL & commercial software, the critical distinction (fwd)
Message-ID: <33CCFE438B9DD01192E800A024C84A19284710@mossbay.chaffeyhomes.com>



Petro wrote:
> >> Had Microsoft, for example, been required to publish their
> >> API's by the market we wouldn't be spending all this effort
>    ^^^^^^^^^^^^^^^^^^^
> 
> >You state free-market and then you are *requiring* someone to 
> >do something? How do you resolve that contradiction? Require 
> >= Force != Free[dom]
> 
> Required as in purchasers large and small saying "You 
> don't include your source code, we won't buy it".

*Require* per say is a bad term for the use of economic power. But the
market didn't "require" Microsoft to do so (see Microsoft's financial
statements), so why should the government step in and force something
that is contrary to the market?

The rest of Jim's sentence read "we wouldn't be spending all this effort
and money on the current [Department of Justice] proceedings."

Which tells me that require means certain segments of the market telling
Microsoft you will do this or we will fuck you over with the borrowcrats
we own, which is exactly what has happened. The elements lacked
sufficient economic power to sway Microsoft, and they lacked sufficient
political power until they ganged up together. A loose coalition to gain
via use of DOJ antitrust force what they good not gain in a free market.
That is political power, not economic.
What is rather ironic is that the same Antitrust laws they are trying to
bash Microsoft with are what prevented them from forming an economic
(instead of under-the-table political) coalition that could have made
Microsoft change its practices without resorting to non-free-market
forces.

	Matt





From jvb at ssds.com  Wed Sep 30 03:19:43 1998
From: jvb at ssds.com (Jim Burnes)
Date: Wed, 30 Sep 1998 18:19:43 +0800
Subject: IP: Chinese Govt Bans Controversial Clinton Book
In-Reply-To: <199809302133.OAA25687@netcom13.netcom.com>
Message-ID: 



On Wed, 30 Sep 1998, Vladimir Z. Nuri wrote:

> 
> From: believer at telepath.com
> Subject: IP: Chinese Govt Bans Controversial Clinton Book
> Date: Wed, 30 Sep 1998 09:16:35 -0500
> To: believer at telepath.com
> 
> Source:  US Newswire
> http://www.usnewswire.com/topnews/Current_Releases/0929-126.txt
> 
> PRIMA: Chinese Government Bans Controversial Clinton Book
> U.S. Newswire
> 29 Sep 15:06
> 
>  PRIMA Publishing: Chinese Government Bans Controversial Clinton
> Book
>  To: National Desk
....

> 
>    Chinese authorities have refused to allow three publishing
> houses to translate a new book -- "The Clinton Syndrome, The
> President and the Self-Destructive Nature of Sexual Addiction" by

Wonder what they would think of "The Secret Life of Bill Clinton"
by Ambrose Evans-Pritchard.  Pretty amazing book.

My guess is that they don't want their top spy in the US sullied
by "hearsay".  ;-)

jim






From ravage at EINSTEIN.ssz.com  Wed Sep 30 03:36:07 1998
From: ravage at EINSTEIN.ssz.com (Jim Choate)
Date: Wed, 30 Sep 1998 18:36:07 +0800
Subject: propose: `cypherpunks license' (Re: Wanted: Twofish source code) (fwd)
Message-ID: <199809302334.SAA14765@einstein.ssz.com>



Forwarded message:

> Date: Wed, 30 Sep 1998 15:25:34 -0700 (PDT)
> From: bram 
> Subject: Re: propose: `cypherpunks license' (Re: Wanted: Twofish source code)

> I've never heard anyone say it's unfair, I've just heard people claim that

You haven't been reading this thread very closely have you?

Lot's of organizations and people are claiming it's unfair in their refusal
to use it based upon the conditions of code distribution.

"It's not fair, I can't make money off your work....."


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage at ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------





From ravage at einstein.ssz.com  Wed Sep 30 03:36:26 1998
From: ravage at einstein.ssz.com (Jim Choate)
Date: Wed, 30 Sep 1998 18:36:26 +0800
Subject: GPL & commercial software, the critical distinction (fwd)
Message-ID: <199809302337.SAA14813@einstein.ssz.com>



Forwarded message:

> From: Matthew James Gering 
> Subject: RE: GPL & commercial software, the critical distinction (fwd)
> Date: Wed, 30 Sep 1998 15:25:32 -0700

> statements), so why should the government step in and force something
> that is contrary to the market?

If Microsofts actions were prohibitive and they didn't set out with specific
intentions of denying fair competition (there have been quite a few
documents and transcripts released that show this pre-meditated intent) then
it wouldn't need to.

The reality is that we don't live in a free-market, but rather a rather
lightly regulated one. Microsoft got a tad too greedy in fixing their
software so that specific competitors would not be able to use it, this in
itself may not be a crime. However it *does* deny the consumer the choice
and that most certainly is a crime.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage at ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------





From ravage at EINSTEIN.ssz.com  Wed Sep 30 03:48:39 1998
From: ravage at EINSTEIN.ssz.com (Jim Choate)
Date: Wed, 30 Sep 1998 18:48:39 +0800
Subject: Is the .to (Tonga) domain completely rogue and should be removed? (fwd)
Message-ID: <199809302351.SAA14932@einstein.ssz.com>



Forwarded message:

> Date: Wed, 30 Sep 1998 16:50:34 -0400
> From: Robert Hettinga 
> Subject: Is the .to (Tonga) domain completely rogue and should be removed?

> 1. Performing traceroutes and other analyses seems to indicate that
> this domain is NOT being used for communication with entities
> legitimately located (legally, not only geographically) within the
> sovereignty of the Kingdom of Tonga, as intended.

Intended by who? As far as I know there are no legal limitations on applying
for and receiving a domain from anywhere through the suitable authority.
There is most certainly zero law that regulates where the owners of those
domains may reside or operate.

Snark hunt.

> 2. Clearly criminal and malicious activites are arising from sites to
> which Tonga has provided comfort and sanctuary.

I got nothing against nailing spammers, but simply being a sex related site
isn't a crime.

> 3. Therefore, I call for a process whereby it can be determined as to
> whether or not it is appropriate to decommission the Tongan domain due
> to negligence, mismanagement, and having allowed it to become an
> attractive resource for criminal activities. I do not believe the
> Tongan domain serves any legitimate purpose as an internet resource.

Irrelevant unless you own the right to administre the tonga domain.

Do you?

I vote *NO*.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage at ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------





From joswald at rpkusa.com  Wed Sep 30 18:48:42 1998
From: joswald at rpkusa.com (Jack Oswald / CEO / RPK Security)
Date: Wed, 30 Sep 1998 18:48:42 -0700 (PDT)
Subject: ANNOUNCEMENT: RPK SECURITY AWARDED PATENTS FOR ENCRYPTONITE ENGINE IN U.S. AND NEW ZEALAND
Message-ID: <199810010139.SAA22313@proxy3.ba.best.com>


You have received this message because at some time in the past your name was submitted to our e-mail mailing list database.  If you do not wish (or no longer wish) to receive announcements, updates and news concerning the RPK Encryptonite Engine or the RPK InvisiMail e-mail security products, please forward this message to remove at rpkusa.com

-----------------------------------------------------------------------

MEDIA ALERT

CONTACT
Paula Miller						Lyn Oswald
Nadel Phelan, Inc.					RPK Security Inc.
408-439-5570 x277					212-488-9891
paulam at nadelphelan.com				lynoswald at rpkusa.com	


RPK SECURITY AWARDED PATENTS FOR ENCRYPTONITE ENGINE IN U.S. AND NEW ZEALAND

SAN FRANCISCO, CA. September 15, 1998 - RPK Security, Inc., a technology leader in fast public key encryption, today announced that the technology behind the company's uniquely fast public key cryptosystem, the RPK Encryptonite Engine, was awarded U.S. patent number 5,799,088 on August 25, 1998 and New Zealand patent number 277,128 on August 17, 1998.
 
Based on the proven mathematics of Diffie-Hellman Key Exchange, the RPK Encryptonite Engine combines all the benefits of other public key systems (authentication, digital signatures and digital certificates) with the speed of a secret key system into one algorithm. With the superior performance offered by RPK's Encryptonite Engine, applications requiring streaming data, sound, video or large numbers of transactions, such as credit card payments, receive instantaneous responses and secure communication links.

"We believe these patents give us a significant, unique and enforceable competitive advantage over other providers of public key encryption products," said Jack Oswald, president and CEO of RPK Security. "The RPK patents confirm our technology leadership in strong and fast public key cryptography."

With development and distribution facilities outside of the U.S., RPK Security is able to provide its customers with a worldwide strong encryption solution that is available globally, unlike competing products that are restricted by U.S. export regulations. 

ABOUT RPK SECURITY
Founded in 1995, RPK Security, Inc. is a technology leader in fast public key cryptography.  Its flagship RPK Encryptonite� Engine, a uniquely fast and strong public key encryption technology, is available worldwide in custom hardware and software toolkits on multiple platforms.  Developed from widely accepted security mathematics and techniques, the RPK Encryptonite Engine is easily embedded into new and existing hardware and software applications.  RPK's cryptographic research and product development is based in New Zealand, Switzerland and the U.K, with worldwide sales and marketing operations in San Francisco, CA.  Visit RPK's website at www.rpkusa.com or call (212) 488-9891.





From jya at pipeline.com  Wed Sep 30 04:10:48 1998
From: jya at pipeline.com (John Young)
Date: Wed, 30 Sep 1998 19:10:48 +0800
Subject: FBI Responds to Barr
Message-ID: <199810010000.UAA06013@dewdrop2.mindspring.com>



The FBI today responded to accusations by Rep. Bob Barr 
of "an effort by the Department of Justice to obtain massive 
new enforcement powers in the closing days of the 105th 
Congress":

   http://jya.com/fbi-barr.htm

DoJ promises to provide a response tomorrow.







From maxinux at openpgp.net  Wed Sep 30 04:53:56 1998
From: maxinux at openpgp.net (Max Inux)
Date: Wed, 30 Sep 1998 19:53:56 +0800
Subject: advertisement
In-Reply-To: <199809301343.IAA11432@einstein.ssz.com>
Message-ID: 



On Mon, 28 Sep 1998 emailking.associates at cwix.com wrote:

>Date: Mon, 28 Sep 1998 10:33:26
>From: emailking.associates at cwix.com
>To: cypherpunks at einstein.ssz.com
>Subject: advertisement
>
>
>This Message was Composed using Extractor Pro '98 Bulk E- Mail 
>Software. If 
>you wish to be removed from this advertiser's future mailings, 
>please reply 
>with the subject "Remove" and this software will automatically 
>block you 
>from their future mailings.

>1-800-781-7046 ext.6053
>
>If you do not wish to receive this message hit "reply" and type 
>"remove" in the subject line and you
>will atomatically be removed from future mailings. Sorry if this 
>was an inconvenience to you.


I am impressed, this thing follows the laws of California, mighty
impressive.  Both a 1-800 number to call, an email address of a real
person and an automated removal...  And it even had an address in it!

Spammers are starting to kinda follow laws.. if only they would follows
rules, like "SPAMMING IS BAD!" but that wont happen... 

just my $0.02 worth

Max
--   Max Inux   Hey Christy!!! KeyID 0x8907E9E5
Kinky Sex makes the world go round O R Strong crypto makes the world safe
       If crypto is outlawed only outlaws will have crypto
Fingerprint(Photo Also): 259D 59F7 D98C CD73 1ACD 54Ea 6C43 4877 8907 E9E5







From ravage at EINSTEIN.ssz.com  Wed Sep 30 04:57:03 1998
From: ravage at EINSTEIN.ssz.com (Jim Choate)
Date: Wed, 30 Sep 1998 19:57:03 +0800
Subject: advertisement (fwd)
Message-ID: <199810010059.TAA15358@einstein.ssz.com>



Forwarded message:

> Date: Wed, 30 Sep 1998 17:53:09 -0700 (PWT)
> From: Max Inux 
> Subject: Re: advertisement

> 
> >1-800-781-7046 ext.6053

> I am impressed, this thing follows the laws of California, mighty
> impressive.  Both a 1-800 number to call, an email address of a real

I called and requested they take all ssz.com addresses from all their lists.
I also passed the number along to quite a few anti-spammers. You really
should avail yourself of the opportunity to leave the gentleman a nice
considerate message.

As to having auto-mated removal, I didn't ask to be added so somebody want
to explain to me why I should do anything to stop receiving this traffic?
Seems to me the only ethical mechanism it auto-remove on first transmission
without a subscription request.

Computers are *supposed* to make our lives *easier*. Some folks seem to have
forgotten this.

    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage at ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------





From nobody at replay.com  Wed Sep 30 04:59:42 1998
From: nobody at replay.com (Anonymous)
Date: Wed, 30 Sep 1998 19:59:42 +0800
Subject: No Subject
Message-ID: <199810010100.DAA26700@replay.com>



Subject: Re: propose: `cypherpunks license' (and vague ideas for additions)

> I don't want government back doors in any software I use, but this
> kind of restriction is the wrong way to avoid them. The right way is
> through the GNU GPL,

You just pegged my bogometer.

The GNU GPL discourages the sale of proprietary software by prohibiting
anything using code covered by the license from being proprietary, and
that's right.

The proposed Cypherpunks license discourages the distribution of software
with key recovery (= government back doors) by prohibiting anything using
code covered by the license from having key recovery, and that's wrong.

Both these licenses would be trying to promote their propagators' goals
through restrictions on code re-use. However, Cypherpunks and GNU types
don't have exactly the same goals. GNU types consider the availability of
good, non-proprietary software to be paramount, whereas Cypherpunks
generally consider the use of good cryptography in useful applications to
be paramount, whether the code behind it is free or expensive, open-source
or proprietary (although proprietary code often ends up being bad crypto).
Companies will not put good crypto in useful applications if it
necessitates that they all but give up whatever intellectual property
rights they had to other parts -- even non-crypto-related parts -- of the
application, so the GPL is clearly not the best license for to promote
Cypherpunk goals.

On a different tangent, lemme suggest some vague ideas for a few potential
requirements:

Warnings about proprietary code: Authors of products using CPL-covered
code which do not release all source code must either a> clearly
demonstrate that none of the unreleased code can have a negative impact on
security or b> place a message on any marketing materials or documentation
mentioning the product's security features saying "For important warnings
about this product's security, see ."

CPL advert: Authors of products using CPL-covered code are required to
include with their copyright information some message like "This product
uses code covered by the Cypherpunk License for its security features. See
 for more information." and are requested to include references to
the site in other convenient places. This site, of course, need not be
limited to dry legalese about the license, but may include vivid
descriptions of driftnet wiretaps and other mischief perpetrated by NSA
and friends, cryptopolitical rants, or even tools for building and setting
up various cryptostuff. Note the "may;" lots of stuff requires lots of
work, and so, unless there was sort of backing from a civil-liberties
organization with staff-hours to spare or some miraculous effort of
miracle of organization...how's that secure talk client going?

Strength requirements: By default and taking into account only the
published attacks on the cryptographic primitives used, an average of at
least 2^79 operations must be required for anybody (law-enforcement or
not) to compromise the product's security features. If and only if laws
restrict this software's use or sale, a second version may be created with
lower strength, and the stronger version may operate at lower strength
when necessary for smooth interoperation, provided that the user knows
before sending any information that the connection uses weakened
encryption. The weaker version must be clearly marked as such (i.e.,
"Widget 2.4 Export" vs. "Widget 2.4").

Fact sheet: Authors of products using CPL-covered code are requested but
not required to create a sort of security fact sheet detailing the
technical aspects of the product's security features --

* algorithms and key lengths 
* a precise description of the breadth of the security features
* a description of the threat model used in the design process

-- and issues relating to trust in the product --

* authors of algorithms and code, if available
* the level of openness of the source 
* places to obtain whatever source was released 
* information on any independent analyses of the product's security 
* information on independent verifications of the fact sheet

-- followed by a summary placing this in more practical contexts. I'd
imagine any license including this would also include a form form the fact
sheets and some places to send them.

> which would enable people to check the source code of a modified
> version for anything suspicious.

Note that I'm only on one of the lists; Cc: replies to . :)





From redrook at yahoo.com  Wed Sep 30 05:16:03 1998
From: redrook at yahoo.com (RedRook)
Date: Wed, 30 Sep 1998 20:16:03 +0800
Subject: GPL & commercial software, the critical distinction (fwd)
Message-ID: <19981001011807.25359.rocketmail@send103.yahoomail.com>



> -----Original Message-----
> From: Jim Choate [mailto:ravage at einstein.ssz.com]
> Sent: Wednesday, September 30, 1998 4:38 PM
[deletia]
> The reality is that we don't live in a free-market, 
> but rather a rather lightly regulated one. 
> Microsoft got a tad too greedy in fixing their
> software so that specific competitors would 
> not be able to use it, this in
> itself may not be a crime. However it 
> *does* deny the consumer the choice
> and that most certainly is a crime.

Please elaborate. Netscape works fine on Windows 98, and faces the
same restrictions with installation that original Windows 95 had. 

As for Java, Java works as well on Windows as on any other platform. 

It's funny how giving the customers more value for their money, always
ends up being anti-competative. It's a thorny issue that's not easy to
deal with. Especially with Microsoft. They have such a large pool of
source code, so many employees, and such an effective distribution
network, that they can quickly add a jillion features to any program,
and make so much money off of it, that it's difficult for anyone but a
multi-million dollar company to compete

And no, taking the browser out of Windows is not going to change that.

Harv.
RedRook at yahoo.com
_________________________________________________________
DO YOU YAHOO!?
Get your free @yahoo.com address at http://mail.yahoo.com





From mgering at ecosystems.net  Wed Sep 30 05:26:17 1998
From: mgering at ecosystems.net (Matthew James Gering)
Date: Wed, 30 Sep 1998 20:26:17 +0800
Subject: GPL & commercial software, the critical distinction (fwd)
Message-ID: <33CCFE438B9DD01192E800A024C84A19284714@mossbay.chaffeyhomes.com>




Jim Choate wrote:
> The reality is that we don't live in a free-market, but 
> rather a rather lightly regulated one.

Lightly? You jest. No, we certainly don't live in a free market, we have
a mixed economy. We *should* have a free market, government distortions
are much more destructive and pervasive than any potential abuses by
market leaders. Also, the latter abuses are naturally corrected by
competition, not necessarily immediate but certainly faster than
government distortions which they blame on the market as an excuse for
*more* government distortions.

The answer for establishing "rules" which insure "fairness," such as
preventing an OS vendor from conspiring against a single application
vendor and intentionally breaking their product or enforcing artificial
incompatibilities, is to create a framework for standards, peer-review,
arbitration and liability to enforce "fair" industry practice and
competition. Make it a contractually issue and not a criminal one,
reputation for punishment instead of life and liberty, and an optional
and competitive system instead of a compelled and monopolistic one. An
optional system must have an overall and mutual benefit for all parties
involved, the government has no such limitation and becomes an
instrument for theft.

We have two paths for international commerce and regulation, we can
continue to the New World Order (NWO), or we can divorce the supporting
infrastructure from the geopolitical power base.

	Matt





From Twenty1CC at aol.com  Wed Sep 30 05:29:28 1998
From: Twenty1CC at aol.com (Twenty1CC at aol.com)
Date: Wed, 30 Sep 1998 20:29:28 +0800
Subject: What is AOL
Message-ID: <56d52044.3612da95@aol.com>



Found in rec.homor.funny.reruns
>From rec.arts.sf.written, in a thread entitled "What is AOL?"
> An organization set up to give Internetters someone to make ethnic jokes
> about.
>
> --
> Arthur D. Hlavaty             hlavaty at panix.com





From maxinux at openpgp.net  Wed Sep 30 05:40:20 1998
From: maxinux at openpgp.net (Max Inux)
Date: Wed, 30 Sep 1998 20:40:20 +0800
Subject: Increase Your Paycheck Next Week
In-Reply-To: <199809301608.JAA07148@cyberpass.net>
Message-ID: 



On Wed, 30 Sep 1998 2001files at usa.net wrote:

Dear spammer,

Nice threats are attached to this spam.  I love new ideas from the
spamming community. Please be aware by not  including a real human email
address (specifically stated) and a 1800 number to call to be removed,
you are in violation of California law.  

Max Inux

>Date: Wed, 30 Sep 1998 09:08:07 -0700 (PDT)
>From: 2001files at usa.net
>Reply-To: business_ideas at usa.net
>To: cypherpunks at cyberpass.net
>Subject: Increase Your Paycheck Next Week
>
>
>Would you like to get a pay raise next week without asking your boss?   Then this very special report, "Money Power," is for you!
>
>If you have a regular job - not working in your own or a family business - and you get a regular paycheck, we can show you how you can give yourself a HUGE RAISE in your very next paycheck.  At least between 20% - 30% more than what you are getting now.  Yes, your paycheck will be increased substantially!
>
>	* Example:  If your take home pay is $400 net per week, you can take home $440 - $500 the very next week and every week thereafter!
>
>No Gimmicks!  Everything is perfectly legal.
>
>"Money Power" is written in three parts:
>
>	*Part I - shows you exactly what to do so you can give yourself a raise in your next paycheck.  You decide how big a pay raise you want to give yourself!
>
>	*Part II -  shows you how to protect yourself, your family, your home, and your assets without paying big money -- just $85 per year to legally protect your liability 100% against bill collectors and debts.
>
>	*Part III - shows you how you can legally deduct household expenses - utilities, gardener, supplies, repairs, and more from your income taxes.  Absolutely No Gimmicks!  Everything is legal.
>
>This is NOT a "get rich quick" scheme or some other scam.  We are sure you have seen lots of them.  And this is NOT a "tax protester" who refuses to pay income taxes.  The author of this report pays taxes every year - of course, as little as legally possible.  It's our opinion it is not good to zero out completely.  But, you can - it's your choice.
>
>Using the methods in this report, the rich become richer.  And poor people become poorer when they don't take advantage of these techniques.  Your chances of being audited by the IRS - just for using these methods - are near zero.
>
>	* We are so sure "Money Power" will work for you, here is our risk-free guarantee.  If you don't get at least 100 times more money in your paycheck in one year than the cost of this report, we will double your money back!  How's that for a guarantee?
>                      ---------------------------------
>
>Now, here's one more offer you will find hard to refuse.  We have a Reseller Program whereby you can make money selling this report.  When you purchase "Money Power," you will also get 1,000 FREE places to advertise on the Internet!  If you want to make some extra money - $500, $1,000 or more - just post ads on those sites and have the orders come to you.  For every order you send us, we will pay you $5.00:
>	*You don't need a merchant account to process orders!  We do that.
>	*You don't have to warehouse any inventory!  We do that.
>	*You don't have to ship any merchandise.  We do that.
>All you have to do is send us the orders.  We'll process checks, money orders, and credit cards and we will pack and mail the report.  And you get paid twice a month - on the 15th and the 30th!
>                     ------------------------------------
>
>
>
>And, listen.  America is a free country.  If you don't want an increase in your paycheck, that's fine.  And if you don't want to know how to protect your family, that's OK, too.  And if you don't want to save money on taxes, that's quite all right.  You are living in a free country.
>
>But, if you need money - more money in your paycheck, act right now!  
>
>The author of this report used to work for Corporate America earning over $100,000 a year.  After paying almost 40% in Federal taxes, 6.2% for Social Security, 1.45% for Medicare, 1.5% for the unemployment fund, and 3% for his employee benefits, he would bring home less than half of his yearly salary!  And then there was state income tax to pay!   He decided he had to do something so he could keep all the money!
>
>"Money Power" is the result of the author's frustration and aggravation with the system and the research he did to change his situation.  These are methods they don't teach you in school!
>
>It can't get much better than this.  This is a once in a lifetime opportunity because you may not receive this message again.  And you know how it is with opportunities ..... if you pass on one, you are not entitled to another for a long time.
>
>
>Don't Delay!  The longer you wait to order, the longer you will wait for your raise!!!!
>
>
>	>>>>>>>>>>>>> Please Note:  This report is for U.S. Citizens and Green Card holders only!  This program will not work for illegal immigrants or foreigners.<<<<<<<<<<<<
>
>---------------------------------------------------------------------------
>
>Here's how to order:
>
>*****To order online, click on your reply button and type ORDER ONLINE in the subject line and we will e-mail you the online order form.
>
>                             OR
>
>Print out the convenient order form below NOW and mail it to:
>
>	World Net Press
>	Dept. EN-930
>	P.O. Box 96594
>	Las Vegas, NV 89193-6594
>	
>Payment Method:  
>_____ Check     
>_____ Money Order
>_____ Visa
>_____ MasterCard
>_____ American Express
>_____ Discover
>
>_____ Yes, I want to order my copy of  "Money Power".  Price is $9.95 + $3.95 S/H = $13.90 and my order will be shipped by 1st Class Mail.   
>
>Name_________________________________________________________________________
>
>Address______________________________________________________________________
>
>City/State/Zip_______________________________________________________________
>
>Daytime Phone (__________)___________________________________________________
>
>E-Mail Address_______________________________________________________________
>
>Credit Card #_____________________________________________ Exp. Date_________
>
>Cardholder Name (as it appears on the card)__________________________________
>
>(Please make sure you include your phone number and e-mail address in case we have a question about your order.  Your credit card billing will reflect Road to Wealth, Inc.)
>
>
>
>**************************************************************************
>We are currently consolidating our mailing lists and need to update our database.  Our records indicate you may have inquired in the past. If this message has reached you in error, or the information is not correct, please accept our apology.  Follow the instructions below to be removed and we will honor your request.  We do not knowingly engage in spam of any kind.
>
>Please click on your reply button and type REMOVE in the subject line only.  The software reads only the subject line, not the body of the message.
>**************************************************************************
>
>Please be advised we collect the e-mail addresses of all flamers, hackers, and users of abusive and vulgar language.  We submit these addresses to the FBI and Interpol on a monthly basis.  
>
>
>
>


--   Max Inux   Hey Christy!!! KeyID 0x8907E9E5
Kinky Sex makes the world go round O R Strong crypto makes the world safe
       If crypto is outlawed only outlaws will have crypto
Fingerprint(Photo Also): 259D 59F7 D98C CD73 1ACD 54Ea 6C43 4877 8907 E9E5







From mgering at ecosystems.net  Wed Sep 30 05:47:18 1998
From: mgering at ecosystems.net (Matthew James Gering)
Date: Wed, 30 Sep 1998 20:47:18 +0800
Subject: Internet is a dog named Toto
Message-ID: <33CCFE438B9DD01192E800A024C84A19284715@mossbay.chaffeyhomes.com>




"Keep thought: If the Internet were a dog, it might be named Toto. Like
that little yapper in the famous film whose bark had some bite, the
Internet is yanking back the curtains and exposing the powers that be
for what they are: big-mouthed, fast-talking "wizards" about to be run
out of town."

(from http://www.business2.com/articles/issue1.html)


For some reason when I read this paragraph, it had an oddly strange
parallel meaning. ;)

	Matt





From ravage at EINSTEIN.ssz.com  Wed Sep 30 06:05:54 1998
From: ravage at EINSTEIN.ssz.com (Jim Choate)
Date: Wed, 30 Sep 1998 21:05:54 +0800
Subject: GPL & commercial software, the critical distinction (fwd)
Message-ID: <199810010207.VAA15977@einstein.ssz.com>



Forwarded message:

> From: Matthew James Gering 
> Subject: RE: GPL & commercial software, the critical distinction (fwd)
> Date: Wed, 30 Sep 1998 18:24:02 -0700

> Jim Choate wrote:
> > The reality is that we don't live in a free-market, but 
> > rather a rather lightly regulated one.
> 
> Lightly? You jest.

No I don't. I can start a business for as little as $15 to register a DBA
and I don't need licenses or other sorts of regulatory permissions. If I
sell a product or service (some are exempt, check your local area) I'll need
a tax number to pay my state sales tax (though they do nothing to regulate
my business other than specify that I must pay x% of my sales to the
community). Getting that tax number is free. Outside of that (at least in
Texas) I'm ready to go.

Yep, that's a lot of regulation, no forms or permission slips from some
in loco parentis, no reports or annual fees.

> No, we certainly don't live in a free market, we have
> a mixed economy. We *should* have a free market,

No we shouldn't. The fact that monopolies can exist in this lightly
regulated economy is ample evidence that the non-regulated or free-market
theory is nothing more than another pie-in-the-sky utopian dream.
Unrealistic and unrealizable.

If you seriously think this is a heavily regulated market you should do more
research into such places as Nazi Germany, Russia, China, etc.

> are much more destructive and pervasive than any potential abuses by
> market leaders.

Monopolies are monopolies, claiming that they will be less abusive in a
regulated market than in a free-market just demonstrates a lack of
understanding of basic human instincts.

You are claiming that if we do away with the food regulations that McDonalds
will be *more* concerned about their meat being cooked thoroughly then you
obviously don't understand people who chase the bottem line to the exclusion
of all else.

> Also, the latter abuses are naturally corrected by
> competition,

If a market monopolizes there is *NO* competition. If the market is one that
takes a large investment in intellectual or capital materials then there
won't be any opportunity to even attempt to start a competitive venture.

> The answer for establishing "rules" which insure "fairness," such as

Fairness is about the consumer, not the manufacturer. This misunderstanding
(if not intentional misdirection) by free-market mavens is at least one
indication why it won't work.

> competition. Make it a contractually issue and not a criminal one,

Contractual with who?

> reputation for punishment instead of life and liberty, 

Businesses are neither alive nor do they enjoy liberty. Don't confuse people
with systems and objects.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage at ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------





From ravage at EINSTEIN.ssz.com  Wed Sep 30 06:09:16 1998
From: ravage at EINSTEIN.ssz.com (Jim Choate)
Date: Wed, 30 Sep 1998 21:09:16 +0800
Subject: GPL & commercial software, the critical distinction (fwd)
Message-ID: <199810010212.VAA16034@einstein.ssz.com>



Forwarded message:

> Date: Wed, 30 Sep 1998 18:18:07 -0700 (PDT)
> From: RedRook 
> Subject: RE: GPL & commercial software, the critical distinction (fwd)

> Please elaborate. Netscape works fine on Windows 98, and faces the
> same restrictions with installation that original Windows 95 had. 

No Netscape on NT or 95/98 is no where near as stable as on a Linux or
Solaris box (the two that I use most). I can't go 24 hours on my NT for
example without Netscape hanging for some mysterious reason whereas I've
run Netscape (even on my HP 10.10) for days without a hang and those
mysterious pauses it's so famous for.
 
> As for Java, Java works as well on Windows as on any other platform. 

Yep, that explains why my NT's have to be rebooted almost daily because of
various issues and my various unix boxes go for weeks....yep, that's more
stable all right.

> It's funny how giving the customers more value for their money, always
> ends up being anti-competative.

How do you figure Win98 gives me more value for my money? I buy Win98 for
$100 or so, have to have gobs of memory and a damned fast processor to even
come close to the alternate OS'es.

> network, that they can quickly add a jillion features to any program,

And just as many bugs.

> and make so much money off of it, that it's difficult for anyone but a
> multi-million dollar company to compete

Only becuase they intentionly go after the smaller companies and create
various issues (eg the DrDos intentional break) that nearly guarantee that
smaller firms are out before they even start.

> And no, taking the browser out of Windows is not going to change that.

You have a penchant for random wandering....


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage at ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------





From ravage at EINSTEIN.ssz.com  Wed Sep 30 06:11:53 1998
From: ravage at EINSTEIN.ssz.com (Jim Choate)
Date: Wed, 30 Sep 1998 21:11:53 +0800
Subject: propose: `cypherpunks license' (and vague ideas for additions) (fwd)
Message-ID: <199810010214.VAA16092@einstein.ssz.com>



Forwarded message:

> Date: Thu, 1 Oct 1998 03:00:21 +0200
> From: Anonymous 
> Subject: Re: propose: `cypherpunks license' (and vague ideas for additions)

> The GNU GPL discourages the sale of proprietary software by prohibiting
> anything using code covered by the license from being proprietary, and
> that's right.

It does not prevent GPL'ed code from using proprietary licenses, it only
prevents companies from using GPL'ed code without first obtaining a non-GPL
licence from the original author of the code (who should deservedly get a
cut of the cash).

> Both these licenses would be trying to promote their propagators' goals
> through restrictions on code re-use.

Re-use *without* prior permission of the author and copyright holder,
be accurate.

[other stuff deleated]


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage at ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------





From vince at offshore.com.ai  Wed Sep 30 06:12:59 1998
From: vince at offshore.com.ai (Vincent Cate)
Date: Wed, 30 Sep 1998 21:12:59 +0800
Subject: Wire transfers from web page?
Message-ID: 




Does anyone know of any bank with software or a web page that lets you
give them wire-transfer instructions from over the internet?

How about a bank that lets you see where a wire transfer came from on the
web page interface?  I think dollarbank.com just says "incoming wire". 

How about a bank on the Internet that will accept instructions to write
and mail a check drawn on your account to any random person at any
address? 

Such things would make it really easy for random little guys to make
their own currency using e-commerce software.

  -- Vince


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 Vincent Cate                           Offshore Information Services
 Vince at Offshore.com.ai                  http://www.offshore.com.ai/
 Anguilla, BWI                          http://www.offshore.com.ai/vince
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

You have to take life as it happens, but you should try to make it
happen the way you want to take it.    - German Proverb





From nobody at sind.hyperreal.art.pl  Wed Sep 30 06:19:06 1998
From: nobody at sind.hyperreal.art.pl (HyperReal-Anon)
Date: Wed, 30 Sep 1998 21:19:06 +0800
Subject: GoLive CyberStudio Trial Activation Key
Message-ID: <0c2e486375808b629a76c933d0374163@anonymous>



Dear Maria,

Thank you for trying out CumFast VibrationDildo.

Your official 30-day orgasm key is: ISPAMTHEWORLDFORSEX

You'll need to enter this key when you first start-up the vibrator.

If you have questions about where to put the Tryout vibrator,
CumFast's knowledgeable Hands-On Demonstration staff is available to assist
you in achieving orgasm. We suggest you first check the Hands-On Support
section of our Web site www.cumfast.com. If you don't find your answers
there, please send us a naked picture of yourself in suggestive poses at
LWRules at Bellatlantic.net or call 1-800-1-FUCK-ME

When you are ready to purchase CumFast VibrationDildo or if you want to know
more about why CumFast VibrationDildo is the best product for achieving
orgasm in public, please return to our Web site or contact me at
1-800-1-FUCK-ME or 1-212-I'LL-BLOW.

Sincerely,

Monique Tops
Vibration Coordinator
CumFast Sex Toys, Inc.
LWRules at bellatlantic.net


On Wed, 30 Sep 1998 support at golive.com wrote:

>
> Dear Fritzie,
>
> Thank you for trying out GoLive CyberStudio.
>
> Your official 30-day activation key is: MWT4QWF7F8WP7GJJ
>
> You'll need to enter this key when you first start-up the
> software.
>
> If you have questions about how to use the Tryout software,
> GoLive's knowledgeable Technical Support staff is available
> to assist you. We suggest you first check the Technical
> Support section of our Web site www.golive.com. If you don't
> find your answers there, please send us an email at
> support at golive.com or call 1-800-554-6638.
>
> When you are ready to purchase GoLive CyberStudio or if you
> want to know more about why GoLive CyberStudio is the best
> product for Web site design, please return to our Web site
> or contact me at 1-800-554-6638 or 1-650-463-1580.
>
> Sincerely,
>
> Maria Jeronimo
> Operations Coordinator
> GoLive Systems, Inc.
> customercare at golive.com
>
>





From nobody at sind.hyperreal.art.pl  Wed Sep 30 06:29:21 1998
From: nobody at sind.hyperreal.art.pl (HyperReal-Anon)
Date: Wed, 30 Sep 1998 21:29:21 +0800
Subject: What is AOL
Message-ID: 



Twenty1CC at aol.com had these pearls of wisdom:

>Found in rec.homor.funny.reruns

Yes, you are quite a rerun, but you aren't funny.

To answer your question, AOL is a haven for crackers, lamers, losers,
fakers, and posers like yourself.

You owe the Cypherpunks a video of your very violent and graphic death.





From billp at nmol.com  Wed Sep 30 06:47:33 1998
From: billp at nmol.com (bill payne)
Date: Wed, 30 Sep 1998 21:47:33 +0800
Subject: next article?
Message-ID: <3612EA34.73B@nmol.com>

False Security

		        William H. Payne	
                                   
  			Abstract

�Why 130 million Wiegand cards are in use throughout the world .

The most secure of all access card technologies.

HID Wiegand cards are virtually impossible to counterfeit... any attempt
to 
alter them destroys them! ...

Since no direct contact with the card is required, they are totally
enclosed,
making them absolutely immune to the elements and a frustration of
vandals. ... 

     	The secrets to the security of an
  	HID Wiegand card are those little
      	enclosed wire strips. Once corrupted,
  	they won't work.�

Access Control & SECURITY SYSTEMS INTEGRATION, September 1998
www.prox.com  http/www.securitysolutions.com 
http://www.securitysolutions.com/

Bullshit.

	Fumble, Bumble and Inept Funds Electronic Lock Breaking at
	Sandia National Laboratories.

Zola http://zolatimes.com/

Would this be worth some bucks?

Want another FUN article? 

http://www.zolatimes.com/v2.29/bw1.html
http://www.aci.net/kalliste/bw1

I would need a BRILLIANT EDITOR to help polish
the ms.  http://www.aci.net/kalliste/

On the other hand, we POSSSIBLY could get this UNFORTUNATE MATTER
SETTLED before it gets WORSE.

biru
copyright bill payne 9/30/98 7:27 PM


Counterfeiting Wiegand Wire Access Credentials
     
                                   Bill Payne
     
                                 October 16,1996
     
                                    Abstract
     
                  Wiegand wire access credentials are easy and
                  inexpensive to counterfeit.
     
        Access Control & Security Systems Integration magazine, October
        1996 [http://www/securitysolutions.com] published the article,
     
             Wiegand technology stands the test of time
     
             by PAUL J. BODELL, page 12
     
             Many card and reader manufacturers offer Wiegand (pronounced
             wee-gand) output.  However, only three companies in the
             world make Wiegand readers.  Sensor Engineering of Hamden
             Conn., holds the patent for Wiegand, and Sensor has licensed
             Cardkey of Simi Valley, Calif., and Doduco of Pforzheim,
             Germany, to manufacture Wiegand cards and readers. ...  A
             Wiegand output reader is not the same thing as a Wiegand
             reader,  and it is important to understand the differences.
     
                In brief, Wiegand reader use the Wiegand effect to
             translate card information around the patented Wiegand
             effect in which a segment of a specially treated wire
             generates an electronic pulse when subjected to a specific
             magnetic field.  If the pulse is generated when the wire is
             near a pick-up coil, the pulse can be detected by a circuit.
             Lining up several rows of wires and passing them by a cold
             would generate a series of pulses.  Lining up two rows of
             wires - calling on row "zero bits" and the other "one bits"
             - and passing them by two different coils would generate two
             series of pulses, or data bits.  These data bits can then be
             interpreted as binary data and used to control other
             devices.  If you seal the coils in a rugged housing with
             properly placed magnets, and LED and some simple circuitry,
             you have a Wiegand reader.  Carefully laminate the special
             wires in vinyl, and artwork, and hot-stamp a number on the
             vinyl, and you have a Wiegand card.
     
             IN THE BEGINNING
     
               Wiegand was first to introduce to the access control
             market in the late 1970s.  It was immediately successful
             because it filled the need for durable, secure card and
             reader technology.
               Embedded in the cards, Wiegand wires cannot be altered or
             duplicated. ...
     
        Bodell's Last statement is incorrect.
     
        Tasks for EASILY counterfeiting Wiegand wire cards are
     
        1    Locate the wires inside the card to read the 0s and 1s.
     
        2    Build an ACCEPTABLE copy of the card.
     
        Bodell's clear explanation of the working of a Wiegand card can
        be visualized
     
             zero row    |     |   |
     
             one row        |          |
     
             binary      0  1  0   0   1
             representation
     
        Solutions to Task 1
     
             A    X-ray the card
     
             B    MAGNI VIEW FILM,  Mylar film reads magnetic fields ...
                  Edmunds Scientific Company, catalog 16N1, page
                  205, C33,447  $11.75
     
        is placed over the top of the Wiegand card.
     
        COW MAGNET,  Cow magnetics allow farmers to trap metal in the
        stomachs of their cows.  Edmunds, page 204, C31,101 $10.75
        is placed under the card.
     
        Location of the wires is easily seen on the green film.
     
        Mark the position of the wires with a pen.
     
        Next chop the card vertically using a shear into about 80/1000s
        paper-match-sized strips.
     
        Don't worry about cutting a wire or two.
     
        Note that a 0 has the pen mark to the top.  A 1 has the pen mark
        at the bottom.
     
        Take a business card and layout the "paper match"-like strips to
        counterfeit the card number desired.
     
        Don't worry about spacing.  Wiegand output is self-clocking!
     
        Tape the "paper-match - like" strips to the business card.
     
        Only the FUNCTION of the card needs to be reproduced!
     
                                     History
     
        Breaking electronic locks was done as "work for others" at Sandia
     
        National Laboratories beginning in 1992 funded by the Federal
        Bureau of Investigation/Engineering Research Facility, Quantico,
        VA.
     
        The FBI opined that this work was SECRET/NATIONAL SECURITY
        INFORMATION.
     
        Details of the consequences of this work are covered in
     
             Fired Worker File Lawsuit Against Sandia
             Specialist Says He Balked When Lab Sought Electronic
             Picklock Software, Albuquer Journal, Sunday April 25, 1993
     
             State-sanctioned paranoia,  EE Times, January 22, 1996
     
             One man's battle,  EE Times, March 22, 1994
     
             Damn the torpedoes,  EE Times, June 6, 1994
     
             Protecting properly classified info,  EE Times, April 11,
             1994
     
             DOE to scrutinize fairness in old whistle-blower cases,
             Albuquerque Tribune, Nov 7 1995
     
             DOE boss accelerates whistle-blower protection,  Albuquerque
             Tribune, March 27, 1996
     
             DOE doesn't plan to compensate 'old' whistle-blowers with
             money, Albuquerque Tribune September 27, 199





From ravage at EINSTEIN.ssz.com  Wed Sep 30 06:51:49 1998
From: ravage at EINSTEIN.ssz.com (Jim Choate)
Date: Wed, 30 Sep 1998 21:51:49 +0800
Subject: Data Haven mailing list is active again...
Message-ID: <199810010254.VAA16520@einstein.ssz.com>




Welcome to the Data Haven Mailing List

This list was originaly created by Douglas Floyd in order to focus
discussion and development on Data Haven technology. In late 1998 The
Armadillo Group took the list over since it was related to several current
lists that we support.

A data haven is a system that integrates cryptography, electronic funds
transfer, long term data storage, anonymous remailers, and usenet style news
mechanisms. The idea is that any two or more parties can participate in
providing services and information in an anonymous environment that supports
cryptographicly secured transactions. There are several architectures though
the only known operating data haven was Black Net. This was an experiment by
Tim May which examined the potential of anonymous transactions related to
sensitive information and potentialy illegal activities via usenet. It was
demonstrated successfuly.

If you would like to subscribe send majordomo at ssz.com a message with a blank
title and the body consisting of only:

subscribe dh-l

You should recieve a verification email and subsequent traffic. We hope to
provide a archive of the lists traffic, though there really hasn't been a
lot of it.

If you are interested in this sort of technology then consider subscribing
to one of the cypherpks CDR nodes as well as other more specialized lists.
The cypherpunks are focused on cryptography and its implimentation and
disimination, economic uses and impact of technology, and civil liberties.
It is a *VERY* high traffic international mailing list.

If you should have any problems please e-mail list at ssz.com for further help.






From nobody at replay.com  Wed Sep 30 07:03:09 1998
From: nobody at replay.com (Anonymous)
Date: Wed, 30 Sep 1998 22:03:09 +0800
Subject: No Subject
Message-ID: <199810010255.EAA05178@replay.com>



Why, if the ignition-controllers of cars are 
CPUs, aren't cars theftproof without a 
crypto-token?



David Honig
Irvine Design Teleoffice






From ravage at EINSTEIN.ssz.com  Wed Sep 30 07:09:43 1998
From: ravage at EINSTEIN.ssz.com (Jim Choate)
Date: Wed, 30 Sep 1998 22:09:43 +0800
Subject: Forwarded mail...
Message-ID: <199810010311.WAA16871@einstein.ssz.com>



Forwarded message:

> Date: Thu, 1 Oct 1998 04:55:13 +0200
> From: Anonymous 

> Why, if the ignition-controllers of cars are 
> CPUs, aren't cars theftproof without a 
> crypto-token?

Some cars now use a smart-key that is unique for each vehicle, though I'm
sure there are 'master keys'.

What a cool way to do rental cars.... insert your smart-card and it
activates and charges your account until reset by the rental agency on
return to a distributed system of drop-off points.

I noticed the other day we now have a washateria down on Guadalupe in the
old Antone's Club building that operates only by smart-card, no cash sign
right on the front door. There's a perfect application for something like
GNU/cash with a crypto/e$ module.


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage at ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------





From nobody at sind.hyperreal.art.pl  Wed Sep 30 07:16:48 1998
From: nobody at sind.hyperreal.art.pl (HyperReal-Anon)
Date: Wed, 30 Sep 1998 22:16:48 +0800
Subject: Increase Your Paycheck Next Week
Message-ID: 



Hello, asshole:

I'd just like to suggest that you fuck yourself with a large metal hook in
all bodily cavities. As you are bleeding out, pour 12M nitric acid in your
wounds and feel the burn. If you are still conscious, superglue your little 
finger in a centrifuge and turn it on at maximum speed. If you are still
conscious, stick your head into a liquid nitrogen bath. All your coworkers
should repeat this procedure.

As an alternative, you can tie any coworkers you have up and bathe them in 
concentrated nitric acid while you shower them in NH4OH. Place your penis in
liquid nitrogen and then attempt to jack off. Finally, drink a concentrated
hydrochloric acid solution followed by concentrated sodium hydroxide
solution. In the unlikely event that you are able to do so, scream 'I AM THE
MASTER OF THE UNIVERSE!' over and over again while dancing until you pass out.

I wave to Interpol.

Hey Louis! What's shaking?

-------------------------------------------------------------------------------
Forwarded spam:
-------------------------------------------------------------------------------

Received: (from ichudov at localhost)
	by www.video-collage.com (8.8.5/8.8.5) id MAA01379
	for cypherpunks-outgoing; Wed, 30 Sep 1998 12:03:54 -0400 (EDT)
Received: from sirius.infonex.com (sirius.infonex.com [209.75.197.2])
	by www.video-collage.com (8.8.5/8.8.5) with ESMTP id MAA01367
	for ; Wed, 30 Sep 1998 12:03:48 -0400 (EDT)
Received: (from cpunks at localhost) by sirius.infonex.com (8.8.8/8.8.8) id JAA20785; Wed, 30 Sep 1998 09:07:02 -0700 (PDT)
Received: from cyberpass.net (cyberpass.net [209.75.197.3]) by sirius.infonex.com (8.8.8/8.8.8) with ESMTP id JAA20767 for ; Wed, 30 Sep 1998 09:06:56 -0700 (PDT)
Received: from 152.202.71.131 (202-71-131.ipt.aol.com [152.202.71.131]) by cyberpass.net (8.8.8/8.7.3) with SMTP id JAA07148 for ; Wed, 30 Sep 1998 09:08:07 -0700 (PDT)
Date: Wed, 30 Sep 1998 09:08:07 -0700 (PDT)
From: 2001files at usa.net
Message-Id: <199809301608.JAA07148 at cyberpass.net>
To: cypherpunks at cyberpass.net
Reply-To: business_ideas at usa.net
Subject: Increase Your Paycheck Next Week
Sender: owner-cypherpunks at Algebra.COM
Precedence: bulk
X-Mailing-List: cypherpunks at algebra.com
X-List-Admin: ichudov at algebra.com
X-Loop: cypherpunks at algebra.com
Status: RO
X-Status: 


Would you like to get a pay raise next week without asking your boss?   Then this very special report, "Money Power," is for you!

If you have a regular job - not working in your own or a family business - and you get a regular paycheck, we can show you how you can give yourself a HUGE RAISE in your very next paycheck.  At least between 20% - 30% more than what you are getting now.  Yes, your paycheck will be increased substantially!

	* Example:  If your take home pay is $400 net per week, you can take home $440 - $500 the very next week and every week thereafter!

No Gimmicks!  Everything is perfectly legal.

"Money Power" is written in three parts:

	*Part I - shows you exactly what to do so you can give yourself a raise in your next paycheck.  You decide how big a pay raise you want to give yourself!

	*Part II -  shows you how to protect yourself, your family, your home, and your assets without paying big money -- just $85 per year to legally protect your liability 100% against bill collectors and debts.

	*Part III - shows you how you can legally deduct household expenses - utilities, gardener, supplies, repairs, and more from your income taxes.  Absolutely No Gimmicks!  Everything is legal.

This is NOT a "get rich quick" scheme or some other scam.  We are sure you have seen lots of them.  And this is NOT a "tax protester" who refuses to pay income taxes.  The author of this report pays taxes every year - of course, as little as legally possible.  It's our opinion it is not good to zero out completely.  But, you can - it's your choice.

Using the methods in this report, the rich become richer.  And poor people become poorer when they don't take advantage of these techniques.  Your chances of being audited by the IRS - just for using these methods - are near zero.

	* We are so sure "Money Power" will work for you, here is our risk-free guarantee.  If you don't get at least 100 times more money in your paycheck in one year than the cost of this report, we will double your money back!  How's that for a guarantee?
                      ---------------------------------

Now, here's one more offer you will find hard to refuse.  We have a Reseller Program whereby you can make money selling this report.  When you purchase "Money Power," you will also get 1,000 FREE places to advertise on the Internet!  If you want to make some extra money - $500, $1,000 or more - just post ads on those sites and have the orders come to you.  For every order you send us, we will pay you $5.00:
	*You don't need a merchant account to process orders!  We do that.
	*You don't have to warehouse any inventory!  We do that.
	*You don't have to ship any merchandise.  We do that.
All you have to do is send us the orders.  We'll process checks, money orders, and credit cards and we will pack and mail the report.  And you get paid twice a month - on the 15th and the 30th!
                     ------------------------------------



And, listen.  America is a free country.  If you don't want an increase in your paycheck, that's fine.  And if you don't want to know how to protect your family, that's OK, too.  And if you don't want to save money on taxes, that's quite all right.  You are living in a free country.

But, if you need money - more money in your paycheck, act right now!  

The author of this report used to work for Corporate America earning over $100,000 a year.  After paying almost 40% in Federal taxes, 6.2% for Social Security, 1.45% for Medicare, 1.5% for the unemployment fund, and 3% for his employee benefits, he would bring home less than half of his yearly salary!  And then there was state income tax to pay!   He decided he had to do something so he could keep all the money!

"Money Power" is the result of the author's frustration and aggravation with the system and the research he did to change his situation.  These are methods they don't teach you in school!

It can't get much better than this.  This is a once in a lifetime opportunity because you may not receive this message again.  And you know how it is with opportunities ..... if you pass on one, you are not entitled to another for a long time.


Don't Delay!  The longer you wait to order, the longer you will wait for your raise!!!!


	>>>>>>>>>>>>> Please Note:  This report is for U.S. Citizens and Green Card holders only!  This program will not work for illegal immigrants or foreigners.<<<<<<<<<<<<

---------------------------------------------------------------------------

Here's how to order:

*****To order online, click on your reply button and type ORDER ONLINE in the subject line and we will e-mail you the online order form.

                             OR

Print out the convenient order form below NOW and mail it to:

	World Net Press
	Dept. EN-930
	P.O. Box 96594
	Las Vegas, NV 89193-6594
	
Payment Method:  
_____ Check     
_____ Money Order
_____ Visa
_____ MasterCard
_____ American Express
_____ Discover

_____ Yes, I want to order my copy of  "Money Power".  Price is $9.95 + $3.95 S/H = $13.90 and my order will be shipped by 1st Class Mail.   

Name_________________________________________________________________________

Address______________________________________________________________________

City/State/Zip_______________________________________________________________

Daytime Phone (__________)___________________________________________________

E-Mail Address_______________________________________________________________

Credit Card #_____________________________________________ Exp. Date_________

Cardholder Name (as it appears on the card)__________________________________

(Please make sure you include your phone number and e-mail address in case we have a question about your order.  Your credit card billing will reflect Road to Wealth, Inc.)



**************************************************************************
We are currently consolidating our mailing lists and need to update our database.  Our records indicate you may have inquired in the past. If this message has reached you in error, or the information is not correct, please accept our apology.  Follow the instructions below to be removed and we will honor your request.  We do not knowingly engage in spam of any kind.

Please click on your reply button and type REMOVE in the subject line only.  The software reads only the subject line, not the body of the message.
**************************************************************************

Please be advised we collect the e-mail addresses of all flamers, hackers, and users of abusive and vulgar language.  We submit these addresses to the FBI and Interpol on a monthly basis.  









From Announcements_reply at rpkusa.com  Wed Sep 30 23:22:01 1998
From: Announcements_reply at rpkusa.com (Jack Oswald / CEO / RPK Security)
Date: Wed, 30 Sep 1998 23:22:01 -0700 (PDT)
Subject: ANNOUNCEMENT: RPK SECURITY AWARDED PATENTS FOR ENCRYPTONITE ENGINE IN U.S. AND NEW ZEALAND
Message-ID: <199810010614.XAA03563@proxy3.ba.best.com>


You have received this message because at some time in the past your name was submitted to our e-mail mailing list database.  If you do not wish (or no longer wish) to receive announcements, updates and news concerning the RPK Encryptonite Engine or the RPK InvisiMail e-mail security products, please forward this message to remove at rpkusa.com

-----------------------------------------------------------------------

MEDIA ALERT

CONTACT
Paula Miller						Lyn Oswald
Nadel Phelan, Inc.					RPK Security Inc.
408-439-5570 x277					212-488-9891
paulam at nadelphelan.com				lynoswald at rpkusa.com	


RPK SECURITY AWARDED PATENTS FOR ENCRYPTONITE ENGINE IN U.S. AND NEW ZEALAND

SAN FRANCISCO, CA. September 15, 1998 - RPK Security, Inc., a technology leader in fast public key encryption, today announced that the technology behind the company's uniquely fast public key cryptosystem, the RPK Encryptonite Engine, was awarded U.S. patent number 5,799,088 on August 25, 1998 and New Zealand patent number 277,128 on August 17, 1998.
 
Based on the proven mathematics of Diffie-Hellman Key Exchange, the RPK Encryptonite Engine combines all the benefits of other public key systems (authentication, digital signatures and digital certificates) with the speed of a secret key system into one algorithm. With the superior performance offered by RPK's Encryptonite Engine, applications requiring streaming data, sound, video or large numbers of transactions, such as credit card payments, receive instantaneous responses and secure communication links.

"We believe these patents give us a significant, unique and enforceable competitive advantage over other providers of public key encryption products," said Jack Oswald, president and CEO of RPK Security. "The RPK patents confirm our technology leadership in strong and fast public key cryptography."

With development and distribution facilities outside of the U.S., RPK Security is able to provide its customers with a worldwide strong encryption solution that is available globally, unlike competing products that are restricted by U.S. export regulations. 

ABOUT RPK SECURITY
Founded in 1995, RPK Security, Inc. is a technology leader in fast public key cryptography.  Its flagship RPK Encryptonite� Engine, a uniquely fast and strong public key encryption technology, is available worldwide in custom hardware and software toolkits on multiple platforms.  Developed from widely accepted security mathematics and techniques, the RPK Encryptonite Engine is easily embedded into new and existing hardware and software applications.  RPK's cryptographic research and product development is based in New Zealand, Switzerland and the U.K, with worldwide sales and marketing operations in San Francisco, CA.  Visit RPK's website at www.rpkusa.com or call (212) 488-9891.





From tcmay at got.net  Wed Sep 30 09:31:43 1998
From: tcmay at got.net (Tim May)
Date: Thu, 1 Oct 1998 00:31:43 +0800
Subject: New California Spam Law is Bullshit
In-Reply-To: <199809301608.JAA07148@cyberpass.net>
Message-ID: 



At 6:43 PM -0700 9/30/98, Max Inux wrote:
>On Wed, 30 Sep 1998 2001files at usa.net wrote:
>
>Dear spammer,
>
>Nice threats are attached to this spam.  I love new ideas from the
>spamming community. Please be aware by not  including a real human email
>address (specifically stated) and a 1800 number to call to be removed,
>you are in violation of California law.

Think twice before citing this new law....

Whatever one thinks about unsolicited e-mail, the provisions of this new
California bill are frightening to any supporter of liberty.

* the requirement that mail have a "real" name attached to it runs afoul of
the right to anonymous messages, supported in various cases (Talley, for
example). A requirement that e-mail be identified is no different from a
requirement that pamphlets and articles have "real" names on them. So much
for the First Amendment.

(Oh, and the _commercial_ nature of UCE has nothing to do with the First
Amendment issues, unless one thinks the canonical First case, Sullivan, is
meaningless because the New York Times was "commercial speech.")

* think of the implications for anonymous messages, through remailers

* and where does the "must have a toll-free number" bullshit come from?
Think about it. It may sound _nice_ to demand that people have toll-free
numbers, but where is the constitutional support for such a taking?

And so on.

--Tim May

Y2K: A good chance to reformat America's hard drive and empty the trash.
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.







From mgering at ecosystems.net  Wed Sep 30 10:52:35 1998
From: mgering at ecosystems.net (Matthew James Gering)
Date: Thu, 1 Oct 1998 01:52:35 +0800
Subject: GPL & commercial software, the critical distinction (fwd)
Message-ID: <33CCFE438B9DD01192E800A024C84A1928471C@mossbay.chaffeyhomes.com>



Jim Choate wrote:
> No Netscape on NT or 95/98 is no where near as stable as 
> on a Linux or Solaris box (the two that I use most).

Correct me if I am wrong or if this has changed since they went
open-source, but AFAIK Mozilla's Windows and Unix codebases were
entirely independent and separately developed, so I'm not sure what
conclusions you can draw from that.

> Yep, that explains why my NT's have to be rebooted almost daily 
> because of various issues and my various unix boxes go for weeks

Again, let's leave the OS wars off this list. I've had NT machines up
for several months and down only for patches and upgrades.

But Netscape pissed me off so severely during the version 2.x plethora
of releases with their alpha-quality javascript that I've not used it
since, so I cannot comment on its current [in]stability.

	Matt





From mgering at ecosystems.net  Wed Sep 30 11:32:45 1998
From: mgering at ecosystems.net (Matthew James Gering)
Date: Thu, 1 Oct 1998 02:32:45 +0800
Subject: GPL & commercial software, the critical distinction (fwd)
Message-ID: <33CCFE438B9DD01192E800A024C84A1928471D@mossbay.chaffeyhomes.com>



Jim Choate wrote:
> > Lightly? You jest.
> 
> No I don't. I can start a business for as little as $15 to 
> register a DBA and I don't need licenses or other sorts of 
> regulatory permissions.

And you would be stupid to expose yourself to full liability.

Regulation includes much more than licensing and registration. Try
hiring a couple employees, paying freelance individuals, setup office
space, get yourself a company car and do your fed income taxes. Lightly
regulated my ass. If they enforced every word of every code strongly and
literally it would be nearly impossible to conduct business.

> No we shouldn't. The fact that monopolies can exist in this 
> lightly regulated economy is ample evidence

Bullshit, monopolies exist because of the regulation.
 
> If you seriously think this is a heavily regulated market you 
> should do more research into such places as Nazi Germany, 
> Russia, China, etc.

Bullshit again, there is a *big* difference between a regulated market
(mixed capitalist/socialist economy) and a command economy. So because
we don't live in Soviet Russia we should all bend over and take it?

> Monopolies are monopolies, claiming that they will be less 
> abusive in a regulated market than in a free-market just 

Coercive power takes form via regulation. Without it a bad monopoly is a
short-lived one.

> You are claiming that if we do away with the food 
> regulations that McDonalds will be *more* concerned 
> about their meat being cooked thoroughly then you

Liability, liability, liability. Regulation often promotes bad practice
as businesses comply with minimum regulation and nothing more instead of
thinking for themselves. What is worse is government often shields
companies from liability.

> If a market monopolizes there is *NO* competition.

How do you prevent potential competition? Monopoly means both the
absence of existing and potential competition and alternatives.

> If the market is one that takes a large investment in 
> intellectual or capital materials then there
> won't be any opportunity to even attempt to start a 
> competitive venture.

A fluid capital market can finance even the largest of ventures if the
potential return is there. Different markets have different time
schedules, but competition can and will come.

Intellectual Property enforcement is an act of government, it is a force
monopoly, only just and reasonable IP laws limit it. Notice that, bad
laws = bad monopoly, good laws = balanced environment, no laws = no
monopoly. The last of which is not necessarily preferable in this case,
and is a fundamental difference in laissez-faire Vs anarchy.

> Fairness is about the consumer, not the manufacturer.

You have an odd definition of fair. You cannot have fair for the benefit
of one at the expense of another.

> Contractual with who?

With whomever is a part of the framework.

> > reputation for punishment instead of life and liberty, 
> 
> Businesses are neither alive nor do they enjoy liberty. Don't 
> confuse people with systems and objects.

No, do not strip the person from the businesses. A group of people do
not lose any of the rights and liberty of a single individual, neither
do they gain any. Businesses are people.

Commerce is a fundamental right, in order to survive you must be able to
create and dispose of that creation. The lack of the *individual's*
right to freely and easily pursue any and all business pursuits to any
degree is an act of enslavement of the individual to corporate
aristocracy and bureaucratic whim.

	Matt





From bill.stewart at pobox.com  Wed Sep 30 12:28:37 1998
From: bill.stewart at pobox.com (Bill Stewart)
Date: Thu, 1 Oct 1998 03:28:37 +0800
Subject: New California Spam Law is Bullshit
In-Reply-To: 
Message-ID: <3.0.5.32.19981001011605.00821e50@idiom.com>



At 10:06 PM 9/30/98 -0700, Tim May wrote:
>Think twice before citing this new law....
>Whatever one thinks about unsolicited e-mail, the provisions of this new
>California bill are frightening to any supporter of liberty.

Yeah - they aren't totally evil bills, in the sense that one shouldn't
ascribe to malice that which can be adequately explained by stupidity,
but they're both pretty bad, as well as vague and unclear.
On the other hand, if you're not willing to go to Sacramento to help
them make sausages, the way the anti-spammers are, it's harder to
justify bitching about the quality of sausage they're shoving down your throat.

>* and where does the "must have a toll-free number" bullshit come from?
>Think about it. It may sound _nice_ to demand that people have toll-free
>numbers, but where is the constitutional support for such a taking?

More precisely, Bowen's bad bill requires you to establish either a
toll-free number or sender-operated email address, and include on your
unsolicited commercial fax or email the toll-free number or an address 
to which the recipient can write or email.  Less precisely, it doesn't
say that the number has to be toll-free IN CALIFORNIA, or that you have to
answer calls to the phone number.

Both bills have serious problems with banning anonymity, and with clearly 
identifying when they apply, given the combinations of recipient, sender, 
recipient's ISP, recipient's email mailbox, sender's ISP, telecom provider, 
and probably other physical and corporate entities that can either be
inside or outside California - or both - with or without knowledge of the
sender, and with asserting jurisdiction over non-California-based senders,
and asserting that jurisdiction based on factors the sender may not know.

And then there's the lovely definition of "published" in one of the bills -
it applies if you violate the ISP's published anti-spamming policy.
They're (correctly) not required to _have_ an anti-spamming policy,
but if they have one, you're required to obey it if it's published,
either by putting it on their web page (pointed to from their home page),
or "available by mail for free on request".  Of course, if they don't
*have* a policy, they're under no obligation to send you a timely
printed version by snail-mail, so even leaving out the undue burden
of determining who a recipient's email provider and ISP are,
and determining whether they have an anti-spamming policy,
and what if means, you can't safely send your fine commercial
solicitation to lucky recipients whose ISPs *don't* have an 
anti-spam policy on their web page, because it might only be on paper.

On the other hand, you can send your spam from a spamhaus,
and if I read the bill correctly, the spamhaus is safe,
and probably the sender is also, especially if they're both
outside of California.  So it's not much protection against spammers.
(The language about policies of the recipient's ISP is vaguer,
and has more risk of legal weakness because there's no
legal contract between the sender and the recipient's ISP.)

Then of course, who really _sent_ the mail?  An anonymous user
of a spamhaus?  (That bad, bad person!)  What if he paid digicash,
or walked in and paid cash for an account?  What if it's not "he",
but "it", a corporation that got set up for $50, used for spamming,
and then obeys the laws by never spamming any complainers again, 
though its owners can start a new corporation the next day and burn it too,
perhaps even starting it off by selling it the list of complainers...




				Thanks! 
					Bill
Bill Stewart, bill.stewart at pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From ben at algroup.co.uk  Wed Sep 30 13:28:40 1998
From: ben at algroup.co.uk (Ben Laurie)
Date: Thu, 1 Oct 1998 04:28:40 +0800
Subject: propose: `cypherpunks license' (Re: Wanted: Twofish source code)
In-Reply-To: <199809281845.TAA18662@server.eternity.org>
Message-ID: <36134ACF.A09E1263@algroup.co.uk>



Richard Stallman wrote:
> It isn't surprising that people who want to write non-free software
> are disappointed that the GNU project won't help them.  What is
> amazing is that they feel this is unfair.  They have no intention of
> letting me use their source code in my programs--so why should they be
> entitled to use my source code in their programs?  These people seem
> to think that their selfishness entitles them to special treatment.

a) Who ever said this was unfair?

b) Several of the people who are complaining are about the GPL are not
people who want to use GPLed software, but people who want to release
their software under a free licence and think GPL isn't the right one.

c) In my experience GPL stops many companies from even considering using
code. A less restrictive licence gets it through the door, and they
later come to understand the benefit of freeing the source, even though
they are not obliged to. OK, so sometimes we lose under this scheme, but
sometimes we gain. 

d) As far as I can work out, someone who wants to free part of a
product, but not all of it, can't practically do so under GPL.

Cheers,

Ben.

-- 
Ben Laurie            |Phone: +44 (181) 735 0686| Apache Group member
Freelance Consultant  |Fax:   +44 (181) 735 0689|http://www.apache.org/
and Technical Director|Email: ben at algroup.co.uk |
A.L. Digital Ltd,     |Apache-SSL author     http://www.apache-ssl.org/
London, England.      |"Apache: TDG" http://www.ora.com/catalog/apache/

WE'RE RECRUITING! http://www.aldigital.co.uk/





From nobody at replay.com  Wed Sep 30 13:53:17 1998
From: nobody at replay.com (Anonymous)
Date: Thu, 1 Oct 1998 04:53:17 +0800
Subject: Why is the world not perfect?
Message-ID: <199810010850.KAA00389@replay.com>



Anonymous wrote:
> Why, if the ignition-controllers of cars are
> CPUs, aren't cars theftproof without a
> crypto-token?

The bastards (a term which collectively includes insurance companies,
police, car manufacturers and a host of others) make vast amounts of
money on the basis that your car is stolen regularly.

Scheduled Disasters are good for business. Whoever it was who had the
idea for a Y2K bug is currently minting it.





From brownrk1 at texaco.com  Wed Sep 30 14:47:22 1998
From: brownrk1 at texaco.com (Brown, R Ken)
Date: Thu, 1 Oct 1998 05:47:22 +0800
Subject: propose: `cypherpunks license' (Re: Wanted: Twofish source code)
Message-ID: <896C7C3540C3D111AB9F00805FA78CE2013F8468@MSX11002>



My computer alleges that  Derek Atkins[SMTP:warlord at MIT.EDU] wrote:


> The big issue I see with GPL and Crypto software is that with the
>  GPL you cannot add any redistribution restrictions.  The problem 
> is that due to the United States export rules, I cannot export 
> Crypto software, which means I must legally put a restriction on 
> any Crypto code I write.  But, this is a "further restriction" as far
> as the GPL is concerned.  This, in turn, means I cannot use the 
> GPL for Crypto software.

Surely the way round this is to take the "batteries not included" route?
Just use GPLed libraries or standalone modules. Or write your code in such a
way that some modules are GPLed and some aren't. Sell your modules & tell
people that they will need to get the GPL stuff through "normal channels".  

Of course, once outside the USA you are safe. Nobody *outside* the US cares
much about your export restrictions or absurd ideas about patenting software
anyway - although in many European countries, and certainly in UK, we take
copyright a lot *more* seriously than you. Copyright is widely seen as a
right, something that naturally belongs to the author or artist. In French
law they even talk about right of "paternity" in a text (part of "Droit
Moral")  even if you assign copyright to another person you are still
allowed to veto changes in it, your right is seen as inalienable, like  the
rights you have to your own person - copyright is part of personality, not
property. (This has been partly imported into English law as a a right to be
identified as the author, which has to be asserted, which you now nearly
always do). In France but not in England they also recognise the right to
withdraw a work  (although for some reason Stanley Kubrick seems to have
been able to withdraw the Clockwork Orange film in England, I don't
understand how) and the right of access to a work (an artist is allowed
access to a painting which has been sold to someone else). These things are
seen as part of personality. Just as in the US the law won't allow you to
sell yourself permanently to someone else (i.e. no slavery, even voluntary
slavery) but only rent yourself out  (employment) so in most of Europe you
can't really "sell" copyright, only rent it out.  But patents are to some
extent seen as government interference, as licensed monopoly. They tend to
be unpopular with everyone (except lawyers, inventors and pharmecutical
companies of course).

I suspect there are a lot of people who would have moral problems with
breaking someone else's software copyright but wouldn't give a dam about
breaking a software patent. An algorithm is an idea, and how can anyone own
an idea? (I'm talking morals here, not law - intersecting universes of
discourse, but not identical ones :-)

Ken Brown (and not his employers who respect patents greatly and would sack
me if I broke them at work. After all they own an awful lot of them...)





From ravage at EINSTEIN.ssz.com  Wed Sep 30 16:41:19 1998
From: ravage at EINSTEIN.ssz.com (Jim Choate)
Date: Thu, 1 Oct 1998 07:41:19 +0800
Subject: I thought of an initialy regulated industry!...
Message-ID: <199810011243.HAA18113@einstein.ssz.com>



Hi,

In regards the discussion about regulation and industry. I can think of only
one industry that was regulated before the very first company opened their
doors for business....nuclear power plants.

Personaly, 3 Mile Island in a un-regulated industry scares the hell out of
me...and I support nuclear power. Look at the fiasco of Chernobyl in a
control market.

I'd like to hear from any free market mavens who might want to use the
nuclear industry as an example of how things could be so much better with no
regulation regarding construction, operation, or waste disposal.

"Hey Sammy, just through those spent pellets in with the trash, those stupid
trash people don't know nothing...."


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage at ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------





From ravage at EINSTEIN.ssz.com  Wed Sep 30 16:41:35 1998
From: ravage at EINSTEIN.ssz.com (Jim Choate)
Date: Thu, 1 Oct 1998 07:41:35 +0800
Subject: GPL & commercial software, the critical distinction (fwd)
Message-ID: <199810011237.HAA18025@einstein.ssz.com>



Forwarded message:

> From: Matthew James Gering 
> Subject: RE: GPL & commercial software, the critical distinction (fwd)
> Date: Wed, 30 Sep 1998 23:49:10 -0700

> > No Netscape on NT or 95/98 is no where near as stable as 
> > on a Linux or Solaris box (the two that I use most).
> 
> Correct me if I am wrong or if this has changed since they went
> open-source, but AFAIK Mozilla's Windows and Unix codebases were
> entirely independent and separately developed, so I'm not sure what
> conclusions you can draw from that.

I'd say the obvious one, the Unix code tree is more stable than the MS tree.

> Again, let's leave the OS wars off this list. I've had NT machines up
> for several months and down only for patches and upgrades.

As I have, but at nowhere near the load level that Unixes can support.
To get even near-mark performance requires larger hard drives, faster
processors, and way more ram (2x or more in many cases).


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage at ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------





From ravage at EINSTEIN.ssz.com  Wed Sep 30 16:47:27 1998
From: ravage at EINSTEIN.ssz.com (Jim Choate)
Date: Thu, 1 Oct 1998 07:47:27 +0800
Subject: GPL & commercial software, the critical distinction (fwd)
Message-ID: <199810011234.HAA17960@einstein.ssz.com>



Forwarded message:

> From: Matthew James Gering 
> Subject: RE: GPL & commercial software, the critical distinction (fwd)
> Date: Thu, 1 Oct 1998 00:30:14 -0700 

> And you would be stupid to expose yourself to full liability.

No, being a single proprietorship isn't stupid. It may not be something you
like but it isn't stupid. I will agree that depending on the size and type
of business it isn't always the best way, but then being a multi-national
incorporation isn't the best way to do local contract work for SOHO's (for
example) either.

> Regulation includes much more than licensing and registration. Try
> hiring a couple employees,

As long as it's only two I don't have to worry about federal regulations and
such, they only kick in when I hire 3 or more.

> paying freelance individuals,

Hand them their 1099's and they're out the door. I just pay them whatever I
agreed (gross before taxes) and the 1099 is *their* promise to deal with the
taxes.

> setup office space,

Sign a lease and wallah.

> get yourself a company car

All I need for that is a DBA, can even open bank accounts and get credit
cards in the company name with nothing but a DL and that DBA.

> and do your fed income taxes.

As a single proprietorship I do my taxes the same old way I always did them
except I must include the SE documents which only add a few pages. If I do
the contract work via 1099's (which says that the contractor is responsbile
for the taxes on that income) all I have to show is the gross amount paid to
that contract person.

> If they enforced every word of every code strongly and
> literally it would be nearly impossible to conduct business.

No, it wouldn't. For example I do contract work for small office - home
office companies (generaly 10 or less employees total). I write software,
install software, train, repair hardware, do upgrades, etc. and there are
literaly NO regulations at any level on those activities outside those
imposed by 1099's for sub-contractors (who work their own hours and must
provide their own tools) and the contract I and the customer agree to.
If I buy something for a customer I pass the receipt along to them and get
reimbursed for my time (on a seperate receipt) and the exact amount for the
items purchased (I am acting as their agent and not a reseller) so I don't
even need a tax number technicaly (since I don't pay state sales tax on
labor costs and am not selling them the items purchased). All I need is a
$15 DBA and a bunch of blank 1099's.

Why do cities and states require licenses on such things as air conditioning
or auto mechanics? Because for years there were no licenses required and
anybody could do it. After enough decades of scam artists, poorly run
business who cost customers money because they went out of business without
doing the work, or they did sub-standard (as defined by the practitioners of
that activity) work.

I challenge you to find an example where a state or federal regulation was
imposed before the industry matured.

> Bullshit, monopolies exist because of the regulation.

No, monopolies exist because people are greedy and want to own everything.
History is full of examples where industries were unregulated (ever read
Upton Sinclair?) and abused the employees and the market and as a result
regulation was imposed. It's interesting that free-market mavens never seem
to mention that the vast majority of monopoly examples occured *before*
industry regulation was imposed.

Even in the Microsoft case, it's only now that they've grown so big and
become so porous about information that the government has stepped in and
begun asking "has the industry matured to the point where continued
non-regulation is a detriment because it allows hording of industry
resources?"

Even if we were to de-regulate the clothing industry for example it is
highly unlikely that child labor and sweat shops would become less
prevalent. Of course I'd like to see your evidence to the contrary.

"Those who don't understand history are doomed to repeat it"

                                       Santyana

> Bullshit again, there is a *big* difference between a regulated market
> (mixed capitalist/socialist economy) and a command economy. So because
> we don't live in Soviet Russia we should all bend over and take it?

A regulated market is something that has regulation imposed from the
outside (ie besides the supplier and consumer). There are certainly
different kinds of regulated economies just like there are different kinds
of mammals. But to say that Zebra's aren't mammals because they don't look
like an Aardvark is a dis-serivice.

You, and every other free-market maven, have yet to demonstrate with
historical example that free-market works.

> Coercive power takes form via regulation. Without it a bad monopoly is a
> short-lived one.

Tell that to the rail-roads of the mid to late 1800's, the meat packing
industry of the late 1800's and early 1900's. The sweat houses of the
garment industry since the early 1800's, etc.

No sir, history doesn't support your proposition at all.

> Liability, liability, liability. Regulation often promotes bad practice
> as businesses comply with minimum regulation and nothing more instead of
> thinking for themselves. What is worse is government often shields
> companies from liability.

See above examples. Hell, take a look at the wet pet food market now for a
perfect example of why non-regulation is a bad thing and why liability and
other such buzz words don't work in the real world. And you were wondering
why your little toodles was loosing her hair, was always excited and
aggitated and has the health of a pet 3-4 years older than the chronological
age...

Bottem line, in a free market (no regulation other than consumer and
supplier) there are no controlling mechanisms and no recourse for the
consumer because they have nothing to demonstrate even an implied warranty
or liability of manufacturer (read software licenses to see how this can be
side stepped easily, hint: imagine a software license on the side of a can
of beans.).


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage at ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------





From mok-kong.shen at stud.uni-muenchen.de  Wed Sep 30 17:18:24 1998
From: mok-kong.shen at stud.uni-muenchen.de (Mok-Kong Shen)
Date: Thu, 1 Oct 1998 08:18:24 +0800
Subject: propose: `cypherpunks license' (Re: Wanted: Twofish source co	de)
In-Reply-To: <896C7C3540C3D111AB9F00805FA78CE2013F8468@MSX11002>
Message-ID: <36137FFC.E0A860AB@stud.uni-muenchen.de>



Brown, R Ken wrote:
> 
> I suspect there are a lot of people who would have moral problems with
> breaking someone else's software copyright but wouldn't give a dam about
> breaking a software patent. An algorithm is an idea, and how can anyone own
> an idea? (I'm talking morals here, not law - intersecting universes of
> discourse, but not identical ones :-)

But sadly in matters of law there are software patents and particularly
in cryptography. One may have different opinions on crypto patents
and endlessly debate on them. My personal opinion is that the
benefits of crypto patents do not outweigh their negative impacts
on the development and use of cryptography especially in view of 
the fact that a number of governments intend to suppress civilian 
usage of strong crypto with all means that they can think of.

I think that claiming copyright is a good idea, since one retains
some kind of control over the stuff that one creates. One can then 
say that copying is allowed for certain usages but disallowed in 
others. (As far as I know copying some pages from a book, but not
the whole, for scientific purposes is free generally.) 

M. K. Shen





From ravage at EINSTEIN.ssz.com  Wed Sep 30 18:13:09 1998
From: ravage at EINSTEIN.ssz.com (Jim Choate)
Date: Thu, 1 Oct 1998 09:13:09 +0800
Subject: crypto on /.
Message-ID: <199810011413.JAA18337@einstein.ssz.com>



Forwarded message:

> X-within-URL: http://slashdot.org/

>    Senate considering Tax-Free Net Bill The Almighty Buck Posted by Hemos
>    on Thursday October 01, @08:48AM
>    from the bloody-well-approve-it dept.
>    Well, although the House of Representations passed it way back in
>    June, the US Senate is finally getting close to passing the bill which
>    would temporarily close the Internet to any new taxes. It will be
>    considered today. It has been twice blocked by Senator Bob Graham
>    (D-Florida), but Senator McCain (R-Arizona) has pushed it forward.

>    Ask Slashdot: Cryptography and Digital Signatures Encryption Posted by
>    Cliff on Wednesday September 30, @09:40PM
>    from the encryption-101 dept.
>    Jonathan Squire writes in with questions concerning encryption. He
>    writes: '...is it considered "secure" to generate an MD5 of a
>    passphrase and then use the MD5 hash as the key to an RC4 cypher of a
>    message/file that you want to send to someone? What are the
>    implications of sending some alternative file with the same pass
>    phrase used if someone who does not know the pass phrase is able to
>    obtain both of the cyphertexts? What if they obtain both cyphertexts
>    and one clear text, how hard would it be (computationaly/finacially)
>    for them to derive the passphrase that was used?' � There's more!
>    Click the link below...

>    Investigating Echelon Encryption Posted by Hemos on Wednesday
>    September 30, @02:29PM
>    from the white-or-black-spy dept.
>    It appears that the European Parliment is going to attempt to
>    investigae Echelon, the somewhat mystical eavesdropping entity that is
>    supposed to be able to listen to all Continental communications. This
>    article gives a great amount of detail about what it is alleged to
>    be, but apparently it's run by five security agencies, including the
>    NSA, and can intercept almost anything. I'd love to have this rig at
>    home. updated


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage at ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------





From 2001files at usa.net  Wed Sep 30 18:41:16 1998
From: 2001files at usa.net (2001files at usa.net)
Date: Thu, 1 Oct 1998 09:41:16 +0800
Subject: Greatest  MONEY Secret in  America
Message-ID: <199810011441.HAA27533@cyberpass.net>



Would you like to get a pay raise next week without asking your boss?   Then this very special report, "Money Power," is for you!

If you have a regular job - not working in your own or a family business - and you get a regular paycheck, we can show you how you can give yourself a HUGE RAISE in your very next paycheck.  At least between 20% - 30% more than what you are getting now.  Yes, your paycheck will be increased substantially!

	* Example:  If your take home pay is $400 net per week, you can take home $440 - $500 the very next week and every week thereafter!

No Gimmicks!  Everything is perfectly legal.

"Money Power" is written in three parts:

	*Part I - shows you exactly what to do so you can give yourself a raise in your next paycheck.  You decide how big a pay raise you want to give yourself!

	*Part II -  shows you how to protect yourself, your family, your home, and your assets without paying big money -- just $85 per year to legally protect your liability 100% against bill collectors and debts.

	*Part III - shows you how you can legally deduct household expenses - utilities, gardener, supplies, repairs, and more from your income taxes.  Absolutely No Gimmicks!  Everything is legal.

This is NOT a "get rich quick" scheme or some other scam.  We are sure you have seen lots of them.  And this is NOT a "tax protester" who refuses to pay income taxes.  The author of this report pays taxes every year - of course, as little as legally possible.  It's our opinion it is not good to zero out completely.  But, you can - it's your choice.

Using the methods in this report, the rich become richer.  And poor people become poorer when they don't take advantage of these techniques.  Your chances of being audited by the IRS - just for using these methods - are near zero.

	* We are so sure "Money Power" will work for you, here is our risk-free guarantee.  If you don't get at least 100 times more money in your paycheck in one year than the cost of this report, we will double your money back!  How's that for a guarantee?
                      ---------------------------------

Now, here's one more offer you will find hard to refuse.  We have a Reseller Program whereby you can make money selling this report.  When you purchase "Money Power," you will also get 1,000 FREE places to advertise on the Internet!  If you want to make some extra money - $500, $1,000 or more - just post ads on those sites and have the orders come to you.  For every order you send us, we will pay you $5.00:
	*You don't need a merchant account to process orders!  We do that.
	*You don't have to warehouse any inventory!  We do that.
	*You don't have to ship any merchandise.  We do that.
All you have to do is send us the orders.  We'll process checks, money orders, and credit cards and we will pack and mail the report.  And you get paid twice a month - on the 15th and the 30th!
                     ------------------------------------



And, listen.  America is a free country.  If you don't want an increase in your paycheck, that's fine.  And if you don't want to know how to protect your family, that's OK, too.  And if you don't want to save money on taxes, that's quite all right.  You are living in a free country.

But, if you need money - more money in your paycheck, act right now!  

The author of this report used to work for Corporate America earning over $100,000 a year.  After paying almost 40% in Federal taxes, 6.2% for Social Security, 1.45% for Medicare, 1.5% for the unemployment fund, and 3% for his employee benefits, he would bring home less than half of his yearly salary!  And then there was state income tax to pay!   He decided he had to do something so he could keep all the money!

"Money Power" is the result of the author's frustration and aggravation with the system and the research he did to change his situation.  These are methods they don't teach you in school!

It can't get much better than this.  This is a once in a lifetime opportunity because you may not receive this message again.  And you know how it is with opportunities ..... if you pass on one, you are not entitled to another for a long time.


Don't Delay!  The longer you wait to order, the longer you will wait for your raise!!!!


	>>>>>>>>>>>>> Please Note:  This report is for U.S. Citizens and Green Card holders only!  This program will not work for illegal immigrants or foreigners.<<<<<<<<<<<<

---------------------------------------------------------------------------

Here's how to order:

*****To order online, click on your reply button and type ORDER ONLINE in the subject line and we will e-mail you the online order form.

                             OR

Print out the convenient order form below NOW and mail it to:

	World Net Press
	Dept. E-927
	P.O. Box 96594
	Las Vegas, NV 89193-6594
	
Payment Method:  
_____ Check     
_____ Money Order
_____ Visa
_____ MasterCard
_____ American Express
_____ Discover

_____ Yes, I want to order my copy of  "Money Power".  Price is $9.95 + $3.95 S/H = $13.90 and my order will be shipped by 1st Class Mail.   

Name_________________________________________________________________________

Address______________________________________________________________________

City/State/Zip_______________________________________________________________

Daytime Phone (__________)___________________________________________________

E-Mail Address_______________________________________________________________

Credit Card #_____________________________________________ Exp. Date_________

Cardholder Name (as it appears on the card)__________________________________

(Please make sure you include your phone number and e-mail address in case we have a question about your order.  Your credit card billing will reflect Road to Wealth, Inc.)



**************************************************************************
We are currently consolidating our mailing lists and need to update our database.  Our records indicate you may have inquired in the past. If this message has reached you in error, or the information is not correct, please accept our apology.  Follow the instructions below to be removed and we will honor your request.  We do not knowingly engage in spam of any kind.

Please click on your reply button and type REMOVE in the subject line only.  The software reads only the subject line, not the body of the message.
**************************************************************************

Please be advised we collect the e-mail addresses of all flamers, hackers, and users of abusive and vulgar language.  We submit these addresses to the FBI and Interpol on a monthly basis.  








From rah at shipwright.com  Wed Sep 30 19:45:47 1998
From: rah at shipwright.com (Robert Hettinga)
Date: Thu, 1 Oct 1998 10:45:47 +0800
Subject: early reports from Austria: possible crypto stalemate (fwd)
Message-ID: 




--- begin forwarded text


Date: Thu, 1 Oct 1998 03:04:38 -0300 (ADT)
From: M Taylor 
To: cryptography at c2.net
Subject: early reports from Austria: possible crypto stalemate (fwd)
MIME-Version: 1.0
Sender: owner-cryptography at c2.net


---------- Forwarded message ----------
Sender: efc-talk-owner at insight.cas.mcmaster.ca
Subject: early reports from Austria: possible crypto stalemate
Date: Wed, 30 Sep 1998 17:48:20 -0400 (EDT)
To: efc-talk at insight.cas.mcmaster.ca
From: David Jones 

Brief Crypto update:

Sources in Vienna, Austria, where the current Wassenaar negotiations
have been taking place, seem to indicate that there have been no
changes on international crypto policy.  This is generally regarded
as a "good sign", since it means the hard liners (Russia, US, France, UK, NZ)
haven't been successful, and those countries advocating a more liberal
policy may be sticking to their positions.

The next time int'l crypto policy is to be formally negotiated
is apparently early in December.

-- djones at efc.ca


P.S. If anyone happens to be fluent in German, maybe you could help us
     by translating, or summarizing, in English:

	http://www.mediaweb.at/akmg/news/wassenaar.html

----------------

(via babelfish)
http://babelfish.altavista.digital.com/cgi-bin/translate?urltext=http%3A%2F%2Fww
w.mediaweb.at%2Fakmg%2Fnews%2Fwassenaar.html&lp=de_en

In my very brief summary: it appears that a stalemate was reached in
regards to the public domain exemption ("General Software Note" in Canada)
of cryptography. The heavyweights (US, UK, France, Russia) want to remove
it while others (much of Europe?, Canada?) want to preserve it.

There is also mention of key-escrow, but I'm not certain if that is tied
to the Wassenaar Agreement talks.

--- end forwarded text


-----------------
Robert A. Hettinga 
Philodox Financial Technology Evangelism 
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'





From rah at shipwright.com  Wed Sep 30 19:49:36 1998
From: rah at shipwright.com (Robert Hettinga)
Date: Thu, 1 Oct 1998 10:49:36 +0800
Subject: Oct 2 column - take them shooting
Message-ID: 




--- begin forwarded text


Resent-Date: Thu, 1 Oct 1998 00:29:27 -0600
Date: Wed, 30 Sep 1998 23:22:06 -0700 (PDT)
X-Sender: vin at dali.lvrj.com
Mime-Version: 1.0
To: vinsends at ezlink.com
From: Vin_Suprynowicz at lvrj.com (Vin Suprynowicz)
Subject: Oct 2 column - take them shooting
Resent-From: vinsends at ezlink.com
X-Mailing-List:  archive/latest/563
X-Loop: vinsends at ezlink.com
Precedence: list
Resent-Sender: vinsends-request at ezlink.com


    FROM MOUNTAIN MEDIA
    FOR IMMEDIATE RELEASE DATED OCT. 2, 1998
    THE LIBERTARIAN, By Vin Suprynowicz
    'And every other terrible implement of the soldier'

    One of the great pleasures of collecting and restoring old firearms is
hauling them out to the range and letting a visitor find out just how good
some of our grandfathers' military engineering really was.

  It can be an even greater pleasure to introduce someone who's previously
been a "Second Amendment agnostic" to the exhilaration that comes with
learning how to safely and effectively handle these historic tools of
freedom. Suddenly some appreciation dawns of what it must have been like to
stand with the Minutemen on that town green in Lexington, or to dig the mud
or snow out of your action, slam in a clip, and carefully squeeze off eight
aimed rounds of 30.06 from the unstoppable Garand.

  These old-timers aren't dainty target rifles. You slam them closed with
the butt of your hand. The weight of steel across your arms, the crack of
bullets breaking the sound barrier (even through modern ear protection) are
sobering. Then, once the newcomer develops that cake-eating grin that comes
when you confirm it was him -- not the wind -- that really knocked down
those cans at 60 yards, you point waaaay down the wash, and explain that
the average infantryman was expected to hit a man-sized target over there,
at 300 yards ... that a marksman was expected to do so at 800.

  "You mean you can hit something out (start ital)there(end ital)? I can't
even (start ital)see(end ital) what's out there."

  "Yes. And I also mean that any trained soldier out there ... can hit you."

  Suddenly all this talk about banning "assault rifles" with "magazines
that hold more than 10 rounds," or rifles with bayonet lugs or flash hiders
(yes, that's why that collector's piece you're holding has been emasculated
with a hacksaw, like an antique table imported with only three legs) start
to come into focus.

  "They made them import this SKS without a bayonet? But they're obviously
designed to carry the folding bayonet, like this older one here. Without it
the cleaning rod rattles around and falls out. And how the heck does taking
off the bayonet make the weapon any less deadly in a shoot-out? Who thinks
up this stuff?"

  Any American can still learn to shoot safely, and then teach one more
person, and then another. It's wonderfully subversive.

  Recently, a fellow who I took out was moved to recall that his father had
qualified as a marksman in the army, but had died before he was able to
teach his son that skill. So pleased was he to start re-learning his
father's skill that he insisted on buying me dinner, to compensate me for
my ammo costs. Two weeks later, the lad who grew up without a father won
the Republican primary, and now stands a good chance of becoming our next
congressman. Good luck selling your victim-disarmament bill of goods to him
now, Ms. Feinstein, Mr. Schumer.


  #   #   #

  Of course, the downside of hauling a collection of arms out to the range
always faced you that evening, when a half-dozen rifles leaned waiting
against the wall, and you started figuring how long you were about to spend
with cleaning rods, powder solvent, jags and patches.

  (And if you find a woman who loves the smell of Hoppe's powder solvent in
her living room, fellows, marry her straight off.)

  Since this has been the fate of the rifleman for centuries, I will admit
it was with the standard "Yeah, right" that I first noticed an ad in one of
the firearms tabloids a few months back for a new product modestly named
the "World's Fastest Gun Bore Cleaner," a patented rayon pull-through cord
with phosphor-bronze bristles braided right into the front. Everyone knows
the only way to clean a rifle barrel is to brush it out with a cleaning
rod, run through cotton patches soaked in solvent, and then run through dry
patches to remove the black soot, repeating again and again in a
semi-hypnotic ritual of devotional labor. Pull some fancy cord once through
the gun and rack it away? Ha!

  Then I dropped by the Soldier of Fortune Expo here in Las Vegas last
month, and spotted a table full of these things, manned by the inventor,
who explained how he got to wondering -- as he was clearing out some
varmints in the frozen wilds of Idaho, cold enough to freeze your fingers
to the barrel -- why in this day of space-age materials no one had invented
a device that would clean a rifle barrel with one pull, no bent or broken
steel rods to haul around, no gouging of the rifle's delicate crown, no
chemicals.

  I bought one of the things -- which you can roll up and carry in your
shirt pocket -- and Bruce Hedge made me a gift of a second one to fit my
pistols (the Bore Cleaner is sized precisely by caliber), my total
"compensation" for this rare and unsolicited product endorsement.

  Because, you see, they work. After that precision-sized brush stutters
through (you want it to stutter -- that means the bristles aren't lying
over sideways because they're too long), the braided cord swipes your lands
and grooves with a surface area equivalent to 160 cotton patches. And when
the cord is dirty, you just wash it out in soapy water, to the tune of 200
to 500 uses.

  Mr. Hedge's biggest problem? Other than finding enough salesmen to move
his product, and butting up against some out-of-date military specs that
are so far keeping our men in uniform from capitalizing on this
breakthrough, that would be "setting aside the $100,000 we figure we're
going to need to protect the patent."

  As the man said, "This changes everything."

  The "World's Fastest Gun Bore Cleaner" is from National Tech-Labs, 5200
Sawyer, Suite H, Boise, Idaho 83714; tel. 208-345-5674. If you shoot, you
want some.

   #   #   #

"Congress have no power to disarm the militia. Their swords, (start
ital)and every other terrible implement of the soldier(end ital), are the
birth-right of an American." -- Tench Coxe, prominent Federalist and friend
of James Madison, The Pennsylvania Gazette, Feb. 20, 1788.


Vin Suprynowicz is the assistant editorial page editor of the Las Vegas
Review-Journal. Readers may contact him via e-mail at vin at lvrj.com.

***



Vin Suprynowicz,   vin at lvrj.com

The evils of tyranny are rarely seen but by him who resists it. -- John
Hay, 1872

The most difficult struggle of all is the one within ourselves. Let us not
get accustomed and adjusted to these conditions. The one who adjusts ceases
to discriminate between good and evil.  He becomes a slave in body and
soul. Whatever may happen to you, remember always: Don't adjust! Revolt
against the reality! -- Mordechai Anielewicz, Warsaw, 1943

* * *

--- end forwarded text


-----------------
Robert A. Hettinga 
Philodox Financial Technology Evangelism 
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'





From jya at pipeline.com  Wed Sep 30 19:53:33 1998
From: jya at pipeline.com (John Young)
Date: Thu, 1 Oct 1998 10:53:33 +0800
Subject: Canada's Crypto Policy
Message-ID: <199810011545.LAA05835@camel7.mindspring.com>



Thanks to MC Taylor for pointing we offer a speech
today by Canada's Minister of Industry on a new
cryptography policy:

   http://jya.com/ca-crypto.htm  (16K)

It has links to several sites with related policies in the
works.





From roessler at guug.de  Wed Sep 30 19:54:27 1998
From: roessler at guug.de (Thomas Roessler)
Date: Thu, 1 Oct 1998 10:54:27 +0800
Subject: propose: `cypherpunks license' (Re: Wanted: Twofish source code)
In-Reply-To: <199809281845.TAA18662@server.eternity.org>
Message-ID: <19981001154100.D27670@sobolev.rhein.de>



On Thu, Oct 01, 1998 at 10:26:39AM +0100, Ben Laurie wrote:

> d) As far as I can work out, someone who wants to free part of a
> product, but not all of it, can't practically do so under GPL.

Wrong.  As long as it's your own code you are talking about, you can
release it under whatever license you want -  e.g., you can give
away binary code as part of a proprietary application, and you can
give away binary and source code stand-alone under GLP, LGPL, BSD
license, Artistic License, whatever.

tlr
-- 
Thomas Roessler � 74a353cc0b19 � dg1ktr � http://home.pages.de/~roessler/
     2048/CE6AC6C1 � 4E 04 F0 BC 72 FF 14 23 44 85 D1 A1 3B B0 73 C1





From mctaylor at privacy.nb.ca  Wed Sep 30 21:09:52 1998
From: mctaylor at privacy.nb.ca (M Taylor)
Date: Thu, 1 Oct 1998 12:09:52 +0800
Subject: [Cdn] Cryptography Policy Discussion Paper: Analysis of Submissions
Message-ID: 



An analysis of responses to The Canadian Cryptography Policy Discussion
Paper (http://strategis.ic.gc.ca/SSG/cy00005e.html)

Prepared by:    AEPOS Technologies Corporation
Prepared for:   Industry Canada
Originator :    AEPOS Technologies Corporation
                116 Albert St. Suite 601
                Ottawa, Ontario
                K1P 5G3

Date :          15 September, 1998

English: http://strategis.ic.gc.ca/SSG/cy01156e.html
French: http://strategis.ic.gc.ca/SSGF/cy01156f.html


It appears is light of today's announcement

by John Manley, Minister of Industry, that domestic cryptography will
bloom, but the export of Canadian crypto is not yet clear. I suspect the
Wassenaar negotiations will determine whether the free export of "public
domain" and mass market software will continue for Canadians. As an
exporter, I hope so.

-mctaylor
--
M Taylor   mctaylor@  /  glyphmetrics.ca | privacy.nb.ca







From rah at shipwright.com  Wed Sep 30 21:13:47 1998
From: rah at shipwright.com (Robert Hettinga)
Date: Thu, 1 Oct 1998 12:13:47 +0800
Subject: [RRE]Conference: Technological Visions
Message-ID: 



PhilZ Pontificates. Philm at 11.

Cheers,
Bob Hettinga

--- begin forwarded text


Mime-Version: 1.0
Date: Wed, 30 Sep 1998 21:43:09 -0800
To: "Red Rock Eater News Service" 
From: duguid at socrates.berkeley.edu (Paul Duguid)
Subject: [RRE]Conference: Technological Visions
Sender: 
Precedence: Bulk
List-Subscribe: 

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
This message was forwarded through the Red Rock Eater News
Service (RRE).  Send any replies to the original author, listed in
the From: field below.  You are welcome to send the message along to
others but please do not use the "redirect" command. For information
on RRE, including instructions for (un)subscribing, see
http://dlis.gseis.ucla.edu/people/pagre/rre.html or send a message
to requests at lists.gseis.ucla.edu with Subject: info rre
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

Date: Fri, 25 Sep 1998 23:41:21 +0200 (MET DST)
From: Kearney 
Philodox Financial Technology Evangelism 
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'





From tcmay at got.net  Wed Sep 30 21:45:59 1998
From: tcmay at got.net (Tim May)
Date: Thu, 1 Oct 1998 12:45:59 +0800
Subject: I thought of an initialy regulated industry!...
In-Reply-To: <199810011243.HAA18113@einstein.ssz.com>
Message-ID: 



At 5:43 AM -0700 10/1/98, Jim Choate wrote:
>Hi,
>
>In regards the discussion about regulation and industry. I can think of only
>one industry that was regulated before the very first company opened their
>doors for business....nuclear power plants.
>
>Personaly, 3 Mile Island in a un-regulated industry scares the hell out of
>me...and I support nuclear power. Look at the fiasco of Chernobyl in a
>control market.
>
>I'd like to hear from any free market mavens who might want to use the
>nuclear industry as an example of how things could be so much better with no
>regulation regarding construction, operation, or waste disposal.

"Regulation" of the nuclear power industry had the predicted effect of
overly conservative designs being standardized. Specifically, the
Westinghouse boiling water designs, basically frozen in 1955 and little
changed since then.

Ordinary evolutionary improvement, plus revolutionary improvement, has not
been possible. (Some examples would include inherently fail-safe designs
like the Canadian CANDU reactor, and various improvements the French have
made in the original Westinghouse design.)

Waste disposal is even more of an example of a government-worsened problem.
If politicians were not grandstanding about the dangers of nuclear waste
and monkeywrenching plans, we'd have waste disposal sites.

(For example, there is no plausible evidence that storing waste in caverns
in dry desert areas in Nevada, California, New Mexico, etc. is dangerous.
And certainly better in all regards than storing waste in drums sitting in
places like Hanford, Washington, near the Columbia River. Etc.)

Personally, I favor the "Pournelle Solution": acquire a 10-mile by 10-mile
region of the Mojave Desert. Not in an "ecologically interesting" area of
Death Valley, but just out in the vast scrublands. Erect a double fence
around it, and perhaps even a minefield (if one is worried about thefts of
nuclear waste). Pile the spent fuel rods, medical gear, gloves, etc. on
pallets separated  by wide roads from other pallets. This "solves" the
waste problem for at least a matter of many decades, by which time various
technologies will likely have presented other and better solutions. Cost is
low, convenience is high, safety is good, environmental polllution is nil.

Finally, the "environmental burden" imposed by a coal-fired power plant is
vastly greater than that from a nuclear plant. Do the math on particulates,
carbon levels, etc. Many libertarians have proposed better schemes for
dealing with such environmental burdens....if fossil fuel-powered plants
had to actually pay their share of environmental costs, they'd be even more
expensive than nuclear.

Face it, nuclear has failed in the U.S. because of yahoos who think their
children will be mutated or something along those lines. (I dealt with
these yahoos at Intel when my lab was using a lot of radioactive sources.)

Cypherpunks is not the place to debate nuclear power, but I had to answer
these claims.


--Tim May

Y2K: A good chance to reformat America's hard drive and empty the trash.
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.







From tcmay at got.net  Wed Sep 30 21:51:31 1998
From: tcmay at got.net (Tim May)
Date: Thu, 1 Oct 1998 12:51:31 +0800
Subject: [RRE]Conference: Technological Visions
In-Reply-To: 
Message-ID: 




>The Problems and Potentials of Prediction
>Privacy and Censorship
>Communities of Place and Cyberspace
>Media Discourse on New Technology
>Technological Visions
>
>Confirmed Participants:
>
>John Perry Barlow, Lord Asa Briggs, Richard Chabran, Bob Cringely,
>Wendy Grossman, Katie Hafner, Larry Irving, Peter Lyman, Carolyn
>Marvin, David Nye, Mitchel Resnick, Romelia Salinas, Vivian
>Sobchack, Lynn Spigel, Sherry Turkle, Langdon Winner, Philip
>Zimmermann

Mostly journalists and scribblers. Typical. Journalists yakking with other
journalists on the same boring panels.

As with the 24/7 coverage of the Lewinsky matter on CNN, MSNBC, CNBC, Fox,
and other networks, it is mostly journalists pontificating with other
journalists.

Oddly, though, this one is not in the usual place, Washington, D.C.

--Tim May



Y2K: A good chance to reformat America's hard drive and empty the trash.
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.







From ravage at EINSTEIN.ssz.com  Wed Sep 30 22:11:09 1998
From: ravage at EINSTEIN.ssz.com (Jim Choate)
Date: Thu, 1 Oct 1998 13:11:09 +0800
Subject: I thought of an initialy regulated industry!... (fwd)
Message-ID: <199810011813.NAA19365@einstein.ssz.com>



Forwarded message:

> Date: Thu, 1 Oct 1998 10:46:05 -0700
> From: Tim May 
> Subject: Re: I thought of an initialy regulated industry!...

My original quote:

> >I'd like to hear from any free market mavens who might want to use the
> >nuclear industry as an example of how things could be so much better with no
> >regulation regarding construction, operation, or waste disposal.

Partial quote of Tim:

> "Regulation" of the nuclear power industry had the predicted effect of
> overly conservative designs being standardized. Specifically, the
> Westinghouse boiling water designs, basically frozen in 1955 and little
> changed since then.
> 
> Ordinary evolutionary improvement, plus revolutionary improvement, has not
> been possible. (Some examples would include inherently fail-safe designs
> like the Canadian CANDU reactor, and various improvements the French have
> made in the original Westinghouse design.)

Ok. I agree that over-regulation is bad. CCCP, China, Cuba, etc. are clear
examples of how over-regulation is a failure.

However, my question was to defend the free-market position that *no*
regulation provides an improved environment for (in this case) reactor
design.

Apples and oranges...


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage at ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------





From shamrock at cypherpunks.to  Wed Sep 30 23:13:51 1998
From: shamrock at cypherpunks.to (Lucky Green)
Date: Thu, 1 Oct 1998 14:13:51 +0800
Subject: Wire transfers from web page?
In-Reply-To: 
Message-ID: 



On Wed, 30 Sep 1998, Vincent Cate wrote:
 
> How about a bank on the Internet that will accept instructions to write
> and mail a check drawn on your account to any random person at any
> address? 

That's actually pretty common.

-- Lucky Green  PGP v5 encrypted email preferred.





From rah at shipwright.com  Wed Sep 30 23:14:14 1998
From: rah at shipwright.com (Robert Hettinga)
Date: Thu, 1 Oct 1998 14:14:14 +0800
Subject: EduFUD: Computers, software can harm emotional, social development
Message-ID: 



As the FUD snowballs. The Globe gets Rimmed again...

The edutocracy (and the Boston Globe :-)) finally notices that all that
artillery parked at the foot of their ivory tower actually *does* blow
great big rocks into tiny little bits...


In another context, Carl Ellison has this great story about how, when
firearms were invented, peasants could finally kill knights in armor from a
comfortable distance. When the church reminded them that killing knights
was a sin, peasants started killing knights on weekdays and confessing
those sins in church on Sunday.


Frankly, I've learned more on the net in the last few years than I ever
would have in an equivalent time in school. I credit it with a
several-point increase in my IQ, even.

Woops. We don't count IQ anymore, now do we?... :-).


I guess I know too many stone geniuses who've had computers since they were
children -- most of the people on this list were raised that way, I would
bet -- to take this crap too seriously, reduced attention "spans" or not.

By the way, "span" is the wrong word for ADD. I was hardly raised on TV,
much less computers, (I had my face in science fiction books throughout
most of my childhood), and I've been known to focus on something
"inappropriately" for hours.

While I certainly have varying degrees of control of my attention, but I
just don't see that a "handicap" anymore. My attention is event-driven,
rather than processed in neat organized batches, and I've learned to like
it that way, even if it did give me trouble when I was chained in the
aforementioned tower's dungeon for most of my formative years.

Besides, even if computers cause people to have event-driven attention
rather than in nice neat industrial batches, that's probably a Good
Thing(tm). Consider it evolution in action.

Farmers and mechanics may need "control" of their attention, but in an
information "hunter" like myself, most of the people who do anything useful
on the net, it's a selective disadvantage.

Cheers,
Bob Hettinga


--- begin forwarded text


From: Somebody
To: "'rah at shipwright.com'" 
Subject: FW: Computers, software can harm emotional, social development
Date: Thu, 1 Oct 1998 13:28:41 -0400
X-Priority: 3
Status: U



> -----Original Message-----
> From:	Somebody else
> Sent:	Thursday, October 01, 1998 8:41 AM
> To:	a whole buncha education "professionals"...
> Subject:	Computers, software can harm emotional, social
> development
>
>
>
> Computers, software can harm emotional, social development
>
>               By Barbara F. Meltz, Globe Staff, 10/01/98
>
>               Short attention span. Needs instant gratification. Can't
> focus. Doesn't apply
>               himself.
>
>               If this is what you're hearing from your child's first-
> or second-grade teacher,
>               before you panic and think learning disabilities or
> attention deficit disorder,
>               consider something external: your family computer.
>
>               Educators have long intuited that early exposure to
> computers doesn't give
>               children an educational edge. Now researchers have data
> to show it can
>               actually be harmful, potentially undercutting brain
> development, interfering
>               with the way a child learns, intruding on social and
> emotional development,
>               and putting health at risk. ''There is no reason to give
> a computer to a child
>               under 7,'' says educational psychologist Jane M. Healy.
> If she had her way,
>               she'd throw computers out of preschool and early
> elementary classrooms
>               and keep kids off them at home. Her
> sure-to-be-controversial new book,
>               ''Failure to Connect: How Computers Affect Our
> Children's Minds, for
>               Better and Worse'' (Simon & Schuster), is eye-opening
> reading.
>
>               Many researchers agree with her. ''For children under 7
> or 8 who have not
>               reached the age of abstract reasoning, computer exposure
> changes the way
>               they absorb material. Some of us think this is quite
> frightening,'' says
>               educational policy analyst Ed Miller of Cambridge.
>
>               Technology researcher Douglas Sloan, a professor at
> Teachers College at
>               Columbia University, says, ''It's something of a scandal
> that it's taken us so
>               long to figure this out.''
>
>               Some of the troubling trends Healy identifies:
>
>                 Kindergartners who don't want to draw with markers and
> crayons
>               because ''it isn't as pretty as my computer drawings.''
>
>                 First-graders who are so used to a computer game's
> reward for doing
>               something easy, they don't want to try anything hard.
>
>                 Kindergartners who are nonverbal and don't know how to
> play with
>               peers because of too much time alone at the computer.
>
>                 First-graders who are unable to understand what they
> read because they
>               lack a rudimentary language base they typically get from
> peer and adult
>               interaction.
>
>               ''In putting little kids at the computer, you take them
> away from peer play,''
>               says Sloan. ''That compromises social development and
> imagination.'' Not
>               only that, but a child is being provided with someone
> else's visual images at
>               precisely the time when he needs to be developing his
> own image-making
>               capacities. ''That's what leads to intellectual growth
> later,'' Sloan says. The
>               same thing is true with too much TV time, but studies
> show parents monitor
>               TV more. ''We've come to ascribe almost magical
> educational qualities to
>               the computer,'' he says. He researches how to protect
> children from
>               computer misuse.
>
>               Problems with computer exposure aren't limited to early
> childhood. Bill
>               Schechter, a history teacher at Lincoln-Sudbury Regional
> High School, says
>               he knows the Internet has the capacity to be a
> tremendous tool for research,
>               but so far he hasn't seen how.
>
>               ''I'm getting to the point where I'm not going to accept
> Internet research,'' he
>               says. ''The technology for cheating far outdistances a
> teacher's ability to
>               recognize it. All I'm seeing is lazy Internet use, where
> kids use it as an excuse
>               not to open a book, not to check sources, not to go to
> the library.''
>
>               Software researcher Howard Budin says one of the
> problems is the vastness
>               of the Internet. Last year, his son's sixth-grade
> research project required two
>               Internet sources. ''When he did a search for `panda,' he
> turned up 54,000
>               entries! If I hadn't been there with him, he would have
> been totally
>               frustrated,'' he says. Most of the entries were for
> schools with pandas for
>               mascots, but it took even an experienced navigator like
> Budin a half-hour to
>               get to appropriate sites.
>
>               Budin, who is director of the Center for Technology and
> School Change at
>               Columbia, says exposure to the Internet should start in
> third or fourth grade,
>               not before. ''Introduce it as a source of information,
> not entertainment,'' he
>               says.
>
>               Even so, it can lead to the kind of problems teachers
> like Schechter see.
>
>               ''Who's teaching these kids how to use it and where the
> information comes
>               from and what it means?'' asks Sloan.
>
>               He says that in the rush to wire classrooms, these
> critical questions are
>               largely ignored. ''Data itself is not knowledge,'' says
> Sloan. ''It's only
>               knowledge when you connect it thoughtfully and
> critically to curriculum.''
>
>               In many schools, the problem is lack of human
> infrastructure, says
>               technology researcher Vicki O'Day, of the Xerox Palo
> Alto Research
>               Center. She speaks admiringly of a new principal at an
> elementary school in
>               California who had the courage to shut down the computer
> lab for two years
>               until she had technical support and curricula-links.
>
>               She says a school needs to fund two positions, a
> technology coordinator
>               who keeps equipment up and running and is not a teacher,
> and a curriculum
>               development person who is a teacher but not in the
> classroom. ''You can't
>               expect a classroom teacher to be knowledgeable about
> software and the
>               Internet in addition to what she already does,'' O'Day
> says.
>
>               She also tells schools to put computers in the
> classroom, not in a computer
>               lab; they're more likely to be integrated into the
> curriculum and to be seen as
>               one more tool, along with a dictionary and pencil
> sharpener. ''We used to
>               think kids should do computer just for the sake of doing
> computer,'' says
>               O'Day. ''Uh-uh. It should always be used for a
> purpose.''
>
>               For parents, this means restricting the computer to
> what's useful and
>               forgetting about what's entertaining.
>
>               Healy, who's a purist about this, would limit a young
> child's access to e-mail
>               to write to grandpa, or to sitting on your lap while you
> download pictures of
>               her favorite animal or truck.
>
>               Steve Bennett, who reviews software and is author of
> ''The Plugged-in
>               Parent'' (Times Books), tells parents to think of
> themselves as ''parentware.''
>               He defines that as an involved parent. ''It's just as
> important as software,'' he
>               says.
>
>               In his home, the computer is one resource among many and
> it's not used as a
>               babysitter or as entertainment. He enforces limits on
> screen time - his kids, 8
>               and 11, can have two half-hour sessions a day, after
> homework, although he
>               says they hardly ever use it - and restrictions on
> software: no ''drill and grill''
>               games, shoot'em-ups, or Internet surfing. Budin has
> similiar restrictions for
>               his children; his sixth-grade son spends his computer
> time on spread sheets,
>               graphic programs, and 3-D renderings.
>
>               In addition to setting limits on software, Sloan says,
> parents should avoid
>               what he calls an adulatory attitude toward the computer.
> If your child is
>               young and you're just starting out, ''Look at it as an
> appliance,'' he says.
>
>               And if you already have a 4- or 6- or 9-year-old who's
> hooked on
>               computer games?
>
>               It's never too late to talk about family values, even to
> say you've made a
>               mistake about allowing certain games. ''The ultimate
> challenge and most
>               successful counter,'' says Sloan, ''is to provide such a
> rich environment in
>               your home that the games seem dull compared to whatever
> else is going on.''
>
>               AFTERTHOUGHT - Recommended reading for 3- to
> 7-year-olds: ''How
>               to Take Your Grandmother to the Museum'' (Workman
> Publishing), by Lois
>               Wyse and her granddaughter, Molly Rose Goldman.
>
>               Child Caring appears every Thursday in At Home. Barbara
> F. Meltz
>               welcomes letters and comments and can be reached via
> e-mail at
>               meltz at globe.com.
> hmm!
>
> 	This story ran on page F01 of the Boston Globe on 10/01/98.
>               (c) Copyright 1998 Globe Newspaper Company.

--- end forwarded text


-----------------
Robert A. Hettinga 
Philodox Financial Technology Evangelism 
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'





From rah at shipwright.com  Wed Sep 30 23:14:54 1998
From: rah at shipwright.com (Robert Hettinga)
Date: Thu, 1 Oct 1998 14:14:54 +0800
Subject: early reports from Austria: possible crypto stalemate (fwd)
Message-ID: 




--- begin forwarded text


To: cryptography at c2.net
Cc: M Taylor , djones at efc.ca
Subject: Re: early reports from Austria: possible crypto stalemate (fwd)
Date: Thu, 01 Oct 1998 14:04:23 -0400 (EDT)
From: Don Beaver 
Sender: owner-cryptography at c2.net


M Taylor writes:
> ---------- Forwarded message ----------
> P.S. If anyone happens to be fluent in German, maybe you could help us
>      by translating, or summarizing, in English:
>
> 	http://www.mediaweb.at/akmg/news/wassenaar.html

Disclaimer:

I don't make any claim to real fluency in German (I never took
a class), so there may be mistakes.  But I think this is pretty
accurate.

--Don Beaver

Journalist Trade Union Protests the Cancellation of Special Arrangements for Encryption Programs in the Wassenaar Agreement

At a meeting of experts on the Wassenaar Agreement in Vienna, the cancellation of exceptions for cryptographic public-domain software and shareware was negotiated. The real goal of the agreement is the control and transparency of transfers of military and so-called dual-use goods - products and technologies that can be used for both military and civilian purposes. The Wassenaar Agreement lists Information Security and encryption technology, in the form of software encryption programs or hardware, under the Dual Use category 5.2.

There are to be further efforts to eliminate the exceptions for public-domain cryptographic software and shareware (usually free over the Internet or by CD-ROM distribution), and thereby place each kind of encryption software under the monitoring and restriction of the Wassenaar agreement.

The journalist trade union is protesting vehemently, because free access by journalists and the media to encryption programs is threatened. Encryption programs play a rapidly increasing role in the protection of electronic network communications for the media and jounalists. It is not difficult to monitor electronic mail automatically and make copies without recipients or senders ever taking notice. Investigative journalism on organized crime, corruption, and illegal arms trafficking, for example, may be endangered by the lack of protected communication, because the privacy of research is not ensured, especially when it takes place internationally.

Not only will editorial privacy be damaged but also the protection of information sources, as well as the protection of the private sphere. Not only must the protection of communication between journalists and media be ensured but also between journalists and media and their information sources, which cannot be limited to a special circle of acquaintances.

Attempts to permit programs that just encode with a key whose duplicate is placed with authorities cannot provide a way out. With such duplicate keys, all encoded messages can be decoded. But there is no guarantee that this duplicate key will not arrive in the unauthorized hands of organized crime, for example, or that is it not used by individual members of the authority or intelligence services in an unauthorized manner.

The information surrounding the Wassenaar Agreement is also precarious: at present, each discussion in the Wassenaar Agreement falls under the privacy of "privileged diplomatic communication" (Point IX) and the application of resolutions are to be implemented using "national discretion" (Point II.3). Thus, the targets of the Wassenaar Agreement are counterproductive(?): companies whose doubtful weapons shipments were forbidden remain spared from public criticism, just like failed decisions.

Therefore the journalist trade union demands:

  • Elimination of cryptography from the list of "dual-use" goods entered by the Wassenaar Agreement. No limitation of cryptography to insecure (respectively, key duplication/escrow) encryption techniques.
  • Democratic control/monitoring of the Wassenaar Agreement: No modification of the rules and jurisdiction of the Wassenaar Agreement without prior public discussion.
  • Obligatory public reporting on activities in the context of the Wassenaar Agreement.
--- end forwarded text ----------------- Robert A. Hettinga Philodox Financial Technology Evangelism 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From petro at playboy.com Wed Sep 30 23:18:56 1998 From: petro at playboy.com (Petro) Date: Thu, 1 Oct 1998 14:18:56 +0800 Subject: GPL & commercial software, the critical distinction (fwd) In-Reply-To: <33CCFE438B9DD01192E800A024C84A19284710@mossbay.chaffeyhomes.com> Message-ID: At 5:25 PM -0500 9/30/98, Matthew James Gering wrote: >Petro wrote: >> >> Had Microsoft, for example, been required to publish their >> >> API's by the market we wouldn't be spending all this effort >> ^^^^^^^^^^^^^^^^^^^ >> >> >You state free-market and then you are *requiring* someone to >> >do something? How do you resolve that contradiction? Require >> >= Force != Free[dom] >> >> Required as in purchasers large and small saying "You >> don't include your source code, we won't buy it". > >*Require* per say is a bad term for the use of economic power. But the >market didn't "require" Microsoft to do so (see Microsoft's financial >statements), so why should the government step in and force something >that is contrary to the market? I never said they should, however in this case I will make the arguement that the Feds DID have something to do with creating the Jaggernaut called M$, and that they could also fix Billys little redmond wagon without a court case shoud they wish. Again, for those on the list who can't read clearly, I DON'T THINK THE DOJ SUIT IS PROPER, I am against it. Of course that is true of most government "actions". >The rest of Jim's sentence read "we wouldn't be spending all this effort >and money on the current [Department of Justice] proceedings." > >Which tells me that require means certain segments of the market telling >Microsoft you will do this or we will fuck you over with the borrowcrats >we own, which is exactly what has happened. The elements lacked >sufficient economic power to sway Microsoft, and they lacked sufficient >political power until they ganged up together. A loose coalition to gain >via use of DOJ antitrust force what they good not gain in a free market. >That is political power, not economic. >What is rather ironic is that the same Antitrust laws they are trying to >bash Microsoft with are what prevented them from forming an economic >(instead of under-the-table political) coalition that could have made >Microsoft change its practices without resorting to non-free-market >forces. Correct me if I am wrong, but aren't almost all Federally owned desktop computers PCs? Aren't there certain departments/divisions in the governement that only accept electronic files if they are in "word" format? (i.e. the DoD, but I don't have a site for that, so I could be mistaken). I know that I've never seen a Military Computer (desktop kind) that wasn't a Wintel/Dos machjne (talking general purpose computer here, not a targeting machine etc.) Sell a couple hundered thousand units to the Feds, and that is a considerable dent in the "level playing field" of the free market. -- petro at playboy.com----for work related issues. I don't speak for Playboy. petro at bounty.org-----for everthing else. They wouldn't like that. They REALLY Economic speech IS political speech. wouldn't like that. From nobody at replay.com Wed Sep 30 23:21:37 1998 From: nobody at replay.com (Anonymous) Date: Thu, 1 Oct 1998 14:21:37 +0800 Subject: I thought of an initialy regulated industry!... Message-ID: <199810011922.VAA29274@replay.com> > Personally, I favor the "Pournelle Solution": acquire a 10-mile by 10-mile > region of the Mojave Desert. Not in an "ecologically interesting" area of > Death Valley, but just out in the vast scrublands. Erect a double fence > around it, and perhaps even a minefield (if one is worried about thefts of > nuclear waste). Pile the spent fuel rods, medical gear, gloves, etc. on > pallets separated by wide roads from other pallets. This "solves" the > waste problem for at least a matter of many decades, by which time various > technologies will likely have presented other and better solutions. Cost is > low, convenience is high, safety is good, environmental polllution is nil. So what do you do when it rains? It does rain in the Mojave desert, you know. And it rains hard, in the summer thunderstorm season. That's a lot of water to sluice away radioactive material into the washes and arroyos, leading down to populated areas. From aba at dcs.ex.ac.uk Wed Sep 30 23:23:20 1998 From: aba at dcs.ex.ac.uk (Adam Back) Date: Thu, 1 Oct 1998 14:23:20 +0800 Subject: Toto -- mimic function or the real thing (Re: no subject) In-Reply-To: Message-ID: <199810011912.UAA08256@server.eternity.org> Tim May writes: > At 5:09 PM -0700 9/28/98, Adam Back wrote: > >Dunno, but that sure looks like authentic Toto doesn't it (and the > >rest of the long post of which excerpt quoted above). [...] or is > >rather good at imitating his writing style manually > > Crap. I detected this as ersatz Toto after a couple of paragraphs. > Metaphors were too strained, or something. It just seemed fake. It wasn't perfect Toto, but it's the best one we've seen yet, I think. Writing style appears to be hard to mimic, or at least I find it hard. Toto I think is harder to mimic than most, his style is very distinctive, but somehow still hard to mimic. We have seen high quality John Young mimics, which would pass as the real thing. But there seems to be something harder about Toto's style. I had a go at mimicing Toto for posting to the list (anonymously), but the output was so obviously not Toto that I scrapped it and deleted it. And this is just manual writing style analysis. NSA letter triple based analysis, one presumes would be much better. btw. I suspected a couple of the anonymous replies to one of the spammers / AOLers looked a bit like Tim May writing style. (The one with lots of ! in them -- perhaps it is that Klaus von Future prime! likes exclamation marks). I have been thinking about this problem on and off, as it is a problem for nyms (especially where the true name has been rather vocal already to provide lots of samples) and I invite comments on the merits of the following as an approach to reducing leakage of writing style: Create a multiple choice sentence constructor (say CGI web page with pull down menus for subject, verb, adjective etc). Plus text boxes for less common nouns, names etc. Apparently during the war soldiers were handed post cards where one could tick a few boxes ("[ ] I am doing ok / [ ] I blah") for some reason. Seems the formally restricted choice of adjectives etc would be less expresive but perhaps go some reasonable way to frustrate writing analysis. Adam From sbryan at vendorsystems.com Wed Sep 30 23:27:57 1998 From: sbryan at vendorsystems.com (Steve Bryan) Date: Thu, 1 Oct 1998 14:27:57 +0800 Subject: [RRE]Conference: Technological Visions In-Reply-To: Message-ID: >Y2K: A good chance to reformat America's hard drive and empty the trash. If you reformat the drives, there's no need to empty the trash. Steve Bryan Vendorsystems International email: sbryan at vendorsystems.com icq: 5263678 pgp fingerprint: D758 183C 8B79 B28E 6D4C 2653 E476 82E6 DA7C 9AC5 From petro at playboy.com Wed Sep 30 23:30:25 1998 From: petro at playboy.com (Petro) Date: Thu, 1 Oct 1998 14:30:25 +0800 Subject: advertisement (fwd) In-Reply-To: <199810010059.TAA15358@einstein.ssz.com> Message-ID: At 7:59 PM -0500 9/30/98, Jim Choate wrote: > >Computers are *supposed* to make our lives *easier*. Some folks seem to have >forgotten this. It's making the spammers lives easier. -- petro at playboy.com----for work related issues. I don't speak for Playboy. petro at bounty.org-----for everthing else. They wouldn't like that. They REALLY Economic speech IS political speech. wouldn't like that. From ravage at EINSTEIN.ssz.com Wed Sep 30 23:32:19 1998 From: ravage at EINSTEIN.ssz.com (Jim Choate) Date: Thu, 1 Oct 1998 14:32:19 +0800 Subject: I thought of an initialy regulated industry!... (fwd) Message-ID: <199810011932.OAA20010@einstein.ssz.com> Forwarded message: > Date: Thu, 1 Oct 1998 21:22:24 +0200 > From: Anonymous > Subject: Re: I thought of an initialy regulated industry!... > > Personally, I favor the "Pournelle Solution": acquire a 10-mile by 10-mile > > region of the Mojave Desert. Not in an "ecologically interesting" area of As was pointed out it does rain out there. Though there is a more insidious issue that makes such attempts worthless. Here's how it works... Humidity in the air settles on the materials. Because of the daily temperature extremes the expansion of this water causes the materials to break into very small particles. The wind comes along and transports these particles downwind. I'll leave the rest to your imagination and a couple of hours with a geology text on erosion. ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From k-elliott at wiu.edu Wed Sep 30 23:34:54 1998 From: k-elliott at wiu.edu (Kevin Elliott) Date: Thu, 1 Oct 1998 14:34:54 +0800 Subject: GPL & commercial software, the critical distinction (fwd) In-Reply-To: <33CCFE438B9DD01192E800A024C84A1928471D@mossbay.chaffeyhomes.com> Message-ID: Said Matthew James Gering, >Bullshit, monopolies exist because of the regulation. I'm afraid sir, that your ingonorance is showing. Pick up any college (hell, high school) ecomonics textbook. Certain types of businesses are inheritly advantagious to monopolies. The electric company is the classic example- their is no cost effective way for an electric company to supply power to a given area unless it is a monopoly. Certain types of businesses are suited to certain types of competition, and, unregulated, monopolies are exactly what you get. This was exactly the situation that occured at the turn of the century and it happened because regulation was non-existant! Your statement is wonderfully trite but I see no evidence to support it. ___________________________________________________________________________ "DOS/WIN based computers manufactured by companies such as IBM, Compaq, Tandy, and millions of others, are by far the most popular, with about 70 million machines in use worldwide. Macintosh fans, on the other hand, note that cockroaches are far more numerous than humans, and that numbers alone do not denote a higher life form." - New York Times -Kevin "The Cubbie" Elliott From xasper8d at lobo.net Wed Sep 30 23:40:27 1998 From: xasper8d at lobo.net (X) Date: Thu, 1 Oct 1998 14:40:27 +0800 Subject: Rain in Death Valley In-Reply-To: <199810011932.OAA20010@einstein.ssz.com> Message-ID: <000001bded72$f7c55000$8a2580d0@ibm> If the area you refer to is below sea-level, where would the hard-rains runoff run off to? X ~> -----Original Message----- ~> From: owner-cypherpunks at minder.net ~> [mailto:owner-cypherpunks at minder.net]On Behalf Of Jim Choate ~> Sent: Thursday, October 01, 1998 1:32 PM ~> To: Cypherpunks Distributed Remailer ~> Subject: Re: I thought of an initialy regulated industry!... (fwd) ~> ~> ~> Forwarded message: ~> ~> > Date: Thu, 1 Oct 1998 21:22:24 +0200 ~> > From: Anonymous ~> > Subject: Re: I thought of an initialy regulated industry!... ~> ~> > > Personally, I favor the "Pournelle Solution": acquire a ~> 10-mile by 10-mile ~> > > region of the Mojave Desert. Not in an "ecologically ~> interesting" area of ~> ~> As was pointed out it does rain out there. Though there is a ~> more insidious ~> issue that makes such attempts worthless. ~> ~> Here's how it works... ~> ~> Humidity in the air settles on the materials. Because of the daily ~> temperature extremes the expansion of this water causes the materials to ~> break into very small particles. The wind comes along and ~> transports these ~> particles downwind. ~> ~> I'll leave the rest to your imagination and a couple of hours ~> with a geology ~> text on erosion. ~> ~> ~> ____________________________________________________________________ ~> ~> The seeker is a finder. ~> ~> Ancient Persian Proverb ~> ~> The Armadillo Group ,::////;::-. James Choate ~> Austin, Tx /:'///// ``::>/|/ ravage at ssz.com ~> www.ssz.com .', |||| `/( e\ 512-451-7087 ~> -====~~mm-'`-```-mm --'- ~> -------------------------------------------------------------------- ~> ~> From petro at playboy.com Wed Sep 30 23:41:05 1998 From: petro at playboy.com (Petro) Date: Thu, 1 Oct 1998 14:41:05 +0800 Subject: GPL & commercial software, the critical distinction (fwd) In-Reply-To: <199810010207.VAA15977@einstein.ssz.com> Message-ID: At 9:07 PM -0500 9/30/98, Jim Choate wrote: >Forwarded message: > >> From: Matthew James Gering >> Subject: RE: GPL & commercial software, the critical distinction (fwd) >> Date: Wed, 30 Sep 1998 18:24:02 -0700 > >> Jim Choate wrote: >> > The reality is that we don't live in a free-market, but >> > rather a rather lightly regulated one. >> >> Lightly? You jest. > >No I don't. I can start a business for as little as $15 to register a DBA >and I don't need licenses or other sorts of regulatory permissions. If I >sell a product or service (some are exempt, check your local area) I'll need >a tax number to pay my state sales tax (though they do nothing to regulate >my business other than specify that I must pay x% of my sales to the >community). Getting that tax number is free. Outside of that (at least in >Texas) I'm ready to go. That does not apply to very many business at all. Most are rather heavily regualted, and state regulations in some places can be extremely onerous. >Yep, that's a lot of regulation, no forms or permission slips from some >in loco parentis, no reports or annual fees. Unless you have a partner, or an employee, or a need to incorporate. >> No, we certainly don't live in a free market, we have >> a mixed economy. We *should* have a free market, > >No we shouldn't. The fact that monopolies can exist in this lightly >regulated economy is ample evidence that the non-regulated or free-market >theory is nothing more than another pie-in-the-sky utopian dream. >Unrealistic and unrealizable. Crap. In most cases monopolies are GIFTS from the government, where they aren't they are either (a) natural monopolies (were the market is too small to support competition, or there is some other feature of that market which makes competition difficult or undesirable) there aren't too many of these, or places where the government (city, state, fed) felt a monopoly would be of benefit to the citizens. I.e. Gas/power/light companies, Telephones etc. The government was (as usual) wrong. >If you seriously think this is a heavily regulated market you should do more >research into such places as Nazi Germany, Russia, China, etc. France, England etc. We are _going_ that route, with more and more regualtion being dumped on the backs of businesses daily. If you think that registering a DBA is the only step you need to _legally_ start and run a business, you're smokin crack. >> are much more destructive and pervasive than any potential abuses by >> market leaders. >Monopolies are monopolies, claiming that they will be less abusive in a >regulated market than in a free-market just demonstrates a lack of >understanding of basic human instincts. >You are claiming that if we do away with the food regulations that McDonalds >will be *more* concerned about their meat being cooked thoroughly then you >obviously don't understand people who chase the bottem line to the exclusion >of all else. If there were no food regulations, would you eat at Mc Donalds? Your life, your choice. >> Also, the latter abuses are naturally corrected by >> competition, > >If a market monopolizes there is *NO* competition. If the market is one that >takes a large investment in intellectual or capital materials then there >won't be any opportunity to even attempt to start a competitive venture. Like...Operating systems? Nope, Linux is NO competition for NT, neither are the free BSDs. >> The answer for establishing "rules" which insure "fairness," such as >Fairness is about the consumer, not the manufacturer. This misunderstanding >(if not intentional misdirection) by free-market mavens is at least one >indication why it won't work. Why shouldn't it go both ways? In a healthy market, the consumers ARE the manufacturers. -- petro at playboy.com----for work related issues. I don't speak for Playboy. petro at bounty.org-----for everthing else. They wouldn't like that. They REALLY Economic speech IS political speech. wouldn't like that. From petro at playboy.com Wed Sep 30 23:45:44 1998 From: petro at playboy.com (Petro) Date: Thu, 1 Oct 1998 14:45:44 +0800 Subject: GPL & commercial software, the critical distinction (fwd) In-Reply-To: <199810010212.VAA16034@einstein.ssz.com> Message-ID: At 9:12 PM -0500 9/30/98, Jim Choate wrote: >Forwarded message: >> Please elaborate. Netscape works fine on Windows 98, and faces the >> same restrictions with installation that original Windows 95 had. > >No Netscape on NT or 95/98 is no where near as stable as on a Linux or >Solaris box (the two that I use most). I can't go 24 hours on my NT for >example without Netscape hanging for some mysterious reason whereas I've >run Netscape (even on my HP 10.10) for days without a hang and those >mysterious pauses it's so famous for. Netscape isn't as stable on my Mac at work as it is on my Linux box, so what? Nothing is as stable on NT as it is on a (properly installed) linux system. >> As for Java, Java works as well on Windows as on any other platform. >Yep, that explains why my NT's have to be rebooted almost daily because of >various issues and my various unix boxes go for weeks....yep, that's more >stable all right. Your NT systems are installed improperly then. You should be able to get at least a week, if not 2 out of them. >> It's funny how giving the customers more value for their money, always >> ends up being anti-competative. > >How do you figure Win98 gives me more value for my money? I buy Win98 for >$100 or so, have to have gobs of memory and a damned fast processor to even >come close to the alternate OS'es. Simple, you now have a REALLY nice machine, whereas if you'd have stuck with Linux, that old 486 would still be a decent machine... >> network, that they can quickly add a jillion features to any program, >And just as many bugs. Bah, no one cares about bugs. -- petro at playboy.com----for work related issues. I don't speak for Playboy. petro at bounty.org-----for everthing else. They wouldn't like that. They REALLY Economic speech IS political speech. wouldn't like that. From ravage at EINSTEIN.ssz.com Wed Sep 30 23:51:17 1998 From: ravage at EINSTEIN.ssz.com (Jim Choate) Date: Thu, 1 Oct 1998 14:51:17 +0800 Subject: Rain in Death Valley (fwd) Message-ID: <199810011953.OAA20293@einstein.ssz.com> Forwarded message: > From: "X" > Subject: Rain in Death Valley > Date: Thu, 1 Oct 1998 13:37:47 -0600 > If the area you refer to is below sea-level, where would the hard-rains > runoff run off to? Let me say one word.... watertable Enjoy drinking the runoff. ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- From ravage at EINSTEIN.ssz.com Wed Sep 30 23:53:03 1998 From: ravage at EINSTEIN.ssz.com (Jim Choate) Date: Thu, 1 Oct 1998 14:53:03 +0800 Subject: GPL & commercial software, the critical distinction (fwd) Message-ID: <199810011954.OAA20323@einstein.ssz.com> Forwarded message: > Date: Thu, 1 Oct 1998 14:35:28 -0500 > From: Petro > Subject: RE: GPL & commercial software, the critical distinction (fwd) > Nothing is as stable on NT as it is on a (properly installed) linux > system. That is the point after all. > Your NT systems are installed improperly then. You should be able > to get at least a week, if not 2 out of them. I'll beg to differ with you. ____________________________________________________________________ The seeker is a finder. Ancient Persian Proverb The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage at ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- --------------------------------------------------------------------